Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec12.bht:"
@article{DBLP:journals/compsec/AbramsALLW93, author = {Marshall D. Abrams and Edward Amoroso and Leonard J. LaPadula and Teresa F. Lunt and James G. Williams}, title = {Report of an integrity research study group}, journal = {Comput. Secur.}, volume = {12}, number = {7}, pages = {679--689}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90085-J}, doi = {10.1016/0167-4048(93)90085-J}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AbramsALLW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AllinsonBD93, author = {Caroline Allinson and Helen Bergen and Ed Dawson}, title = {Message collision in block ciphers with message authentication}, journal = {Comput. Secur.}, volume = {12}, number = {8}, pages = {781--787}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90044-6}, doi = {10.1016/0167-4048(93)90044-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AllinsonBD93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BergenH93, author = {Helen A. Bergen and James M. Hogan}, title = {A chosen plaintext attack on an adaptive arithmetic coding compression algorithm}, journal = {Comput. Secur.}, volume = {12}, number = {2}, pages = {157--167}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90099-Q}, doi = {10.1016/0167-4048(93)90099-Q}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BergenH93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Black93, author = {David K. Black}, title = {The Digital Signature Standard: Overview and current status}, journal = {Comput. Secur.}, volume = {12}, number = {5}, pages = {437--446}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90062-A}, doi = {10.1016/0167-4048(93)90062-A}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Black93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CaelliGO93, author = {William J. Caelli and Ian G. Graham and Luke O'Connor}, title = {Cryptographic Application Programming Interfaces (APIs)}, journal = {Comput. Secur.}, volume = {12}, number = {7}, pages = {640--645}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90079-K}, doi = {10.1016/0167-4048(93)90079-K}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CaelliGO93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Clyde93, author = {Robert A. Clyde}, title = {DECnet security (Not necessarily an oxymoron)}, journal = {Comput. Secur.}, volume = {12}, number = {2}, pages = {123--127}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90091-I}, doi = {10.1016/0167-4048(93)90091-I}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Clyde93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cohen93, author = {Frederick B. Cohen}, title = {Operating system protection through program evolution}, journal = {Comput. Secur.}, volume = {12}, number = {6}, pages = {565--584}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90054-9}, doi = {10.1016/0167-4048(93)90054-9}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Cohen93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CollinsM93, author = {Brian S. Collins and Steve Mathews}, title = {Securing your business process}, journal = {Comput. Secur.}, volume = {12}, number = {7}, pages = {629--633}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90077-I}, doi = {10.1016/0167-4048(93)90077-I}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CollinsM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Donovan93, author = {Steve Donovan}, title = {Security of PCs in a distributed environment}, journal = {Comput. Secur.}, volume = {12}, number = {1}, pages = {28--31}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90006-Q}, doi = {10.1016/0167-4048(93)90006-Q}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Donovan93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/EloffLB93, author = {Jan H. P. Eloff and Les Labuschagne and Karin P. Badenhorst}, title = {A comparative framework for risk analysis methods}, journal = {Comput. Secur.}, volume = {12}, number = {6}, pages = {597--603}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90056-B}, doi = {10.1016/0167-4048(93)90056-B}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/EloffLB93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Fagan93, author = {Peter Fagan}, title = {Organizational issues in {IT} security}, journal = {Comput. Secur.}, volume = {12}, number = {8}, pages = {710--715}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90033-2}, doi = {10.1016/0167-4048(93)90033-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Fagan93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Fernandez-GonzalezAR93, author = {J. Fern{\'{a}}ndez{-}Gonz{\'{a}}lez and Gordon B. Agnew and Arturo Ribagorda}, title = {Encryption and error correction codes for reliable file storage}, journal = {Comput. Secur.}, volume = {12}, number = {5}, pages = {501--510}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90070-L}, doi = {10.1016/0167-4048(93)90070-L}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Fernandez-GonzalezAR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FitchH93, author = {John A. Fitch III and Lance J. Hoffman}, title = {A shortest path network security model}, journal = {Comput. Secur.}, volume = {12}, number = {2}, pages = {169--189}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90100-J}, doi = {10.1016/0167-4048(93)90100-J}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FitchH93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GollmannBD93, author = {Dieter Gollmann and Thomas Beth and Frank Damm}, title = {Authentication services in distributed systems}, journal = {Comput. Secur.}, volume = {12}, number = {8}, pages = {753--764}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90041-3}, doi = {10.1016/0167-4048(93)90041-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GollmannBD93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hardy93, author = {Gary Hardy}, title = {Commercial accreditation of information security}, journal = {Comput. Secur.}, volume = {12}, number = {8}, pages = {716--729}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90034-3}, doi = {10.1016/0167-4048(93)90034-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hardy93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Heinlein93, author = {Edwin B. Heinlein}, title = {Recovery management}, journal = {Comput. Secur.}, volume = {12}, number = {4}, pages = {334--337}, year = {1993}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Heinlein93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Heinlein93a, author = {Edwin B. Heinlein}, title = {World Trade Center - {A} retrospective}, journal = {Comput. Secur.}, volume = {12}, number = {5}, pages = {435--436}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90061-9}, doi = {10.1016/0167-4048(93)90061-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Heinlein93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Heinlein93b, author = {Edwin B. Heinlein}, title = {I worked with Murphy}, journal = {Comput. Secur.}, volume = {12}, number = {7}, pages = {627--628}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90076-H}, doi = {10.1016/0167-4048(93)90076-H}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Heinlein93b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland93, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {12}, number = {1}, pages = {4--14}, year = {1993}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland93a, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {12}, number = {2}, pages = {106--116}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90089-N}, doi = {10.1016/0167-4048(93)90089-N}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland93b, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {12}, number = {3}, pages = {216--224}, year = {1993}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland93b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland93c, author = {Harold Joseph Highland}, title = {Conference report}, journal = {Comput. Secur.}, volume = {12}, number = {3}, pages = {249--253}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90111-H}, doi = {10.1016/0167-4048(93)90111-H}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland93c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland93d, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {12}, number = {5}, pages = {424--433}, year = {1993}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland93d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland93e, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {12}, number = {6}, pages = {518--526}, year = {1993}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland93e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland93f, author = {Harold Joseph Highland}, title = {IFIP/Sec '93 conference report}, journal = {Comput. Secur.}, volume = {12}, number = {6}, pages = {550--555}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90050-F}, doi = {10.1016/0167-4048(93)90050-F}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland93f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland93g, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {12}, number = {7}, pages = {612--622}, year = {1993}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland93g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland93h, author = {Harold Joseph Highland}, title = {A view of information security tomorrow}, journal = {Comput. Secur.}, volume = {12}, number = {7}, pages = {634--639}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90078-J}, doi = {10.1016/0167-4048(93)90078-J}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland93h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland93i, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {12}, number = {8}, pages = {698--709}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90032-Z}, doi = {10.1016/0167-4048(93)90032-Z}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland93i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland93j, author = {Harold Joseph Highland}, title = {16th national computer security conference}, journal = {Comput. Secur.}, volume = {12}, number = {8}, pages = {730--734}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90035-4}, doi = {10.1016/0167-4048(93)90035-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland93j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HochbergJSMDF93, author = {Judith Hochberg and Kathleen A. Jackson and Cathy A. Stallings and J. F. McClary and David H. DuBois and Josephine Ford}, title = {{NADIR:} An automated system for detecting network intrusion and misuse}, journal = {Comput. Secur.}, volume = {12}, number = {3}, pages = {235--248}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90110-Q}, doi = {10.1016/0167-4048(93)90110-Q}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HochbergJSMDF93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JonesATC93, author = {Mary C. Jones and Kirk P. Arnett and Jeung{-}tai Eddie Tang and Nian{-}Shin Chen}, title = {Perceptions of computer viruses: a cross-cultural assessment}, journal = {Comput. Secur.}, volume = {12}, number = {2}, pages = {191--197}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90101-A}, doi = {10.1016/0167-4048(93)90101-A}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JonesATC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kensey93, author = {Michael F. Kensey}, title = {Computer viruses - Towards better solutions}, journal = {Comput. Secur.}, volume = {12}, number = {6}, pages = {536--541}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90048-A}, doi = {10.1016/0167-4048(93)90048-A}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kensey93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Koerner93, author = {Frank Koerner}, title = {System threats and vulnerabilities and the contrary principle}, journal = {Comput. Secur.}, volume = {12}, number = {8}, pages = {775--779}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90043-5}, doi = {10.1016/0167-4048(93)90043-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Koerner93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LabuschagneR93, author = {Frans Labuschagne and Jan Roos}, title = {Data security in {X.25} networks}, journal = {Comput. Secur.}, volume = {12}, number = {5}, pages = {469--475}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90068-G}, doi = {10.1016/0167-4048(93)90068-G}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LabuschagneR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Lawrence93, author = {L. G. Lawrence}, title = {The role of roles}, journal = {Comput. Secur.}, volume = {12}, number = {1}, pages = {15--21}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90004-O}, doi = {10.1016/0167-4048(93)90004-O}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Lawrence93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Lawrence93a, author = {L. G. Lawrence}, title = {Digital signatures - Explanation and usage}, journal = {Comput. Secur.}, volume = {12}, number = {3}, pages = {230--233}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90109-I}, doi = {10.1016/0167-4048(93)90109-I}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Lawrence93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LongstaffS93, author = {Thomas A. Longstaff and E. Eugene Schultz}, title = {Beyond preliminary analysis of the {WANK} and {OILZ} worms: a case study of malicious code}, journal = {Comput. Secur.}, volume = {12}, number = {1}, pages = {61--77}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90013-U}, doi = {10.1016/0167-4048(93)90013-U}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LongstaffS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Lunt93, author = {Teresa F. Lunt}, title = {A survey of intrusion detection techniques}, journal = {Comput. Secur.}, volume = {12}, number = {4}, pages = {405--418}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90029-5}, doi = {10.1016/0167-4048(93)90029-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Lunt93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Meyer93, author = {John Meyer}, title = {The 1993 {IFIP} Kristian Beckman Award}, journal = {Comput. Secur.}, volume = {12}, number = {4}, pages = {338--340}, year = {1993}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Meyer93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Moseley93, author = {David Moseley}, title = {Public key management for {X.25} network security}, journal = {Comput. Secur.}, volume = {12}, number = {2}, pages = {128--133}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90092-J}, doi = {10.1016/0167-4048(93)90092-J}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Moseley93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Norman93, author = {Geoff Norman}, title = {Disaster recovery after downsizing}, journal = {Comput. Secur.}, volume = {12}, number = {3}, pages = {225--229}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90108-H}, doi = {10.1016/0167-4048(93)90108-H}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Norman93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Obaidat93, author = {Mohammad S. Obaidat}, title = {A methodology for improving computer access security}, journal = {Comput. Secur.}, volume = {12}, number = {7}, pages = {657--662}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90083-H}, doi = {10.1016/0167-4048(93)90083-H}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Obaidat93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Olnes93, author = {Jon {\O}lnes}, title = {{EDIFACT} security made simple - the {EDIMED} approach}, journal = {Comput. Secur.}, volume = {12}, number = {8}, pages = {765--774}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90042-4}, doi = {10.1016/0167-4048(93)90042-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Olnes93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PfitzmannA93, author = {Andreas Pfitzmann and Ralf A{\ss}mann}, title = {More efficient software implementations of (generalized) {DES}}, journal = {Comput. Secur.}, volume = {12}, number = {5}, pages = {477--500}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90069-H}, doi = {10.1016/0167-4048(93)90069-H}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PfitzmannA93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Plant93, author = {Martin Plant}, title = {Getting management buy-in to {IT} security}, journal = {Comput. Secur.}, volume = {12}, number = {7}, pages = {623--626}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90075-G}, doi = {10.1016/0167-4048(93)90075-G}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Plant93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Pujals93, author = {Joseph M. Pujals}, title = {Security and privacy}, journal = {Comput. Secur.}, volume = {12}, number = {1}, pages = {22--27}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90005-P}, doi = {10.1016/0167-4048(93)90005-P}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Pujals93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Rangan93, author = {P. Venkat Rangan}, title = {The authenticated datagram protocol: {A} high performance, subtransport level, secure communication protocol}, journal = {Comput. Secur.}, volume = {12}, number = {3}, pages = {305--314}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90119-P}, doi = {10.1016/0167-4048(93)90119-P}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Rangan93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Reitenspiess93, author = {Manfred Reitenspie{\ss}}, title = {Open system security standards}, journal = {Comput. Secur.}, volume = {12}, number = {4}, pages = {341--361}, year = {1993}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Reitenspiess93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Russell93, author = {Selwyn Russell}, title = {Paradigms for verification of authorization at source of electronic documents in an integrated environment}, journal = {Comput. Secur.}, volume = {12}, number = {6}, pages = {542--549}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90049-B}, doi = {10.1016/0167-4048(93)90049-B}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Russell93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SandhuS93, author = {Ravi S. Sandhu and Gurpreet S. Suri}, title = {A distributed capability-based architecture for the transform model}, journal = {Comput. Secur.}, volume = {12}, number = {3}, pages = {285--303}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90118-O}, doi = {10.1016/0167-4048(93)90118-O}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SandhuS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schramm93, author = {Christof Schramm}, title = {Added-on security for {MVS:} weaknesses and measures}, journal = {Comput. Secur.}, volume = {12}, number = {4}, pages = {379--388}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90027-3}, doi = {10.1016/0167-4048(93)90027-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Schramm93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SlackU93, author = {James M. Slack and Elizabeth A. Unger}, title = {Integrity in object-oriented database systems}, journal = {Comput. Secur.}, volume = {12}, number = {4}, pages = {389--404}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90028-4}, doi = {10.1016/0167-4048(93)90028-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SlackU93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SpaffordW93, author = {Eugene H. Spafford and Stephen A. Weeber}, title = {Software forensics: Can we track code to its authors?}, journal = {Comput. Secur.}, volume = {12}, number = {6}, pages = {585--595}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90055-A}, doi = {10.1016/0167-4048(93)90055-A}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SpaffordW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Stahl93, author = {Stanley H. Stahl}, title = {Information security in workstation environments}, journal = {Comput. Secur.}, volume = {12}, number = {2}, pages = {117--122}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90090-R}, doi = {10.1016/0167-4048(93)90090-R}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Stahl93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Turi93, author = {Barbara B. Di Turi}, title = {Security for {EDIFACT} messages}, journal = {Comput. Secur.}, volume = {12}, number = {5}, pages = {447--455}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90063-B}, doi = {10.1016/0167-4048(93)90063-B}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Turi93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VaughnSU93, author = {Rayford B. Vaughn and Hossein Saiedian and Elizabeth A. Unger}, title = {A survey of security issues in office computation and the application of secure computing models to office systems}, journal = {Comput. Secur.}, volume = {12}, number = {1}, pages = {79--97}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90014-V}, doi = {10.1016/0167-4048(93)90014-V}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VaughnSU93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VoasPC93, author = {Jeffrey M. Voas and Jeffery E. Payne and Frederick B. Cohen}, title = {A model for detecting the existence of software corruption in real time}, journal = {Comput. Secur.}, volume = {12}, number = {3}, pages = {275--283}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90117-N}, doi = {10.1016/0167-4048(93)90117-N}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VoasPC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wood93, author = {Charles Cresson Wood}, title = {Duress terminations and information security}, journal = {Comput. Secur.}, volume = {12}, number = {6}, pages = {527--535}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90047-9}, doi = {10.1016/0167-4048(93)90047-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wood93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wood93a, author = {Charles Cresson Wood}, title = {Principles of secure information systems design with groupware examples}, journal = {Comput. Secur.}, volume = {12}, number = {7}, pages = {663--678}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90084-I}, doi = {10.1016/0167-4048(93)90084-I}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wood93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WoodB93, author = {Charles Cresson Wood and William W. Banks Jr.}, title = {Human error: an overlooked but significant information security problem}, journal = {Comput. Secur.}, volume = {12}, number = {1}, pages = {51--60}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90012-T}, doi = {10.1016/0167-4048(93)90012-T}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WoodB93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.