Volume 14, Number 1, 1995
Volume 14, Number 2, 1995
Volume 14, Number 3, 1995
, Martin Smith
: Risk management & corporate security: A viable leadership and business solution designed to enhance corporations in the emerging marketplace.
: Biometrics, is it a viable proposition for identity authentication and access control?
Volume 14, Number 4, 1995
Charles Cresson Wood
: Shifting information systems security responsibility from user organizations to vendor/publisher organizations.
Simon J. Shepherd
: A high speed software implementation of the Data Encryption Standard.
Volume 14, Number 5, 1995
: Deficiencies of the traditional approach to information security and the requirements for a new methodology.
: Dynamic authentication for smartcards.
: Technologically enabled crime: Shifting paradigms for the Year 2000.
Volume 14, Number 6, 1995
Alan R. Krull
: Controls in the next millennium: Anticipating the IT-enabled future.
: Open systems security: Traps and pitfalls.
: The need for decentralization and privacy in mobile communications networks.
Volume 14, Number 7, 1995
Fred de Koning
: A methodology for the design of security plans.
Volume 14, Number 8, 1995
Rebecca J. Duncan
: There are some cracks in the cornerstone of information security.