- 1995
- Marshall D. Abrams, Michael V. Joyce:
Trusted system concepts. Comput. Secur. 14(1): 45-56 (1995) - Marshall D. Abrams, Michael V. Joyce:
Trusted computing update. Comput. Secur. 14(1): 57-68 (1995) - Marshall D. Abrams, Michael V. Joyce:
New thinking about information technology security. Comput. Secur. 14(1): 69-81 (1995) - Marshall D. Abrams, Jonathan D. Moffett:
A higher level of computer security through active policies. Comput. Secur. 14(2): 147-157 (1995) - Marshall D. Abrams, Marvin V. Zelkowitz:
Striving for correctness. Comput. Secur. 14(8): 719-738 (1995) - James Backhouse, Gurpreet Dhillon:
Managing computer crime: a research outlook. Comput. Secur. 14(7): 645-651 (1995) - Matt Bishop, Daniel V. Klein:
Improving system security via proactive password checking. Comput. Secur. 14(3): 233-249 (1995) - H. A. S. Booysen, Jan H. P. Eloff:
Classification of objects for improved access control. Comput. Secur. 14(3): 251-265 (1995) - John G. Cleary, Sean A. Irvine, Ingrid Rinsma-Melchert:
On the insecurity of arithmetic coding. Comput. Secur. 14(2): 167-180 (1995) - Frank Deane, Kate Barrelle, Ron Henderson, Doug Mahar:
Perceived acceptability of biometric security systems. Comput. Secur. 14(3): 225-231 (1995) - Anastasia Doumas, Konstantinos Mavroudakis, Dimitris Gritzalis, Sokratis K. Katsikas:
Design of a neural network for recognition and classification of computer viruses. Comput. Secur. 14(5): 435-448 (1995) - Rebecca J. Duncan:
There are some cracks in the cornerstone of information security. Comput. Secur. 14(8): 675-680 (1995) - Love Ekenberg, Subhash Oberoi, István Orci:
A cost model for managing information security hazards. Comput. Secur. 14(8): 707-717 (1995) - Sarah Gordon:
Technologically enabled crime: Shifting paradigms for the Year 2000. Comput. Secur. 14(5): 391-402 (1995) - Sarah Gordon:
Internet 101. Comput. Secur. 14(7): 599-604 (1995) - Thomas Hardjono, Jennifer Seberry:
Applications of smartcards for anonymous and verifiable databases. Comput. Secur. 14(5): 465-472 (1995) - Edwin B. Heinlein:
Principles of information systems security. Comput. Secur. 14(3): 197-198 (1995) - Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 14(1): 4-13 (1995) - Harold Joseph Highland:
Random Bits & Bytes. Comput. Secur. 14(2): 90-102 (1995) - Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 14(3): 188-196 (1995) - Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 14(4): 274-282 (1995) - Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 14(5): 365-371 (1995) - Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 14(6): 480-488 (1995) - Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 14(7): 574-585 (1995) - Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 14(8): 660-666 (1995) - Scott Hill, Martin Smith:
Risk management & corporate security: A viable leadership and business solution designed to enhance corporations in the emerging marketplace. Comput. Secur. 14(3): 199-204 (1995) - Jean Hitchings:
Deficiencies of the traditional approach to information security and the requirements for a new methodology. Comput. Secur. 14(5): 377-383 (1995) - Christopher L. J. Holloway:
Controlling the use of cryptographic keys. Comput. Secur. 14(7): 587-598 (1995) - Christopher L. J. Holloway:
Controlling digital signature services using a smartcard. Comput. Secur. 14(8): 681-690 (1995) - Muninder P. Kailay, Peter Jarratt:
RAMeX: a prototype expert system for computer security risk analysis and management. Comput. Secur. 14(5): 449-463 (1995)