![]() | ![]() |
2002 | ||
---|---|---|
2 | EE | John Rollason, Tom Addison, Kim Munro: IS Security: User Identification and Authentication - The First Pillar of IS Security. ISSA 2002: 1-15 |
1 | EE | Kim Munro: Steganography - is it becoming a double-edged sword in computer security? ISSA 2002: 1-17 |
1 | Tom Addison | [2] |
2 | John Rollason | [2] |