Processing encrypted data (English)
National licence
Niv Ahituv, Yeheskel Lapid, and Seev Neumann
In:
Computers and Security
;
7
, 1
;
103
;
1988
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Processing encrypted data
-
Subtitle:Niv Ahituv, Yeheskel Lapid, and Seev Neumann
-
Published in:Computers and Security ; 7, 1 ; 103
-
Publisher:
-
Publication date:1988-01-01
-
Size:1 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents – Volume 7, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 2
-
Editorial Board| 1988
- 2
-
From the editor| 1988
- 3
-
Case history of a virus attackDr. Highland, Harold Joseph et al. | 1988
- 5
-
Encryption, attacks and ethicsDr. Highland, Harold Joseph et al. | 1988
- 6
-
How to protect a microcomputer systemDr. Highland, Harold Joseph et al. | 1988
- 7
-
Chernobyl computer communicationsDr. Highland, Harold Joseph et al. | 1988
- 9
-
Electromagnetic interferenceDr. Highland, Harold Joseph et al. | 1988
- 10
-
IFIP/Sec '88Dr. Highland, Harold Joseph et al. | 1988
- 10
-
For your informationDr. Highland, Harold Joseph et al. | 1988
- 13
-
Product reviewsDr. Highland, Harold Joseph et al. | 1988
- 19
-
Another perspective on sensitive but unclassified dataCourtney, Robert H. Jr. et al. | 1988
- 25
-
How secure are fiber optics communications?Dr. Highland, Harold Joseph et al. | 1988
- 27
-
Secretdisk II— transparent automatic encryptionDr. Highland, Harold Joseph et al. | 1988
- 35
-
Dial-up communication lines: Can they be secured?Zajac, Bernard P. Jr. et al. | 1988
- 37
-
Program aids for office automation securityDr. Highland,, Harold Joseph et al. | 1988
- 45
-
International board of referees| 1988
- 47
-
Getting started in data processing disaster recoveryMenkus, Belden et al. | 1988
- 53
-
Network security and access controlsAmsel,, Ellen et al. | 1988
- 59
-
Protecting statistical databases against retrieval of private informationAhituv, Niv / Lapid, Yeheskel / Neumann, Seev et al. | 1988
- 65
-
Message authentication and encryption combinedChristoffersson, Per et al. | 1988
- 73
-
Element-level classification with A1 assuranceLunt, Teresa F. / Denning, Dorothy E. / Schell, Roger R. / Heckman, Mark / Shockley, William R. et al. | 1988
- 83
-
A public-key cryptosystem based on language theorySalomaa, Arto et al. | 1988
- 89
-
New locks and keys for electronic information| 1988
- 95
-
IFIP technical committee 11| 1988
- 97
-
World-wide reports on developments in computer security| 1988
- 101
-
Fighting software piracy| 1988
- 101
-
Apple urges separate copyright registration of screen displays| 1988
- 101
-
Guidelines or standards! part one| 1988
- 101
-
Justice Ordered to pay software licensing fees| 1988
- 101
-
Anatomy of a disaster| 1988
- 102
-
Computer crime—What to do before it happens| 1988
- 102
-
Lotus promises new releases, no protection| 1988
- 102
-
German computer hobbyists rifle NASA's files| 1988
- 102
-
MIS computer security slacking| 1988
- 102
-
NASA says classified data not breached| 1988
- 102
-
1-2-3 to go unprotected| 1988
- 102
-
HK raid uncovers autodesk pirates| 1988
- 103
-
Has EDP audit progressed in the last 15 years?Weber, Ron et al. | 1988
- 103
-
Public policy and internal privacy codes| 1988
- 103
-
Report says computers spy on 7 million workers in US| 1988
- 103
-
“Never mind!” businesses cool off on site license issue| 1988
- 103
-
Processing encrypted data| 1988
- 103
-
Tactical planning for data security management| 1988
- 103
-
When the password is a passkeyLewis, Peter H. et al. | 1988
- 104
-
Users see flaws in audit trails, access authorityBozman, Jean S. et al. | 1988
- 104
-
IBM slow to remedy leaky DB2 securityBozman, Jean S. et al. | 1988
- 104
-
North didn't understand delete functionMcDonald, Evelyn C. et al. | 1988
- 104
-
Disaster recovery neededHunter, Philip et al. | 1988
- 104
-
Secure information is accurate informationHargrove, Robert et al. | 1988
- 104
-
The automated cryptananysis of polyalphabetic ciphersCarroll, John M. / Robbins, Lynda et al. | 1988
- 105
-
Analysis of the encryption algorithm used in the wordperfect word processing programBennett, John et al. | 1988
- 105
-
LA sites rockedJones, Stephen / Editors, Senior et al. | 1988
- 105
-
Data errors hurt state department systemGrimm, Vanessa Jo et al. | 1988
- 105
-
OSI security system revealedHorwitt, Elisabeth et al. | 1988
- 105
-
IBM users told data files could have legal pitfallsGoff, Leslie et al. | 1988
- 105
-
New risk management lab will tackle security needsMunro, Neil et al. | 1988
- 105
-
Computer trouble makes British skies unfriendlyHunter, Philip et al. | 1988
- 106
-
LANS introduce new security issuesChandler, Harriette L. et al. | 1988
- 106
-
Encryption standard to get reprieveBetts, Mitch et al. | 1988
- 106
-
Hospital's medical data held in strict security| 1988
- 106
-
Fire and humidity: Data safes protect against bothSopko, Sandra et al. | 1988
- 106
-
Security and office automationWong, Ken et al. | 1988
- 106
-
Security issues concern NSA, vendors| 1988
- 107
-
Fault tolerant computers and multiprocessing. January 1985–June 1987| 1988
- 107
-
In London, stocks up and computers downHunter, Philip et al. | 1988
- 107
-
Today's computer crime: The threat from withinben-Aaron, Diana / Green, Lee et al. | 1988
- 107
-
Development of confidence limits by pivotal functions for estimating software reliability| 1988
- 107
-
In Japan, MIS weathers the storm easilyKo, Dorothy et al. | 1988
- 107
-
After the street's unforgettable week all info systems are (mostly) goCrockett, Barton / Medford, Cassimir J. et al. | 1988
- 108
-
Software still is arriving with those annoying bugsPerry, William E. et al. | 1988
- 108
-
Expert tells DoD it needs training, not more tempestMunro, Neil et al. | 1988
- 108
-
Unclassified security calls for a ‘friendly’ approachMiles, J.B. et al. | 1988
- 108
-
Addresses of publications| 1988
- 108
-
Public-private partners work on secure protocolsMiles, J.B. et al. | 1988
- 111
-
Calendar| 1988