Search dblp for Publications

export results for "toc:db/journals/compsec/compsec18.bht:"

 download as .bib file

@article{DBLP:journals/compsec/Bequai99,
  author       = {August Bequai},
  title        = {Cyber-crime the {US} experience},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {16--18},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80003-0},
  doi          = {10.1016/S0167-4048(99)80003-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Bequai99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Bequai99a,
  author       = {August Bequai},
  title        = {Monitoring employee communications in cyberspace: The pitfalls facing
                  management},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {109--112},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80028-5},
  doi          = {10.1016/S0167-4048(99)80028-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Bequai99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Bequai99b,
  author       = {August Bequai},
  title        = {Employers and the internet: Legal woes and concerns},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {303--306},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80074-1},
  doi          = {10.1016/S0167-4048(99)80074-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Bequai99b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BernaschidR99,
  author       = {Massimo Bernaschi and
                  Elisabetta d'Aiutolo and
                  P. Rughetti},
  title        = {Enforcing network security: a real cease study in a research organization},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {6},
  pages        = {533--543},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80117-5},
  doi          = {10.1016/S0167-4048(99)80117-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BernaschidR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Bontchev99,
  author       = {Vesselin Bontchev},
  title        = {The problems of wordmacro virus upconversion},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {241--255},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80068-6},
  doi          = {10.1016/S0167-4048(99)80068-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Bontchev99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Bulmer99,
  author       = {Garry Bulmer},
  title        = {Encryption - Do or die for {UK} business},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {312--316},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80076-5},
  doi          = {10.1016/S0167-4048(99)80076-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Bulmer99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Buzzard99,
  author       = {Keith Buzzard},
  title        = {Computer security - What should you spend your money on?},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {322--334},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80078-9},
  doi          = {10.1016/S0167-4048(99)80078-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Buzzard99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CaelliDR99,
  author       = {William J. Caelli and
                  Ed Dawson and
                  Scott A. Rea},
  title        = {PKI, elliptic curve cryptography, and digital signatures},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {47--66},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80008-X},
  doi          = {10.1016/S0167-4048(99)80008-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CaelliDR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cohen99,
  author       = {Fred Cohen},
  title        = {Simulating cyber attacks, defences, and consequences},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {6},
  pages        = {479--518},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80115-1},
  doi          = {10.1016/S0167-4048(99)80115-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Cohen99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Collins99,
  author       = {Michael Collins},
  title        = {Telecommunications crime - Part 1},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {7},
  pages        = {577--586},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)82004-5},
  doi          = {10.1016/S0167-4048(99)82004-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Collins99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Collins99a,
  author       = {Michael Collins},
  title        = {Telecommunications crime - Part 2},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {8},
  pages        = {683--692},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80132-1},
  doi          = {10.1016/S0167-4048(99)80132-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Collins99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Devargas99,
  author       = {Mario Devargas},
  title        = {Survival is not compulsory: an introduction to business continuity
                  planning},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {35--46},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80007-8},
  doi          = {10.1016/S0167-4048(99)80007-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Devargas99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DochertyS99,
  author       = {Paul Docherty and
                  Peter Simpson},
  title        = {Macro attacks: What next after Melissa?},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {391--395},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80084-4},
  doi          = {10.1016/S0167-4048(99)80084-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DochertyS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DowlandFIR99,
  author       = {Paul Dowland and
                  Steven Furnell and
                  H. M. Illingworth and
                  Paul L. Reynolds},
  title        = {Computer crime and abuse: {A} survey of public attitudes and awareness},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {8},
  pages        = {715--726},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80135-7},
  doi          = {10.1016/S0167-4048(99)80135-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DowlandFIR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Ford99,
  author       = {Richard Ford},
  title        = {Malware: Troy revisited},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {105--108},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80027-3},
  doi          = {10.1016/S0167-4048(99)80027-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Ford99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Ford99a,
  author       = {Richard Ford},
  title        = {No suprises in Melissa Land},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {300--302},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80073-X},
  doi          = {10.1016/S0167-4048(99)80073-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Ford99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FurnellW99,
  author       = {Steven Furnell and
                  Matthew J. Warren},
  title        = {Computer hacking and cyber terrorism: the real threats in the new
                  millennium?},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {28--34},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80006-6},
  doi          = {10.1016/S0167-4048(99)80006-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FurnellW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Gordon99,
  author       = {Sarah Gordon},
  title        = {Telephone tales},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {120--123},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)90049-4},
  doi          = {10.1016/S0167-4048(99)90049-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Gordon99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hancock99,
  author       = {Bill Hancock},
  title        = {From the editor},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {2--3},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80001-7},
  doi          = {10.1016/S0167-4048(99)80001-7},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Hancock99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hancock99a,
  author       = {Bill Hancock},
  title        = {Elliptical curve cryptography and standards for efficient cryptography
                  group},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {4--15},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80002-9},
  doi          = {10.1016/S0167-4048(99)80002-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hancock99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hancock99b,
  author       = {Bill Hancock},
  title        = {From the editor},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {88--89},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)90007-X},
  doi          = {10.1016/S0167-4048(99)90007-X},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Hancock99b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hancock99c,
  author       = {Bill Hancock},
  title        = {From the editor},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {182--183},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80062-5},
  doi          = {10.1016/S0167-4048(99)80062-5},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Hancock99c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hancock99d,
  author       = {Bill Hancock},
  title        = {From the editor},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {276--277},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80070-4},
  doi          = {10.1016/S0167-4048(99)80070-4},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Hancock99d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hancock99e,
  author       = {Bill Hancock},
  title        = {From the editor},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {370--371},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80082-0},
  doi          = {10.1016/S0167-4048(99)80082-0},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Hancock99e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hancock99f,
  author       = {Bill Hancock},
  title        = {From the editor},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {6},
  pages        = {456--457},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80112-6},
  doi          = {10.1016/S0167-4048(99)80112-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Hancock99f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hancock99g,
  author       = {Bill Hancock},
  title        = {From the editor},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {7},
  pages        = {550--552},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)82000-8},
  doi          = {10.1016/S0167-4048(99)82000-8},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Hancock99g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hancock99h,
  author       = {Bill Hancock},
  title        = {Security views},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {7},
  pages        = {553--564},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)82001-X},
  doi          = {10.1016/S0167-4048(99)82001-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hancock99h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HarrisH99,
  author       = {Brendon Harris and
                  Ray Hunt},
  title        = {Fairwall certification},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {165--177},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80052-2},
  doi          = {10.1016/S0167-4048(99)80052-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HarrisH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hawkins99,
  author       = {Nick Hawkins},
  title        = {Security within multimedia networked conferencing},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {419--422},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80087-X},
  doi          = {10.1016/S0167-4048(99)80087-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hawkins99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde99,
  author       = {Stephen Hinde},
  title        = {One down, one to go},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {19--22},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80004-2},
  doi          = {10.1016/S0167-4048(99)80004-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde99a,
  author       = {Stephen Hinde},
  title        = {Year 2000 update},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {113--119},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80029-7},
  doi          = {10.1016/S0167-4048(99)80029-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde99b,
  author       = {Stephen Hinde},
  title        = {Are you in control?},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {199--203},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80064-9},
  doi          = {10.1016/S0167-4048(99)80064-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde99b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde99c,
  author       = {Stephen Hinde},
  title        = {E for exponential growth},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {295--299},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80072-8},
  doi          = {10.1016/S0167-4048(99)80072-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde99c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde99d,
  author       = {Stephen Hinde},
  title        = {E-mail can seriously damage your health},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {396--406},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80085-6},
  doi          = {10.1016/S0167-4048(99)80085-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde99d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde99e,
  author       = {Stephen Hinde},
  title        = {The bell tolls for the bell-shaped curve: or how hot magnets, species
                  distribution and things that go bump in the air will change our view
                  of risk},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {7},
  pages        = {565--572},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)82002-1},
  doi          = {10.1016/S0167-4048(99)82002-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde99e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde99f,
  author       = {Stephen Hinde},
  title        = {Step into a secure new world - Compsec '99 report},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {8},
  pages        = {660--669},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80130-8},
  doi          = {10.1016/S0167-4048(99)80130-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde99f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hughes99,
  author       = {John Hughes},
  title        = {Certificate inter-operability - white paper},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {221--230},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80067-4},
  doi          = {10.1016/S0167-4048(99)80067-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hughes99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Jarvis99,
  author       = {Neil Jarvis},
  title        = {E-commerce and encryption: Barriers to growth},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {429--431},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80089-3},
  doi          = {10.1016/S0167-4048(99)80089-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Jarvis99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KingP99,
  author       = {R. A. King and
                  T. C. Phipps},
  title        = {Shannon, {TESPAR} and approximation strategies},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {445--453},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80111-4},
  doi          = {10.1016/S0167-4048(99)80111-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KingP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kovacich99,
  author       = {Gerald L. Kovacich},
  title        = {I-way robbery: Crime on the internet},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {211--220},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80066-2},
  doi          = {10.1016/S0167-4048(99)80066-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kovacich99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kovacich99a,
  author       = {Gerald L. Kovacich},
  title        = {Hackers: Freedom fighters of the 21\({}^{\mbox{st}}\) Century},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {7},
  pages        = {573--576},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)82003-3},
  doi          = {10.1016/S0167-4048(99)82003-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kovacich99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kuhnhauser99,
  author       = {Winfried E. K{\"{u}}hnhauser},
  title        = {Policy Groups},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {351--363},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80081-9},
  doi          = {10.1016/S0167-4048(99)80081-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kuhnhauser99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Moreau99,
  author       = {Thierry Moreau},
  title        = {The emergence of a legal framework for electronic transactions},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {423--428},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80088-1},
  doi          = {10.1016/S0167-4048(99)80088-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Moreau99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Nelms99,
  author       = {Chris Nelms},
  title        = {Internet E-mail risks and concerns},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {409--418},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80086-8},
  doi          = {10.1016/S0167-4048(99)80086-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Nelms99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Nosworthy99,
  author       = {Julie D. Nosworthy},
  title        = {{Y2K} contingency planning: Taking {BCM} into the 21\({}^{\mbox{st}}\)
                  century},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {8},
  pages        = {693--704},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80133-3},
  doi          = {10.1016/S0167-4048(99)80133-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Nosworthy99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PeyravianC99,
  author       = {Mohammad Peyravian and
                  Don Coppersmith},
  title        = {A structured symmetric-key block cipher},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {134--147},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)90053-6},
  doi          = {10.1016/S0167-4048(99)90053-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PeyravianC99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PeyravianMRZ99,
  author       = {Mohammad Peyravian and
                  Stephen M. Matyas and
                  Allen Roginsky and
                  Nevenko Zunic},
  title        = {Generating user-based cryptographic keys and random numbers},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {7},
  pages        = {619--626},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)82040-9},
  doi          = {10.1016/S0167-4048(99)82040-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PeyravianMRZ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PeyravianRZ99,
  author       = {Mohammad Peyravian and
                  Allen Roginsky and
                  Nevenko Zunic},
  title        = {Hash-based encryption system},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {345--350},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80080-7},
  doi          = {10.1016/S0167-4048(99)80080-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PeyravianRZ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Pounder99,
  author       = {Chris Pounder},
  title        = {An initial plan of action for compliance with the UK's Data Protection
                  Act 1998},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {23--27},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80005-4},
  doi          = {10.1016/S0167-4048(99)80005-4},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Pounder99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Pounder99a,
  author       = {Chris Pounder},
  title        = {The revised version of {BS7799} - so what's new?},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {307--311},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80075-3},
  doi          = {10.1016/S0167-4048(99)80075-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Pounder99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Preneel99,
  author       = {Bart Preneel},
  title        = {State-of-the-art ciphers for commercial applications},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {67--74},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80009-1},
  doi          = {10.1016/S0167-4048(99)80009-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Preneel99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Ratnasingham99,
  author       = {Pauline Ratnasingham},
  title        = {Implicit trust in the risk assessment process of {EDI}},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {317--321},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80077-7},
  doi          = {10.1016/S0167-4048(99)80077-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Ratnasingham99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Ratnasingham99a,
  author       = {Pauline Ratnasingham},
  title        = {Risks in low trust among trading partners in electronic commerce},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {7},
  pages        = {587--592},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)82005-7},
  doi          = {10.1016/S0167-4048(99)82005-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Ratnasingham99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Richards99,
  author       = {Kevin Richards},
  title        = {Network based intrusion detection: {A} review of technologies},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {8},
  pages        = {671--682},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80131-X},
  doi          = {10.1016/S0167-4048(99)80131-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Richards99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Robb99,
  author       = {David Robb},
  title        = {Developing firewall technology: Hardwall - White paper},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {6},
  pages        = {471--478},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80114-X},
  doi          = {10.1016/S0167-4048(99)80114-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Robb99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schultz99,
  author       = {E. Eugene Schultz},
  title        = {Windows {NT} security: Kudos, concerns, and prescriptions},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {204--210},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80065-0},
  doi          = {10.1016/S0167-4048(99)80065-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Schultz99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schwartau99,
  author       = {Winn Schwartau},
  title        = {Surviving denial of service},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {124--133},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)90051-2},
  doi          = {10.1016/S0167-4048(99)90051-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Schwartau99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SolmsG99,
  author       = {Sebastiaan H. von Solms and
                  J. H. S. Geldenhuys},
  title        = {Managing multi level security in a military intranet environment},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {257--270},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80069-8},
  doi          = {10.1016/S0167-4048(99)80069-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SolmsG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SpinellisGIGK99,
  author       = {Diomidis Spinellis and
                  Stefanos Gritzalis and
                  John Iliadis and
                  Dimitris Gritzalis and
                  Sokratis K. Katsikas},
  title        = {Trusted third party services for deploying secure telemedical applications
                  over the {WWW}},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {7},
  pages        = {627--639},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)82041-0},
  doi          = {10.1016/S0167-4048(99)82041-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SpinellisGIGK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangS99,
  author       = {Wen{-}Her Yang and
                  Shiuh{-}Pyng Shieh},
  title        = {Password authentication schemes with smart cards},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {8},
  pages        = {727--733},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80136-9},
  doi          = {10.1016/S0167-4048(99)80136-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics