Volume 17,
Number 1,
1998
Volume 17,
Number 2,
1998
Volume 17,
Number 3,
1998
- Bill Hancock:
From the editor.
190-191
Electronic Edition (link) BibTeX
- Bill Hancock:
Security Views.
192-200
Electronic Edition (link) BibTeX
- Nicky Maddison:
Y2000 enters the body politic.
201-206
Electronic Edition (link) BibTeX
- Stephen Hinde:
Recent security surveys.
207-210
Electronic Edition (link) BibTeX
- Fred Cohen, Cynthia A. Phillips, Laura Painton Swiler, Timothy Gaylor, Patricia Leary, Fran Rupley, Richard Isler:
A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID.
211-221
Electronic Edition (link) BibTeX
- Gert van der Merwe, Jan H. P. Eloff:
Software source code, visual risk analysis: an example.
233-252
Electronic Edition (link) BibTeX
- Tom Coffey, T. Newe:
Realisation of a minimum-knowledge identification and signature scheme.
253-264
Electronic Edition (link) BibTeX
- Mike Matyas, Mohammad Peyravian, Allen Roginsky, Nevenko Zunic:
Reversible data mixing procedure for efficient public-key encryption.
265-272
Electronic Edition (link) BibTeX
Volume 17,
Number 4,
1998
Volume 17,
Number 5,
1998
Volume 17,
Number 6,
1998
Volume 17,
Number 7,
1998
Volume 17,
Number 8,
1998
Copyright © Sat May 16 23:53:40 2009
by Michael Ley (ley@uni-trier.de)