![](/images/ico/ico_close.png)
![](/images/ico/ico3.png)
Publisher: Elsevier
Founded in: 1982
Total resources: 2
E-ISSN: 1872-6208
ISSN: 0167-4048
Subject: TP3 Computers
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Computers and Security
Menu
![](/images/ico/ico5.png)
Setting up an electronic evidence forensics laboratory
Computers and Security , Vol. 22, Iss. 8, 2003-12 , pp.![](/images/ico/ico5.png)
The availability of source code in relation to timely response to security vulnerabilities
By Reinke J., Saiedian H. in (2003)
Computers and Security , Vol. 22, Iss. 8, 2003-12 , pp.![](/images/ico/ico5.png)
Information security and the media
Computers and Security , Vol. 22, Iss. 8, 2003-12 , pp.![](/images/ico/ico5.png)
![](/images/ico/ico5.png)
Attacks on the (enhanced) Yang-Shieh authentication
By Chen K.-F., China P.R., Zhong h. in (2003)
Computers and Security , Vol. 22, Iss. 8, 2003-12 , pp.![](/images/ico/ico5.png)
Efficient anonymous auction protocols with freewheeling bids
By Chang C.-C., Chang Y.-F. in (2003)
Computers and Security , Vol. 22, Iss. 8, 2003-12 , pp.![](/images/ico/ico5.png)
Security and human computer interfaces
By Johnston J., Eloff J.H.P., Labuschagne L. in (2003)
Computers and Security , Vol. 22, Iss. 8, 2003-12 , pp.![](/images/ico/ico5.png)
Computer security - Mapping the future
Computers and Security , Vol. 22, Iss. 8, 2003-12 , pp.![](/images/ico/ico5.png)
Improving user security behaviour
Computers and Security , Vol. 22, Iss. 8, 2003-12 , pp.![](/images/ico/ico5.png)
Cryptanalysis of an enhanced timestamp-based password authentication scheme
By Wang B., Li J.-H., Tong Z.-P. in (2003)
Computers and Security , Vol. 22, Iss. 7, 2003-10 , pp.