Volume 13,
Number 1,
February 1994
Volume 13,
Number 2,
April 1994
Volume 13,
Number 3,
May 1994
Volume 13,
Number 4,
1994
Volume 13,
Number 5,
1994
Volume 13,
Number 6,
1994
Volume 13,
Number 7,
1994
Volume 13,
Number 8,
1994
- Harold Joseph Highland:
Random bits & bytes.
622-627 BibTeX
- Jon Ølnes:
Development of security policies.
628-636
Electronic Edition (link) BibTeX
- Ken Lindup:
The cyberpunk age.
637-645 BibTeX
- Francesco Gentile, Luigi Giuri, Franco Guida, Emilio Montolivo, Michele Volpe:
Security evaluation in information technology standards.
647-650
Electronic Edition (link) BibTeX
- Imtiaz Mohammed, David M. Dilts:
Design for dynamic user-role-based security.
661-671
Electronic Edition (link) BibTeX
- Sebastiaan H. von Solms, Isak van der Merwe:
The management of computer security profiles using a role-oriented approach.
673-680
Electronic Edition (link) BibTeX
- Chin-Chen Chang, Jao-Ji Shen, Tzong-Chen Wu:
Access control with binary keys.
681-686
Electronic Edition (link) BibTeX
- Helen Gustafson, Edward P. Dawson, Lauren Nielsen, William J. Caelli:
A computer package for measuring the strength of encryption algorithms.
687-697
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:53:39 2009
by Michael Ley (ley@uni-trier.de)