Search dblp for Publications

export results for "stream:conf/pcsec:"

 download as .bib file

@inproceedings{DBLP:conf/pcs/Comba86,
  author       = {Paul G. Comba},
  editor       = {David R. Callaghan and
                  Leslie D. Ball},
  title        = {Approaches to cryptographic key management},
  booktitle    = {Proceedings of the Northeast {ACM} Symposium on Personal Computer
                  Security, {PCS} 1986, Waltham, Massachusetts, USA, 1986},
  pages        = {38--45},
  publisher    = {{ACM}},
  year         = {1986},
  url          = {https://doi.org/10.1145/318772.318781},
  doi          = {10.1145/318772.318781},
  timestamp    = {Sat, 12 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pcs/Comba86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcs/Hertzberg86,
  author       = {George Hertzberg},
  editor       = {David R. Callaghan and
                  Leslie D. Ball},
  title        = {Human behavior factors in {PC} control},
  booktitle    = {Proceedings of the Northeast {ACM} Symposium on Personal Computer
                  Security, {PCS} 1986, Waltham, Massachusetts, USA, 1986},
  pages        = {46--56},
  publisher    = {{ACM}},
  year         = {1986},
  url          = {https://doi.org/10.1145/318772.318782},
  doi          = {10.1145/318772.318782},
  timestamp    = {Sat, 12 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pcs/Hertzberg86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcs/Holden86,
  author       = {Don Holden},
  editor       = {David R. Callaghan and
                  Leslie D. Ball},
  title        = {The role of the host computer in defending against P.C.s},
  booktitle    = {Proceedings of the Northeast {ACM} Symposium on Personal Computer
                  Security, {PCS} 1986, Waltham, Massachusetts, USA, 1986},
  pages        = {28--37},
  publisher    = {{ACM}},
  year         = {1986},
  url          = {https://doi.org/10.1145/318772.318780},
  doi          = {10.1145/318772.318780},
  timestamp    = {Sat, 12 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pcs/Holden86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcs/Jennings86,
  author       = {William Jennings},
  editor       = {David R. Callaghan and
                  Leslie D. Ball},
  title        = {Microcomputer management of the Bank of New England},
  booktitle    = {Proceedings of the Northeast {ACM} Symposium on Personal Computer
                  Security, {PCS} 1986, Waltham, Massachusetts, USA, 1986},
  pages        = {21--27},
  publisher    = {{ACM}},
  year         = {1986},
  url          = {https://doi.org/10.1145/318772.318777},
  doi          = {10.1145/318772.318777},
  timestamp    = {Sat, 12 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pcs/Jennings86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcs/KurzbanSHCHM86,
  author       = {Stanley A. Kurzban and
                  James A. Schweitzer and
                  Don Holden and
                  Paul G. Comba and
                  George Hertzberg and
                  Bill Miller},
  editor       = {David R. Callaghan and
                  Leslie D. Ball},
  title        = {Panel discussion (panel session)},
  booktitle    = {Proceedings of the Northeast {ACM} Symposium on Personal Computer
                  Security, {PCS} 1986, Waltham, Massachusetts, USA, 1986},
  pages        = {57--62},
  publisher    = {{ACM}},
  year         = {1986},
  url          = {https://doi.org/10.1145/318772.318783},
  doi          = {10.1145/318772.318783},
  timestamp    = {Sat, 12 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pcs/KurzbanSHCHM86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcs/Murray86,
  author       = {William Murray},
  editor       = {David R. Callaghan and
                  Leslie D. Ball},
  title        = {Good security practice for personal computers},
  booktitle    = {Proceedings of the Northeast {ACM} Symposium on Personal Computer
                  Security, {PCS} 1986, Waltham, Massachusetts, USA, 1986},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {1986},
  url          = {https://doi.org/10.1145/318772.318775},
  doi          = {10.1145/318772.318775},
  timestamp    = {Sat, 12 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pcs/Murray86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcs/Schweitzer86,
  author       = {James A. Schweitzer},
  editor       = {David R. Callaghan and
                  Leslie D. Ball},
  title        = {Security awareness},
  booktitle    = {Proceedings of the Northeast {ACM} Symposium on Personal Computer
                  Security, {PCS} 1986, Waltham, Massachusetts, USA, 1986},
  pages        = {13--20},
  publisher    = {{ACM}},
  year         = {1986},
  url          = {https://doi.org/10.1145/318772.318776},
  doi          = {10.1145/318772.318776},
  timestamp    = {Sat, 12 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pcs/Schweitzer86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pcsec/1986,
  editor       = {David R. Callaghan and
                  Leslie D. Ball},
  title        = {Proceedings of the Northeast {ACM} Symposium on Personal Computer
                  Security, {PCS} 1986, Waltham, Massachusetts, USA, 1986},
  publisher    = {{ACM}},
  year         = {1986},
  url          = {https://doi.org/10.1145/318772},
  doi          = {10.1145/318772},
  isbn         = {978-0-89791-251-8},
  timestamp    = {Fri, 25 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pcsec/1986.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}