- Hyun-jung Kim:
Biometrics, is it a viable proposition for identity authentication and access control? Comput. Secur. 14(3): 205-214 (1995) - Fred de Koning:
A methodology for the design of security plans. Comput. Secur. 14(7): 633-643 (1995) - Gerald L. Kovacich:
Recovering computer-generated evidence. Comput. Secur. 14(4): 289-296 (1995) - Alan R. Krull:
Controls in the next millennium: Anticipating the IT-enabled future. Comput. Secur. 14(6): 491-495 (1995) - John Leach:
Dynamic authentication for smartcards. Comput. Secur. 14(5): 385-389 (1995) - Kenneth R. Lindup:
A new model for information security policies. Comput. Secur. 14(8): 691-695 (1995) - Raymond W. Lo, Karl N. Levitt, Ronald A. Olsson:
MCF: a malicious code filter. Comput. Secur. 14(6): 541-566 (1995) - Manfred Möhrenschlager:
Hacking: To criminalize or not ? - suggestions for the legislature. Comput. Secur. 14(2): 103-112 (1995) - Greg O'Shea:
Redundant access rights. Comput. Secur. 14(4): 323-348 (1995) - Claude Oliver:
Privacy, anonymity and accountability. Comput. Secur. 14(6): 489-490 (1995) - Jim Reid:
Open systems security: Traps and pitfalls. Comput. Secur. 14(6): 496-517 (1995) - Simon J. Shepherd:
A high speed software implementation of the Data Encryption Standard. Comput. Secur. 14(4): 349-357 (1995) - Martin Smith, John Sherwood:
Business continuity planning. Comput. Secur. 14(1): 14-23 (1995) - Ben Soh, Tharam S. Dillon:
Setting optimal intrusion-detection thresholds. Comput. Secur. 14(7): 621-631 (1995) - Frank Stoll:
The need for decentralization and privacy in mobile communications networks. Comput. Secur. 14(6): 527-539 (1995) - Hui-Min Tsai, Chin-Chen Chang:
A cryptographic implementation for dynamic access control in a user hierarchy. Comput. Secur. 14(2): 159-166 (1995) - Simon R. Wiseman:
Classification services in the SWORD secure DBMS. Comput. Secur. 14(4): 307-321 (1995) - Henry B. Wolfe:
Computer security: For fun and profit. Comput. Secur. 14(2): 113-115 (1995) - Charles Cresson Wood:
Shifting information systems security responsibility from user organizations to vendor/publisher organizations. Comput. Secur. 14(4): 283-284 (1995) - Charles Cresson Wood:
Writing infosec policies. Comput. Secur. 14(8): 667-674 (1995) - Charles Cresson Wood, Karen Snow:
ISO 9000 and information security. Comput. Secur. 14(4): 287-288 (1995) - Tzong-Chen Wu, Wei-Hua He:
A geometric approach for sharing secrets. Comput. Secur. 14(2): 135-145 (1995)