![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec16.bht:"
@article{DBLP:journals/compsec/Bouniol97, author = {Stephane G. Bouniol}, title = {The puzzle theorem - The less {I} know, the less {I} can disclose ..}, journal = {Comput. Secur.}, volume = {16}, number = {2}, pages = {115--125}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)88290-9}, doi = {10.1016/S0167-4048(97)88290-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Bouniol97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Boyce97, author = {Brian Boyce}, title = {Cyber extortion - The corporate response}, journal = {Comput. Secur.}, volume = {16}, number = {1}, pages = {25--28}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)85784-7}, doi = {10.1016/S0167-4048(97)85784-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Boyce97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BunnellPHNK97, author = {Julie Bunnell and John Podd and Ron Henderson and Renee Napier and James Kennedy{-}Moffat}, title = {Cognitive, associative and conventional passwords: Recall and guessing rates}, journal = {Comput. Secur.}, volume = {16}, number = {7}, pages = {629--641}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)00008-4}, doi = {10.1016/S0167-4048(97)00008-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BunnellPHNK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Ciechanowicz97, author = {Zbigniew Ciechanowicz}, title = {Risk analysis: requirements, conflicts and problems}, journal = {Comput. Secur.}, volume = {16}, number = {3}, pages = {223--232}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)00004-7}, doi = {10.1016/S0167-4048(97)00004-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Ciechanowicz97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Clark97, author = {Andrew J. Clark}, title = {Key recovery - why, how, who?}, journal = {Comput. Secur.}, volume = {16}, number = {8}, pages = {669--674}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)87581-5}, doi = {10.1016/S0167-4048(97)87581-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Clark97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cohen97, author = {Fred Cohen}, title = {Information system attacks: {A} preliminary classification scheme}, journal = {Comput. Secur.}, volume = {16}, number = {1}, pages = {29--46}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)85785-9}, doi = {10.1016/S0167-4048(97)85785-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Cohen97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cohen97a, author = {Fred Cohen}, title = {Information system defences: {A} preliminary classification scheme}, journal = {Comput. Secur.}, volume = {16}, number = {2}, pages = {94--114}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)88289-2}, doi = {10.1016/S0167-4048(97)88289-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Cohen97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Finne97, author = {Thomas Finne}, title = {What are the information security risks in decision support systems and data warehousing?}, journal = {Comput. Secur.}, volume = {16}, number = {3}, pages = {197--204}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)84512-9}, doi = {10.1016/S0167-4048(97)84512-9}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Finne97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Finne97a, author = {Thomas Finne}, title = {Information security implemented in: The theory on stock market efficiency, Markowitz's portfolio theory and porter's value chain}, journal = {Comput. Secur.}, volume = {16}, number = {6}, pages = {469--479}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)84641-X}, doi = {10.1016/S0167-4048(97)84641-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Finne97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Foley97, author = {Simon N. Foley}, title = {Building Chinese walls in standard unix\({}^{\mbox{TM}}\)}, journal = {Comput. Secur.}, volume = {16}, number = {6}, pages = {551--563}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)00010-2}, doi = {10.1016/S0167-4048(97)00010-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Foley97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GennaroKMPRSWZ97, author = {Rosario Gennaro and Paul A. Karger and Stephen M. Matyas and Mohammad Peyravian and Allen Roginsky and David Safford and Michael Willett and Nevenko Zunic}, title = {Two-phase cryptographic key recovery system}, journal = {Comput. Secur.}, volume = {16}, number = {6}, pages = {481--506}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)84642-1}, doi = {10.1016/S0167-4048(97)84642-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GennaroKMPRSWZ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Gritzalis97, author = {Dimitris Gritzalis}, title = {A baseline security policy for distributed healthcare information systems}, journal = {Comput. Secur.}, volume = {16}, number = {8}, pages = {709--719}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)00009-6}, doi = {10.1016/S0167-4048(97)00009-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Gritzalis97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hickson97, author = {Nigel Hickson}, title = {Encryption policy - {A} {UK} perspective}, journal = {Comput. Secur.}, volume = {16}, number = {7}, pages = {583--589}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)80794-8}, doi = {10.1016/S0167-4048(97)80794-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hickson97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland97, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes {\&} bytes}, journal = {Comput. Secur.}, volume = {16}, number = {1}, pages = {4--13}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)85782-3}, doi = {10.1016/S0167-4048(97)85782-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland97a, author = {Harold Joseph Highland}, title = {Current literature The 19th National Information Systems Security Conference}, journal = {Comput. Secur.}, volume = {16}, number = {1}, pages = {47--59}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)85786-0}, doi = {10.1016/S0167-4048(97)85786-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland97b, author = {Harold Joseph Highland}, title = {IFIP/SEC'97 conference proceedings}, journal = {Comput. Secur.}, volume = {16}, number = {3}, pages = {205}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)84513-0}, doi = {10.1016/S0167-4048(97)84513-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland97b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland97c, author = {Harold Joseph Highland}, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {16}, number = {4}, pages = {266--275}, year = {1997}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland97c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland97d, author = {Harold Joseph Highland}, title = {The threats on the web}, journal = {Comput. Secur.}, volume = {16}, number = {5}, pages = {365--368}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)82242-0}, doi = {10.1016/S0167-4048(97)82242-0}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Highland97d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland97e, author = {Harold Joseph Highland}, title = {Data encryption: {A} non-mathematical approach}, journal = {Comput. Secur.}, volume = {16}, number = {5}, pages = {369--386}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)82243-2}, doi = {10.1016/S0167-4048(97)82243-2}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland97e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland97f, author = {Harold Joseph Highland}, title = {Historical bits {\&} bytes}, journal = {Comput. Secur.}, volume = {16}, number = {5}, pages = {387--411}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)82244-4}, doi = {10.1016/S0167-4048(97)82244-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland97f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland97g, author = {Harold Joseph Highland}, title = {A history of computer viruses - Introduction}, journal = {Comput. Secur.}, volume = {16}, number = {5}, pages = {412--415}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)82245-6}, doi = {10.1016/S0167-4048(97)82245-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland97g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland97h, author = {Harold Joseph Highland}, title = {A history of computer viruses - The famous 'trio'}, journal = {Comput. Secur.}, volume = {16}, number = {5}, pages = {416--429}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)82246-8}, doi = {10.1016/S0167-4048(97)82246-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland97h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland97i, author = {Harold Joseph Highland}, title = {A history of computer viruses: Three special viruses}, journal = {Comput. Secur.}, volume = {16}, number = {5}, pages = {430--438}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)82247-X}, doi = {10.1016/S0167-4048(97)82247-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland97i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Highland97j, author = {Harold Joseph Highland}, title = {Procedures to reduce the computer virus threat}, journal = {Comput. Secur.}, volume = {16}, number = {5}, pages = {439--449}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)82248-1}, doi = {10.1016/S0167-4048(97)82248-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Highland97j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HinkeDW97, author = {Thomas H. Hinke and Harry S. Delugach and Randall P. Wolf}, title = {Protecting databases from inference attacks}, journal = {Comput. Secur.}, volume = {16}, number = {8}, pages = {687--708}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)87607-9}, doi = {10.1016/S0167-4048(97)87607-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HinkeDW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Jones97, author = {Andy Jones}, title = {Penetration testing and system audit - experience gained during the investigation of systems within the {UK}}, journal = {Comput. Secur.}, volume = {16}, number = {7}, pages = {595--602}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)80796-1}, doi = {10.1016/S0167-4048(97)80796-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Jones97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kemp97, author = {Alasdair Kemp}, title = {Embedded systems: The other problem}, journal = {Comput. Secur.}, volume = {16}, number = {8}, pages = {663--668}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)87580-3}, doi = {10.1016/S0167-4048(97)87580-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kemp97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kovacich97, author = {Gerald L. Kovacich}, title = {Information warfare and the information systems security professional}, journal = {Comput. Secur.}, volume = {16}, number = {1}, pages = {14--24}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)85783-5}, doi = {10.1016/S0167-4048(97)85783-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kovacich97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kovacich97a, author = {Gerald L. Kovacich}, title = {The {ISSO} must understand the business and management environment}, journal = {Comput. Secur.}, volume = {16}, number = {4}, pages = {321--326}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)80196-4}, doi = {10.1016/S0167-4048(97)80196-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kovacich97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kovacich97b, author = {Gerald L. Kovacich}, title = {{ISSO} career development}, journal = {Comput. Secur.}, volume = {16}, number = {6}, pages = {455--458}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)84640-8}, doi = {10.1016/S0167-4048(97)84640-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kovacich97b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kovacich97c, author = {Gerald L. Kovacich}, title = {Information systems security metrics management}, journal = {Comput. Secur.}, volume = {16}, number = {7}, pages = {610--618}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)80798-5}, doi = {10.1016/S0167-4048(97)80798-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kovacich97c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kovacich97d, author = {Gerald L. Kovacich}, title = {How to market yourself as an {ISSO}}, journal = {Comput. Secur.}, volume = {16}, number = {8}, pages = {657--662}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)87579-7}, doi = {10.1016/S0167-4048(97)87579-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kovacich97d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KrsulS97, author = {Ivan Krsul and Eugene H. Spafford}, title = {Authorship analysis: identifying the author of a program}, journal = {Comput. Secur.}, volume = {16}, number = {3}, pages = {233--257}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)00005-9}, doi = {10.1016/S0167-4048(97)00005-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KrsulS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LabuschagneE97, author = {Les Labuschagne and Jan H. P. Eloff}, title = {Improved system-access control using complementary technologies}, journal = {Comput. Secur.}, volume = {16}, number = {6}, pages = {543--549}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)00007-2}, doi = {10.1016/S0167-4048(97)00007-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LabuschagneE97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Meyer97, author = {John Meyer}, title = {From the editor}, journal = {Comput. Secur.}, volume = {16}, number = {1}, pages = {2--3}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)90001-8}, doi = {10.1016/S0167-4048(97)90001-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Meyer97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Meyer97a, author = {John Meyer}, title = {Professor Harold Joseph Highland FICS, {FACM}}, journal = {Comput. Secur.}, volume = {16}, number = {5}, pages = {350--355}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)82240-7}, doi = {10.1016/S0167-4048(97)82240-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Meyer97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Molini97, author = {James E. Molini}, title = {Electronic borders: Defining and protecting national networks}, journal = {Comput. Secur.}, volume = {16}, number = {3}, pages = {189--196}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)84511-7}, doi = {10.1016/S0167-4048(97)84511-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Molini97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Mulhall97, author = {Tom Mulhall}, title = {Where have all the hackers gone? {A} study in motivation, deterrence, and crime displacement: Part 1 - introduction {\&} methodology}, journal = {Comput. Secur.}, volume = {16}, number = {4}, pages = {277--284}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)80190-3}, doi = {10.1016/S0167-4048(97)80190-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Mulhall97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Mulhall97a, author = {Tom Mulhall}, title = {Where have all the hackers gone?: Part 2 - Frequency of computer related abuse: the surveys, and public perception of the problem}, journal = {Comput. Secur.}, volume = {16}, number = {4}, pages = {285--290}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)80191-5}, doi = {10.1016/S0167-4048(97)80191-5}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Mulhall97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Mulhall97b, author = {Tom Mulhall}, title = {Where have all the hackers gone?: Part 3 - Motivation and deterrence}, journal = {Comput. Secur.}, volume = {16}, number = {4}, pages = {291--297}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)80192-7}, doi = {10.1016/S0167-4048(97)80192-7}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Mulhall97b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Mulhall97c, author = {Tom Mulhall}, title = {Where have all the hackers gone?: Part 4 - Legislation}, journal = {Comput. Secur.}, volume = {16}, number = {4}, pages = {298--303}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)80193-9}, doi = {10.1016/S0167-4048(97)80193-9}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Mulhall97c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Mulhall97d, author = {Tom Mulhall}, title = {Where have all the hackers gone?: Part 5 - Conclusions}, journal = {Comput. Secur.}, volume = {16}, number = {4}, pages = {304--306}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)80194-0}, doi = {10.1016/S0167-4048(97)80194-0}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Mulhall97d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Mulhall97e, author = {Tom Mulhall}, title = {Where have all the hackers gone?: Part 6 - Appendices and bibliography}, journal = {Comput. Secur.}, volume = {16}, number = {4}, pages = {307--315}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)90153-X}, doi = {10.1016/S0167-4048(97)90153-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Mulhall97e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Parker97, author = {Donn B. Parker}, title = {The strategic values of information security in business}, journal = {Comput. Secur.}, volume = {16}, number = {7}, pages = {572--582}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)80793-6}, doi = {10.1016/S0167-4048(97)80793-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Parker97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Pounder97, author = {Chris Pounder}, title = {First steps towards a european union policy on the securing of electronic communications}, journal = {Comput. Secur.}, volume = {16}, number = {7}, pages = {590--594}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)80795-X}, doi = {10.1016/S0167-4048(97)80795-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Pounder97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Ratnasingham97, author = {Pauline Ratnasingham}, title = {{EDI} security - re-evaluation of controls and its implications on the organizations}, journal = {Comput. Secur.}, volume = {16}, number = {8}, pages = {650--656}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)87578-5}, doi = {10.1016/S0167-4048(97)87578-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Ratnasingham97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Sherwood97, author = {John Sherwood}, title = {Managing security for outsourcing contracts}, journal = {Comput. Secur.}, volume = {16}, number = {7}, pages = {603--609}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)80797-3}, doi = {10.1016/S0167-4048(97)80797-3}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Sherwood97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SohD97, author = {Ben Soh and Tharam S. Dillon}, title = {System intrusion processes: a simulation model}, journal = {Comput. Secur.}, volume = {16}, number = {1}, pages = {71--79}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)00001-1}, doi = {10.1016/S0167-4048(97)00001-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SohD97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TetteroOFS97, author = {O. Tettero and D. J. Out and Henry M. Franken and J. Schot}, title = {Information security embedded in the design of telematics systems}, journal = {Comput. Secur.}, volume = {16}, number = {2}, pages = {145--164}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)00003-5}, doi = {10.1016/S0167-4048(97)00003-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TetteroOFS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VolpanoI97, author = {Dennis M. Volpano and Cynthia E. Irvine}, title = {Secure flow typing}, journal = {Comput. Secur.}, volume = {16}, number = {2}, pages = {137--144}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)00002-3}, doi = {10.1016/S0167-4048(97)00002-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VolpanoI97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangH97, author = {Chih{-}Hung Wang and Tzonelih Hwang}, title = {Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication}, journal = {Comput. Secur.}, volume = {16}, number = {4}, pages = {339--344}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)00006-0}, doi = {10.1016/S0167-4048(97)00006-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangH97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wood97, author = {Charles Cresson Wood}, title = {A management view of internet electronic commerce security}, journal = {Comput. Secur.}, volume = {16}, number = {4}, pages = {316--320}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)80195-2}, doi = {10.1016/S0167-4048(97)80195-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wood97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/X97, title = {Random bits {\&} bytes}, journal = {Comput. Secur.}, volume = {16}, number = {5}, pages = {356--364}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)82241-9}, doi = {10.1016/S0167-4048(97)82241-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/X97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/X97a, title = {From the editor}, journal = {Comput. Secur.}, volume = {16}, number = {6}, pages = {452--453}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)84639-1}, doi = {10.1016/S0167-4048(97)84639-1}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/X97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/X97b, title = {From the editor}, journal = {Comput. Secur.}, volume = {16}, number = {7}, pages = {570--571}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)80792-4}, doi = {10.1016/S0167-4048(97)80792-4}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/X97b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/X97c, title = {From the editor}, journal = {Comput. Secur.}, volume = {16}, number = {8}, pages = {648--649}, year = {1997}, url = {https://doi.org/10.1016/S0167-4048(97)87577-3}, doi = {10.1016/S0167-4048(97)87577-3}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/X97c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.