![]() |
| 2002 | ||
|---|---|---|
| 2 | EE | John Rollason, Tom Addison, Kim Munro: IS Security: User Identification and Authentication - The First Pillar of IS Security. ISSA 2002: 1-15 |
| 1 | EE | Kim Munro: Steganography - is it becoming a double-edged sword in computer security? ISSA 2002: 1-17 |
| 1 | Tom Addison | [2] |
| 2 | John Rollason | [2] |