default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec14.bht:"
@article{DBLP:journals/compsec/AbramsJ95, author = {Marshall D. Abrams and Michael V. Joyce}, title = {Trusted system concepts}, journal = {Comput. Secur.}, volume = {14}, number = {1}, pages = {45--56}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97025-6}, doi = {10.1016/0167-4048(95)97025-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AbramsJ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AbramsJ95a, author = {Marshall D. Abrams and Michael V. Joyce}, title = {Trusted computing update}, journal = {Comput. Secur.}, volume = {14}, number = {1}, pages = {57--68}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97026-7}, doi = {10.1016/0167-4048(95)97026-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AbramsJ95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AbramsJ95b, author = {Marshall D. Abrams and Michael V. Joyce}, title = {New thinking about information technology security}, journal = {Comput. Secur.}, volume = {14}, number = {1}, pages = {69--81}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97027-8}, doi = {10.1016/0167-4048(95)97027-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AbramsJ95b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AbramsM95, author = {Marshall D. Abrams and Jonathan D. Moffett}, title = {A higher level of computer security through active policies}, journal = {Comput. Secur.}, volume = {14}, number = {2}, pages = {147--157}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97048-F}, doi = {10.1016/0167-4048(95)97048-F}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AbramsM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AbramsZ95, author = {Marshall D. Abrams and Marvin V. Zelkowitz}, title = {Striving for correctness}, journal = {Comput. Secur.}, volume = {14}, number = {8}, pages = {719--738}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00022-4}, doi = {10.1016/0167-4048(95)00022-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AbramsZ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BackhouseD95, author = {James Backhouse and Gurpreet Dhillon}, title = {Managing computer crime: a research outlook}, journal = {Comput. Secur.}, volume = {14}, number = {7}, pages = {645--651}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00024-0}, doi = {10.1016/0167-4048(95)00024-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BackhouseD95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BishopK95, author = {Matt Bishop and Daniel V. Klein}, title = {Improving system security via proactive password checking}, journal = {Comput. Secur.}, volume = {14}, number = {3}, pages = {233--249}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00003-Q}, doi = {10.1016/0167-4048(95)00003-Q}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BishopK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BooysenE95, author = {H. A. S. Booysen and Jan H. P. Eloff}, title = {Classification of objects for improved access control}, journal = {Comput. Secur.}, volume = {14}, number = {3}, pages = {251--265}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00001-O}, doi = {10.1016/0167-4048(95)00001-O}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BooysenE95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ClearyIR95, author = {John G. Cleary and Sean A. Irvine and Ingrid Rinsma{-}Melchert}, title = {On the insecurity of arithmetic coding}, journal = {Comput. Secur.}, volume = {14}, number = {2}, pages = {167--180}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97050-K}, doi = {10.1016/0167-4048(95)97050-K}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ClearyIR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DeaneBHM95, author = {Frank Deane and Kate Barrelle and Ron Henderson and Doug Mahar}, title = {Perceived acceptability of biometric security systems}, journal = {Comput. Secur.}, volume = {14}, number = {3}, pages = {225--231}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00005-S}, doi = {10.1016/0167-4048(95)00005-S}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DeaneBHM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DoumasMGK95, author = {Anastasia Doumas and Konstantinos Mavroudakis and Dimitris Gritzalis and Sokratis K. Katsikas}, title = {Design of a neural network for recognition and classification of computer viruses}, journal = {Comput. Secur.}, volume = {14}, number = {5}, pages = {435--448}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00008-V}, doi = {10.1016/0167-4048(95)00008-V}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DoumasMGK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Duncan95, author = {Rebecca J. Duncan}, title = {There are some cracks in the cornerstone of information security}, journal = {Comput. Secur.}, volume = {14}, number = {8}, pages = {675--680}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(96)81707-X}, doi = {10.1016/0167-4048(96)81707-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Duncan95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/EkenbergOO95, author = {Love Ekenberg and Subhash Oberoi and Istv{\'{a}}n Orci}, title = {A cost model for managing information security hazards}, journal = {Comput. Secur.}, volume = {14}, number = {8}, pages = {707--717}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00021-6}, doi = {10.1016/0167-4048(95)00021-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/EkenbergOO95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Gordon95, author = {Sarah Gordon}, title = {Technologically enabled crime: Shifting paradigms for the Year 2000}, journal = {Comput. Secur.}, volume = {14}, number = {5}, pages = {391--402}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97090-W}, doi = {10.1016/0167-4048(95)97090-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Gordon95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Gordon95a, author = {Sarah Gordon}, title = {Internet 101}, journal = {Comput. Secur.}, volume = {14}, number = {7}, pages = {599--604}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(96)81666-X}, doi = {10.1016/0167-4048(96)81666-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Gordon95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HardjonoS95, author = {Thomas Hardjono and Jennifer Seberry}, title = {Applications of smartcards for anonymous and verifiable databases}, journal = {Comput. Secur.}, volume = {14}, number = {5}, pages = {465--472}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00011-V}, doi = {10.1016/0167-4048(95)00011-V}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HardjonoS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Heinlein95, author = {Edwin B. Heinlein}, title = {Principles of information systems security}, journal = {Comput. Secur.}, volume = {14}, number = {3}, pages = {197--198}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97052-C}, doi = {10.1016/0167-4048(95)97052-C}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Heinlein95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland95, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {14}, number = {1}, pages = {4--13}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)96990-K}, doi = {10.1016/0167-4048(95)96990-K}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland95a, author = {Harold Joseph Highland}, title = {Random Bits {\&} Bytes}, journal = {Comput. Secur.}, volume = {14}, number = {2}, pages = {90--102}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97028-9}, doi = {10.1016/0167-4048(95)97028-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland95b, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {14}, number = {3}, pages = {188--196}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97051-B}, doi = {10.1016/0167-4048(95)97051-B}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland95b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland95c, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {14}, number = {4}, pages = {274--282}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97067-K}, doi = {10.1016/0167-4048(95)97067-K}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland95c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland95d, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {14}, number = {5}, pages = {365--371}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97086-P}, doi = {10.1016/0167-4048(95)97086-P}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland95d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland95e, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {14}, number = {6}, pages = {480--488}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)99310-L}, doi = {10.1016/0167-4048(95)99310-L}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland95e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland95f, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {14}, number = {7}, pages = {574--585}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(96)81664-6}, doi = {10.1016/0167-4048(96)81664-6}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland95f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland95g, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {14}, number = {8}, pages = {660--666}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(96)81705-6}, doi = {10.1016/0167-4048(96)81705-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland95g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HillS95, author = {Scott Hill and Martin Smith}, title = {Risk management {\&} corporate security: {A} viable leadership and business solution designed to enhance corporations in the emerging marketplace}, journal = {Comput. Secur.}, volume = {14}, number = {3}, pages = {199--204}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97053-D}, doi = {10.1016/0167-4048(95)97053-D}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HillS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hitchings95, author = {Jean Hitchings}, title = {Deficiencies of the traditional approach to information security and the requirements for a new methodology}, journal = {Comput. Secur.}, volume = {14}, number = {5}, pages = {377--383}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97088-R}, doi = {10.1016/0167-4048(95)97088-R}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hitchings95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Holloway95, author = {Christopher L. J. Holloway}, title = {Controlling the use of cryptographic keys}, journal = {Comput. Secur.}, volume = {14}, number = {7}, pages = {587--598}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(96)81665-8}, doi = {10.1016/0167-4048(96)81665-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Holloway95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Holloway95a, author = {Christopher L. J. Holloway}, title = {Controlling digital signature services using a smartcard}, journal = {Comput. Secur.}, volume = {14}, number = {8}, pages = {681--690}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(96)81708-1}, doi = {10.1016/0167-4048(96)81708-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Holloway95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KailayJ95, author = {Muninder P. Kailay and Peter Jarratt}, title = {RAMeX: a prototype expert system for computer security risk analysis and management}, journal = {Comput. Secur.}, volume = {14}, number = {5}, pages = {449--463}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00013-X}, doi = {10.1016/0167-4048(95)00013-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KailayJ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kim95, author = {Hyun{-}jung Kim}, title = {Biometrics, is it a viable proposition for identity authentication and access control?}, journal = {Comput. Secur.}, volume = {14}, number = {3}, pages = {205--214}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97054-E}, doi = {10.1016/0167-4048(95)97054-E}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kim95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Koning95, author = {Fred de Koning}, title = {A methodology for the design of security plans}, journal = {Comput. Secur.}, volume = {14}, number = {7}, pages = {633--643}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00020-8}, doi = {10.1016/0167-4048(95)00020-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Koning95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kovacich95, author = {Gerald L. Kovacich}, title = {Recovering computer-generated evidence}, journal = {Comput. Secur.}, volume = {14}, number = {4}, pages = {289--296}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97070-Q}, doi = {10.1016/0167-4048(95)97070-Q}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kovacich95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Krull95, author = {Alan R. Krull}, title = {Controls in the next millennium: Anticipating the IT-enabled future}, journal = {Comput. Secur.}, volume = {14}, number = {6}, pages = {491--495}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)99312-D}, doi = {10.1016/0167-4048(95)99312-D}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Krull95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Leach95, author = {John Leach}, title = {Dynamic authentication for smartcards}, journal = {Comput. Secur.}, volume = {14}, number = {5}, pages = {385--389}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97089-S}, doi = {10.1016/0167-4048(95)97089-S}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Leach95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Lindup95, author = {Kenneth R. Lindup}, title = {A new model for information security policies}, journal = {Comput. Secur.}, volume = {14}, number = {8}, pages = {691--695}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(96)81709-3}, doi = {10.1016/0167-4048(96)81709-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Lindup95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LoLO95, author = {Raymond W. Lo and Karl N. Levitt and Ronald A. Olsson}, title = {{MCF:} a malicious code filter}, journal = {Comput. Secur.}, volume = {14}, number = {6}, pages = {541--566}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00012-W}, doi = {10.1016/0167-4048(95)00012-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LoLO95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Mohrenschlager95, author = {Manfred M{\"{o}}hrenschlager}, title = {Hacking: To criminalize or not ? - suggestions for the legislature}, journal = {Comput. Secur.}, volume = {14}, number = {2}, pages = {103--112}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97029-A}, doi = {10.1016/0167-4048(95)97029-A}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Mohrenschlager95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OShea95, author = {Greg O'Shea}, title = {Redundant access rights}, journal = {Comput. Secur.}, volume = {14}, number = {4}, pages = {323--348}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00006-T}, doi = {10.1016/0167-4048(95)00006-T}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OShea95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Oliver95, author = {Claude Oliver}, title = {Privacy, anonymity and accountability}, journal = {Comput. Secur.}, volume = {14}, number = {6}, pages = {489--490}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)99311-C}, doi = {10.1016/0167-4048(95)99311-C}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Oliver95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Reid95, author = {Jim Reid}, title = {Open systems security: Traps and pitfalls}, journal = {Comput. Secur.}, volume = {14}, number = {6}, pages = {496--517}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)99313-E}, doi = {10.1016/0167-4048(95)99313-E}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Reid95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Shepherd95, author = {Simon J. Shepherd}, title = {A high speed software implementation of the Data Encryption Standard}, journal = {Comput. Secur.}, volume = {14}, number = {4}, pages = {349--357}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00007-U}, doi = {10.1016/0167-4048(95)00007-U}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Shepherd95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SmithS95, author = {Martin Smith and John Sherwood}, title = {Business continuity planning}, journal = {Comput. Secur.}, volume = {14}, number = {1}, pages = {14--23}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)96991-B}, doi = {10.1016/0167-4048(95)96991-B}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SmithS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SohD95, author = {Ben Soh and Tharam S. Dillon}, title = {Setting optimal intrusion-detection thresholds}, journal = {Comput. Secur.}, volume = {14}, number = {7}, pages = {621--631}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00017-8}, doi = {10.1016/0167-4048(95)00017-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SohD95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Stoll95, author = {Frank Stoll}, title = {The need for decentralization and privacy in mobile communications networks}, journal = {Comput. Secur.}, volume = {14}, number = {6}, pages = {527--539}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00014-Y}, doi = {10.1016/0167-4048(95)00014-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Stoll95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TsaiC95, author = {Hui{-}Min Tsai and Chin{-}Chen Chang}, title = {A cryptographic implementation for dynamic access control in a user hierarchy}, journal = {Comput. Secur.}, volume = {14}, number = {2}, pages = {159--166}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97049-G}, doi = {10.1016/0167-4048(95)97049-G}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TsaiC95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wiseman95, author = {Simon R. Wiseman}, title = {Classification services in the {SWORD} secure {DBMS}}, journal = {Comput. Secur.}, volume = {14}, number = {4}, pages = {307--321}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)00004-R}, doi = {10.1016/0167-4048(95)00004-R}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wiseman95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wolfe95, author = {Henry B. Wolfe}, title = {Computer security: For fun and profit}, journal = {Comput. Secur.}, volume = {14}, number = {2}, pages = {113--115}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97030-E}, doi = {10.1016/0167-4048(95)97030-E}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wolfe95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wood95, author = {Charles Cresson Wood}, title = {Shifting information systems security responsibility from user organizations to vendor/publisher organizations}, journal = {Comput. Secur.}, volume = {14}, number = {4}, pages = {283--284}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97068-L}, doi = {10.1016/0167-4048(95)97068-L}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wood95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wood95a, author = {Charles Cresson Wood}, title = {Writing infosec policies}, journal = {Comput. Secur.}, volume = {14}, number = {8}, pages = {667--674}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(96)81706-8}, doi = {10.1016/0167-4048(96)81706-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wood95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WoodS95, author = {Charles Cresson Wood and Karen Snow}, title = {{ISO} 9000 and information security}, journal = {Comput. Secur.}, volume = {14}, number = {4}, pages = {287--288}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97069-M}, doi = {10.1016/0167-4048(95)97069-M}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WoodS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WuH95, author = {Tzong{-}Chen Wu and Wei{-}Hua He}, title = {A geometric approach for sharing secrets}, journal = {Comput. Secur.}, volume = {14}, number = {2}, pages = {135--145}, year = {1995}, url = {https://doi.org/10.1016/0167-4048(95)97047-E}, doi = {10.1016/0167-4048(95)97047-E}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WuH95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.