Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec18.bht:"
@article{DBLP:journals/compsec/Bequai99, author = {August Bequai}, title = {Cyber-crime the {US} experience}, journal = {Comput. Secur.}, volume = {18}, number = {1}, pages = {16--18}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80003-0}, doi = {10.1016/S0167-4048(99)80003-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Bequai99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Bequai99a, author = {August Bequai}, title = {Monitoring employee communications in cyberspace: The pitfalls facing management}, journal = {Comput. Secur.}, volume = {18}, number = {2}, pages = {109--112}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80028-5}, doi = {10.1016/S0167-4048(99)80028-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Bequai99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Bequai99b, author = {August Bequai}, title = {Employers and the internet: Legal woes and concerns}, journal = {Comput. Secur.}, volume = {18}, number = {4}, pages = {303--306}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80074-1}, doi = {10.1016/S0167-4048(99)80074-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Bequai99b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BernaschidR99, author = {Massimo Bernaschi and Elisabetta d'Aiutolo and P. Rughetti}, title = {Enforcing network security: a real cease study in a research organization}, journal = {Comput. Secur.}, volume = {18}, number = {6}, pages = {533--543}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80117-5}, doi = {10.1016/S0167-4048(99)80117-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BernaschidR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Bontchev99, author = {Vesselin Bontchev}, title = {The problems of wordmacro virus upconversion}, journal = {Comput. Secur.}, volume = {18}, number = {3}, pages = {241--255}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80068-6}, doi = {10.1016/S0167-4048(99)80068-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Bontchev99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Bulmer99, author = {Garry Bulmer}, title = {Encryption - Do or die for {UK} business}, journal = {Comput. Secur.}, volume = {18}, number = {4}, pages = {312--316}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80076-5}, doi = {10.1016/S0167-4048(99)80076-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Bulmer99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Buzzard99, author = {Keith Buzzard}, title = {Computer security - What should you spend your money on?}, journal = {Comput. Secur.}, volume = {18}, number = {4}, pages = {322--334}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80078-9}, doi = {10.1016/S0167-4048(99)80078-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Buzzard99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CaelliDR99, author = {William J. Caelli and Ed Dawson and Scott A. Rea}, title = {PKI, elliptic curve cryptography, and digital signatures}, journal = {Comput. Secur.}, volume = {18}, number = {1}, pages = {47--66}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80008-X}, doi = {10.1016/S0167-4048(99)80008-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CaelliDR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cohen99, author = {Fred Cohen}, title = {Simulating cyber attacks, defences, and consequences}, journal = {Comput. Secur.}, volume = {18}, number = {6}, pages = {479--518}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80115-1}, doi = {10.1016/S0167-4048(99)80115-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Cohen99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Collins99, author = {Michael Collins}, title = {Telecommunications crime - Part 1}, journal = {Comput. Secur.}, volume = {18}, number = {7}, pages = {577--586}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)82004-5}, doi = {10.1016/S0167-4048(99)82004-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Collins99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Collins99a, author = {Michael Collins}, title = {Telecommunications crime - Part 2}, journal = {Comput. Secur.}, volume = {18}, number = {8}, pages = {683--692}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80132-1}, doi = {10.1016/S0167-4048(99)80132-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Collins99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Devargas99, author = {Mario Devargas}, title = {Survival is not compulsory: an introduction to business continuity planning}, journal = {Comput. Secur.}, volume = {18}, number = {1}, pages = {35--46}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80007-8}, doi = {10.1016/S0167-4048(99)80007-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Devargas99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DochertyS99, author = {Paul Docherty and Peter Simpson}, title = {Macro attacks: What next after Melissa?}, journal = {Comput. Secur.}, volume = {18}, number = {5}, pages = {391--395}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80084-4}, doi = {10.1016/S0167-4048(99)80084-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DochertyS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DowlandFIR99, author = {Paul Dowland and Steven Furnell and H. M. Illingworth and Paul L. Reynolds}, title = {Computer crime and abuse: {A} survey of public attitudes and awareness}, journal = {Comput. Secur.}, volume = {18}, number = {8}, pages = {715--726}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80135-7}, doi = {10.1016/S0167-4048(99)80135-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DowlandFIR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Ford99, author = {Richard Ford}, title = {Malware: Troy revisited}, journal = {Comput. Secur.}, volume = {18}, number = {2}, pages = {105--108}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80027-3}, doi = {10.1016/S0167-4048(99)80027-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Ford99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Ford99a, author = {Richard Ford}, title = {No suprises in Melissa Land}, journal = {Comput. Secur.}, volume = {18}, number = {4}, pages = {300--302}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80073-X}, doi = {10.1016/S0167-4048(99)80073-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Ford99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FurnellW99, author = {Steven Furnell and Matthew J. Warren}, title = {Computer hacking and cyber terrorism: the real threats in the new millennium?}, journal = {Comput. Secur.}, volume = {18}, number = {1}, pages = {28--34}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80006-6}, doi = {10.1016/S0167-4048(99)80006-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FurnellW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Gordon99, author = {Sarah Gordon}, title = {Telephone tales}, journal = {Comput. Secur.}, volume = {18}, number = {2}, pages = {120--123}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)90049-4}, doi = {10.1016/S0167-4048(99)90049-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Gordon99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hancock99, author = {Bill Hancock}, title = {From the editor}, journal = {Comput. Secur.}, volume = {18}, number = {1}, pages = {2--3}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80001-7}, doi = {10.1016/S0167-4048(99)80001-7}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Hancock99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hancock99a, author = {Bill Hancock}, title = {Elliptical curve cryptography and standards for efficient cryptography group}, journal = {Comput. Secur.}, volume = {18}, number = {1}, pages = {4--15}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80002-9}, doi = {10.1016/S0167-4048(99)80002-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hancock99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hancock99b, author = {Bill Hancock}, title = {From the editor}, journal = {Comput. Secur.}, volume = {18}, number = {2}, pages = {88--89}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)90007-X}, doi = {10.1016/S0167-4048(99)90007-X}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Hancock99b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hancock99c, author = {Bill Hancock}, title = {From the editor}, journal = {Comput. Secur.}, volume = {18}, number = {3}, pages = {182--183}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80062-5}, doi = {10.1016/S0167-4048(99)80062-5}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Hancock99c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hancock99d, author = {Bill Hancock}, title = {From the editor}, journal = {Comput. Secur.}, volume = {18}, number = {4}, pages = {276--277}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80070-4}, doi = {10.1016/S0167-4048(99)80070-4}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Hancock99d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hancock99e, author = {Bill Hancock}, title = {From the editor}, journal = {Comput. Secur.}, volume = {18}, number = {5}, pages = {370--371}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80082-0}, doi = {10.1016/S0167-4048(99)80082-0}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Hancock99e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hancock99f, author = {Bill Hancock}, title = {From the editor}, journal = {Comput. Secur.}, volume = {18}, number = {6}, pages = {456--457}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80112-6}, doi = {10.1016/S0167-4048(99)80112-6}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Hancock99f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hancock99g, author = {Bill Hancock}, title = {From the editor}, journal = {Comput. Secur.}, volume = {18}, number = {7}, pages = {550--552}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)82000-8}, doi = {10.1016/S0167-4048(99)82000-8}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Hancock99g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hancock99h, author = {Bill Hancock}, title = {Security views}, journal = {Comput. Secur.}, volume = {18}, number = {7}, pages = {553--564}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)82001-X}, doi = {10.1016/S0167-4048(99)82001-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hancock99h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HarrisH99, author = {Brendon Harris and Ray Hunt}, title = {Fairwall certification}, journal = {Comput. Secur.}, volume = {18}, number = {2}, pages = {165--177}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80052-2}, doi = {10.1016/S0167-4048(99)80052-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HarrisH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hawkins99, author = {Nick Hawkins}, title = {Security within multimedia networked conferencing}, journal = {Comput. Secur.}, volume = {18}, number = {5}, pages = {419--422}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80087-X}, doi = {10.1016/S0167-4048(99)80087-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hawkins99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde99, author = {Stephen Hinde}, title = {One down, one to go}, journal = {Comput. Secur.}, volume = {18}, number = {1}, pages = {19--22}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80004-2}, doi = {10.1016/S0167-4048(99)80004-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde99a, author = {Stephen Hinde}, title = {Year 2000 update}, journal = {Comput. Secur.}, volume = {18}, number = {2}, pages = {113--119}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80029-7}, doi = {10.1016/S0167-4048(99)80029-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde99b, author = {Stephen Hinde}, title = {Are you in control?}, journal = {Comput. Secur.}, volume = {18}, number = {3}, pages = {199--203}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80064-9}, doi = {10.1016/S0167-4048(99)80064-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde99b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde99c, author = {Stephen Hinde}, title = {E for exponential growth}, journal = {Comput. Secur.}, volume = {18}, number = {4}, pages = {295--299}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80072-8}, doi = {10.1016/S0167-4048(99)80072-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde99c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde99d, author = {Stephen Hinde}, title = {E-mail can seriously damage your health}, journal = {Comput. Secur.}, volume = {18}, number = {5}, pages = {396--406}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80085-6}, doi = {10.1016/S0167-4048(99)80085-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde99d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde99e, author = {Stephen Hinde}, title = {The bell tolls for the bell-shaped curve: or how hot magnets, species distribution and things that go bump in the air will change our view of risk}, journal = {Comput. Secur.}, volume = {18}, number = {7}, pages = {565--572}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)82002-1}, doi = {10.1016/S0167-4048(99)82002-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde99e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hinde99f, author = {Stephen Hinde}, title = {Step into a secure new world - Compsec '99 report}, journal = {Comput. Secur.}, volume = {18}, number = {8}, pages = {660--669}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80130-8}, doi = {10.1016/S0167-4048(99)80130-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hinde99f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hughes99, author = {John Hughes}, title = {Certificate inter-operability - white paper}, journal = {Comput. Secur.}, volume = {18}, number = {3}, pages = {221--230}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80067-4}, doi = {10.1016/S0167-4048(99)80067-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hughes99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Jarvis99, author = {Neil Jarvis}, title = {E-commerce and encryption: Barriers to growth}, journal = {Comput. Secur.}, volume = {18}, number = {5}, pages = {429--431}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80089-3}, doi = {10.1016/S0167-4048(99)80089-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Jarvis99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KingP99, author = {R. A. King and T. C. Phipps}, title = {Shannon, {TESPAR} and approximation strategies}, journal = {Comput. Secur.}, volume = {18}, number = {5}, pages = {445--453}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80111-4}, doi = {10.1016/S0167-4048(99)80111-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KingP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kovacich99, author = {Gerald L. Kovacich}, title = {I-way robbery: Crime on the internet}, journal = {Comput. Secur.}, volume = {18}, number = {3}, pages = {211--220}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80066-2}, doi = {10.1016/S0167-4048(99)80066-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kovacich99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kovacich99a, author = {Gerald L. Kovacich}, title = {Hackers: Freedom fighters of the 21\({}^{\mbox{st}}\) Century}, journal = {Comput. Secur.}, volume = {18}, number = {7}, pages = {573--576}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)82003-3}, doi = {10.1016/S0167-4048(99)82003-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kovacich99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kuhnhauser99, author = {Winfried E. K{\"{u}}hnhauser}, title = {Policy Groups}, journal = {Comput. Secur.}, volume = {18}, number = {4}, pages = {351--363}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80081-9}, doi = {10.1016/S0167-4048(99)80081-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kuhnhauser99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Moreau99, author = {Thierry Moreau}, title = {The emergence of a legal framework for electronic transactions}, journal = {Comput. Secur.}, volume = {18}, number = {5}, pages = {423--428}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80088-1}, doi = {10.1016/S0167-4048(99)80088-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Moreau99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Nelms99, author = {Chris Nelms}, title = {Internet E-mail risks and concerns}, journal = {Comput. Secur.}, volume = {18}, number = {5}, pages = {409--418}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80086-8}, doi = {10.1016/S0167-4048(99)80086-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Nelms99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Nosworthy99, author = {Julie D. Nosworthy}, title = {{Y2K} contingency planning: Taking {BCM} into the 21\({}^{\mbox{st}}\) century}, journal = {Comput. Secur.}, volume = {18}, number = {8}, pages = {693--704}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80133-3}, doi = {10.1016/S0167-4048(99)80133-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Nosworthy99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PeyravianC99, author = {Mohammad Peyravian and Don Coppersmith}, title = {A structured symmetric-key block cipher}, journal = {Comput. Secur.}, volume = {18}, number = {2}, pages = {134--147}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)90053-6}, doi = {10.1016/S0167-4048(99)90053-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PeyravianC99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PeyravianMRZ99, author = {Mohammad Peyravian and Stephen M. Matyas and Allen Roginsky and Nevenko Zunic}, title = {Generating user-based cryptographic keys and random numbers}, journal = {Comput. Secur.}, volume = {18}, number = {7}, pages = {619--626}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)82040-9}, doi = {10.1016/S0167-4048(99)82040-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PeyravianMRZ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PeyravianRZ99, author = {Mohammad Peyravian and Allen Roginsky and Nevenko Zunic}, title = {Hash-based encryption system}, journal = {Comput. Secur.}, volume = {18}, number = {4}, pages = {345--350}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80080-7}, doi = {10.1016/S0167-4048(99)80080-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PeyravianRZ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Pounder99, author = {Chris Pounder}, title = {An initial plan of action for compliance with the UK's Data Protection Act 1998}, journal = {Comput. Secur.}, volume = {18}, number = {1}, pages = {23--27}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80005-4}, doi = {10.1016/S0167-4048(99)80005-4}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Pounder99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Pounder99a, author = {Chris Pounder}, title = {The revised version of {BS7799} - so what's new?}, journal = {Comput. Secur.}, volume = {18}, number = {4}, pages = {307--311}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80075-3}, doi = {10.1016/S0167-4048(99)80075-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Pounder99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Preneel99, author = {Bart Preneel}, title = {State-of-the-art ciphers for commercial applications}, journal = {Comput. Secur.}, volume = {18}, number = {1}, pages = {67--74}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80009-1}, doi = {10.1016/S0167-4048(99)80009-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Preneel99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Ratnasingham99, author = {Pauline Ratnasingham}, title = {Implicit trust in the risk assessment process of {EDI}}, journal = {Comput. Secur.}, volume = {18}, number = {4}, pages = {317--321}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80077-7}, doi = {10.1016/S0167-4048(99)80077-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Ratnasingham99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Ratnasingham99a, author = {Pauline Ratnasingham}, title = {Risks in low trust among trading partners in electronic commerce}, journal = {Comput. Secur.}, volume = {18}, number = {7}, pages = {587--592}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)82005-7}, doi = {10.1016/S0167-4048(99)82005-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Ratnasingham99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Richards99, author = {Kevin Richards}, title = {Network based intrusion detection: {A} review of technologies}, journal = {Comput. Secur.}, volume = {18}, number = {8}, pages = {671--682}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80131-X}, doi = {10.1016/S0167-4048(99)80131-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Richards99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Robb99, author = {David Robb}, title = {Developing firewall technology: Hardwall - White paper}, journal = {Comput. Secur.}, volume = {18}, number = {6}, pages = {471--478}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80114-X}, doi = {10.1016/S0167-4048(99)80114-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Robb99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schultz99, author = {E. Eugene Schultz}, title = {Windows {NT} security: Kudos, concerns, and prescriptions}, journal = {Comput. Secur.}, volume = {18}, number = {3}, pages = {204--210}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80065-0}, doi = {10.1016/S0167-4048(99)80065-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Schultz99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schwartau99, author = {Winn Schwartau}, title = {Surviving denial of service}, journal = {Comput. Secur.}, volume = {18}, number = {2}, pages = {124--133}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)90051-2}, doi = {10.1016/S0167-4048(99)90051-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Schwartau99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SolmsG99, author = {Sebastiaan H. von Solms and J. H. S. Geldenhuys}, title = {Managing multi level security in a military intranet environment}, journal = {Comput. Secur.}, volume = {18}, number = {3}, pages = {257--270}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80069-8}, doi = {10.1016/S0167-4048(99)80069-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SolmsG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SpinellisGIGK99, author = {Diomidis Spinellis and Stefanos Gritzalis and John Iliadis and Dimitris Gritzalis and Sokratis K. Katsikas}, title = {Trusted third party services for deploying secure telemedical applications over the {WWW}}, journal = {Comput. Secur.}, volume = {18}, number = {7}, pages = {627--639}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)82041-0}, doi = {10.1016/S0167-4048(99)82041-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SpinellisGIGK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangS99, author = {Wen{-}Her Yang and Shiuh{-}Pyng Shieh}, title = {Password authentication schemes with smart cards}, journal = {Comput. Secur.}, volume = {18}, number = {8}, pages = {727--733}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80136-9}, doi = {10.1016/S0167-4048(99)80136-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.