2001 | ||
---|---|---|
5 | Richard Barber: The Evolution of Intrusion Detection Systems The Next Step. Computers & Security 20(2): 132-145 (2001) | |
4 | Richard Barber: Security in a Mobile World - is Bluetooth the Answer? Computers & Security 20(5): 374-379 (2001) | |
2000 | ||
3 | Richard Barber: Implementing Public Key Infrastructures in a Dynamic Business Environment. Computers & Security 19(3): 230-233 (2000) | |
2 | Richard Barber: Security in a Mobile World Is Bluetooth the Answer? Computers & Security 19(4): 321-325 (2000) | |
1991 | ||
1 | Richard Barber, George Imlah: Delivering the Goods with Lisp. Commun. ACM 34(9): 61-63 (1991) |
1 | George Imlah | [1] |