- 1993
- Marshall D. Abrams, Edward Amoroso, Leonard J. LaPadula, Teresa F. Lunt, James G. Williams:
Report of an integrity research study group. Comput. Secur. 12(7): 679-689 (1993) - Caroline Allinson, Helen Bergen, Ed Dawson
:
Message collision in block ciphers with message authentication. Comput. Secur. 12(8): 781-787 (1993) - Helen A. Bergen, James M. Hogan:
A chosen plaintext attack on an adaptive arithmetic coding compression algorithm. Comput. Secur. 12(2): 157-167 (1993) - David K. Black:
The Digital Signature Standard: Overview and current status. Comput. Secur. 12(5): 437-446 (1993) - William J. Caelli, Ian G. Graham, Luke O'Connor:
Cryptographic Application Programming Interfaces (APIs). Comput. Secur. 12(7): 640-645 (1993) - Robert A. Clyde:
DECnet security (Not necessarily an oxymoron). Comput. Secur. 12(2): 123-127 (1993) - Frederick B. Cohen:
Operating system protection through program evolution. Comput. Secur. 12(6): 565-584 (1993) - Brian S. Collins
, Steve Mathews:
Securing your business process. Comput. Secur. 12(7): 629-633 (1993) - Steve Donovan:
Security of PCs in a distributed environment. Comput. Secur. 12(1): 28-31 (1993) - Jan H. P. Eloff, Les Labuschagne
, Karin P. Badenhorst:
A comparative framework for risk analysis methods. Comput. Secur. 12(6): 597-603 (1993) - Peter Fagan:
Organizational issues in IT security. Comput. Secur. 12(8): 710-715 (1993) - J. Fernández-González, Gordon B. Agnew, Arturo Ribagorda:
Encryption and error correction codes for reliable file storage. Comput. Secur. 12(5): 501-510 (1993) - John A. Fitch III, Lance J. Hoffman:
A shortest path network security model. Comput. Secur. 12(2): 169-189 (1993) - Dieter Gollmann, Thomas Beth, Frank Damm:
Authentication services in distributed systems. Comput. Secur. 12(8): 753-764 (1993) - Gary Hardy:
Commercial accreditation of information security. Comput. Secur. 12(8): 716-729 (1993) - Edwin B. Heinlein:
Recovery management. Comput. Secur. 12(4): 334-337 (1993) - Edwin B. Heinlein:
World Trade Center - A retrospective. Comput. Secur. 12(5): 435-436 (1993) - Edwin B. Heinlein:
I worked with Murphy. Comput. Secur. 12(7): 627-628 (1993) - Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(1): 4-14 (1993) - Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(2): 106-116 (1993) - Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(3): 216-224 (1993) - Harold Joseph Highland:
Conference report. Comput. Secur. 12(3): 249-253 (1993) - Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(5): 424-433 (1993) - Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(6): 518-526 (1993) - Harold Joseph Highland:
IFIP/Sec '93 conference report. Comput. Secur. 12(6): 550-555 (1993) - Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(7): 612-622 (1993) - Harold Joseph Highland:
A view of information security tomorrow. Comput. Secur. 12(7): 634-639 (1993) - Harold Joseph Highland:
Random bits & bytes. Comput. Secur. 12(8): 698-709 (1993) - Harold Joseph Highland:
16th national computer security conference. Comput. Secur. 12(8): 730-734 (1993) - Judith Hochberg, Kathleen A. Jackson, Cathy A. Stallings, J. F. McClary, David H. DuBois, Josephine Ford:
NADIR: An automated system for detecting network intrusion and misuse. Comput. Secur. 12(3): 235-248 (1993)