Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.04",
%%%     date            = "26 December 2021",
%%%     time            = "08:47:44 MST",
%%%     filename        = "network-security.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "52288 95288 315178 3682597",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                       beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX: Network Security",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        journal Network Security (CODEN NTSCF5, ISSN
%%%                        1353-4858 (print), 1872-9371 (electronic)),
%%%                        published by Elsevier.  Publication began
%%%                        with volume 1994, number 6, in June 1994, and
%%%                        the journal appears monthly.
%%%
%%%                        The journal has a Web site at
%%%
%%%                            https://www.sciencedirect.com/journal/network-security
%%%
%%%                        At version 1.04, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             1994 ( 127)    2004 ( 161)    2014 ( 125)
%%%                             1995 ( 283)    2005 ( 143)    2015 ( 127)
%%%                             1996 ( 241)    2006 ( 134)    2016 ( 119)
%%%                             1997 ( 252)    2007 ( 118)    2017 ( 126)
%%%                             1998 ( 213)    2008 ( 134)    2018 ( 129)
%%%                             1999 ( 199)    2009 ( 134)    2019 ( 146)
%%%                             2000 ( 267)    2010 ( 129)    2020 ( 144)
%%%                             2001 ( 258)    2011 ( 133)    2021 (  32)
%%%                             2002 ( 193)    2012 ( 115)
%%%                             2003 ( 164)    2013 ( 129)
%%%
%%%                             Article:       4475
%%%
%%%                             Total entries: 4475
%%%
%%%                        The initial draft of this bibliography was
%%%                        constructed primarily from data at the
%%%                        publisher Web site.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        Spelling has been verified with the UNIX
%%%                        spell and GNU ispell programs using the
%%%                        exception dictionary stored in the
%%%                        companion with extension .sok.  Numerous
%%%                        heuristic checks on the validity of the
%%%                        bibliography files have also been made
%%%                        using software developed by the author for
%%%                        maintenance of the TeX Users Group and
%%%                        BibNet bibliography collections.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\hyphenation{
    }" #
    "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-NETWORK-SECURITY      = "Network Security"}

%%% ====================================================================
%%% Bibliography entries, sorted in publication order with ``bibsort
%%% -byvolume':
@Article{Steffora:1994:UEC,
  author =       "Ann Steffora",
  title =        "User education critical to effective network
                 security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "2--2",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900280",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Steffora:1994:ICM,
  author =       "Ann Steffora",
  title =        "{Internet} community has many ways to handle security
                 infringements",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "3--3",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900299",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:FFC,
  author =       "Anonymous",
  title =        "Flaw found in {Clipper} technology",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "3--4",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900302",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:J,
  author =       "Anonymous",
  title =        "Junkie",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "4--4",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900310",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:WDS,
  author =       "Anonymous",
  title =        "Wireless data services take-off",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "4--4",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900329",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:MDC,
  author =       "Anonymous",
  title =        "Mobile data comms market sees rapid growth",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "4--5",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900337",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:UIP,
  author =       "Anonymous",
  title =        "{UK} invests in photonics",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "5--5",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900345",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:NDF,
  author =       "Anonymous",
  title =        "{Nynex} develops fibre-optic infrastracture",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "5--5",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900353",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:PUP,
  author =       "Anonymous",
  title =        "{Proginet} unveils plan to link {IBM} mainframes to
                 {Netware}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "5--5",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900361",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:ULP,
  author =       "Anonymous",
  title =        "{US} legislature pushes for uniform online health
                 privacy rules",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "5--6",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589490037X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:ERB,
  author =       "Anonymous",
  title =        "Encryption restrictions bind manufacturer's hands",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "6--6",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900388",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:EC,
  author =       "Anonymous",
  title =        "Electronic cash",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "6--6",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900396",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:CC,
  author =       "Anonymous",
  title =        "{CyberSAFE Challenger 5.2.1}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "7--7",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589490040X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:SSS,
  author =       "Anonymous",
  title =        "{SDI} secures {Shiva LANs}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "7--7",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900418",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:SM,
  author =       "Anonymous",
  title =        "Security manager",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "7--7",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900426",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:INS,
  author =       "Anonymous",
  title =        "Increased {NetSP} security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "7--7",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900434",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Michaels:1994:LUL,
  author =       "Steven Michaels",
  title =        "{LAN} users are lax on security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "8--8",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900442",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Riggs:1994:COC,
  author =       "Brian Riggs",
  title =        "Cracking down on online crime",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "8--8",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900450",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Highland:1994:HSD,
  author =       "Harold Joseph Highland",
  title =        "How secure is data over the {Internet}?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "9--11",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900469",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Peterson:1994:FMT,
  author =       "Padgett Peterson",
  title =        "The fortress mentality: Its time has come again",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "12--13",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900477",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hancock:1994:IPS,
  author =       "William M. Hancock",
  title =        "Issues and problems in secure remote access",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "14--18",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900485",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Lindup:1994:TRH,
  author =       "Ken Lindup",
  title =        "Is there a role for hackers in polite society?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "6",
  pages =        "19--19",
  month =        jun,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:17 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900493",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Armstrong:1994:PNS,
  author =       "Lisa Armstrong",
  title =        "Are public networks safe?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "7",
  pages =        "2--2",
  month =        jul,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:19 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900019",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Snell:1994:PIN,
  author =       "Monica Snell",
  title =        "Protecting the internal network",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "7",
  pages =        "2--2",
  month =        jul,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:19 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900027",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{English:1994:CNI,
  author =       "Erin English",
  title =        "Cache of nude images found at nuclear weapons lab",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "7",
  pages =        "2--3",
  month =        jul,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:19 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900035",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Snell:1994:UUI,
  author =       "Monica Snell",
  title =        "Users upset over {Internet} ads",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "7",
  pages =        "3--3",
  month =        jul,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:19 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900043",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:CCD,
  author =       "Anonymous",
  title =        "Changes to come for {DCS}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "7",
  pages =        "3--4",
  month =        jul,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:19 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900051",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:LMO,
  author =       "Anonymous",
  title =        "{LAN} mail to overtake host mail",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "7",
  pages =        "4--4",
  month =        jul,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:19 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589490006X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:NPS,
  author =       "Anonymous",
  title =        "{Novell} and {PC} security collaborate",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "7",
  pages =        "4--4",
  month =        jul,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:19 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900078",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:CAM,
  author =       "Anonymous",
  title =        "Communications available to more countries",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "7",
  pages =        "4--4",
  month =        jul,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:19 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900086",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Snell:1994:LNI,
  author =       "Monica Snell",
  title =        "{Lotus} notes the {Internet} advantage",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "7",
  pages =        "4--5",
  month =        jul,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:19 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900094",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Armstrong:1994:SN,
  author =       "Lisa Armstrong",
  title =        "A sparekey to {Netware}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "7",
  pages =        "5--5",
  month =        jul,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:19 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900108",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Lawrence:1994:SCS,
  author =       "L. G. Lawrence",
  title =        "Security in a client server environment",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "7",
  pages =        "5--15",
  month =        jul,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:19 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900116",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Gordon:1994:SSH,
  author =       "S. Gordon and I. Nedelchev",
  title =        "Sniffing in the sun: History of a disaster",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "7",
  pages =        "16--19",
  month =        jul,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:19 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900124",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:Ea,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "7",
  pages =        "20--20",
  month =        jul,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:19 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900132",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:UCC,
  author =       "Anonymous",
  title =        "{US} companies count {Internet} security options",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "2--2",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900736",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:SCI,
  author =       "Anonymous",
  title =        "Security for commerce on the {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "2--2",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900744",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:RCS,
  author =       "Anonymous",
  title =        "Ring of crime in {Scotland}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "2--3",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900752",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:CMI,
  author =       "Anonymous",
  title =        "{CIA} to mine {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "3--3",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900760",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:IVC,
  author =       "Anonymous",
  title =        "{IBM}'s virus collection grows",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "3--3",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900779",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:RNT,
  author =       "Anonymous",
  title =        "Rise in number of teleworkers",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "4--4",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900787",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:HWD,
  author =       "Anonymous",
  title =        "Home workers demand {ISDN}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "4--4",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900795",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:MPN,
  author =       "Anonymous",
  title =        "Mobile phone network promoted",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "4--4",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900809",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:HRO,
  author =       "Anonymous",
  title =        "High-rise optic links",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "4--4",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900817",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:FRS,
  author =       "Anonymous",
  title =        "Fund raising for satellite phone system",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "4--5",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900825",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:IRL,
  author =       "Anonymous",
  title =        "Improved remote {LAN} access",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "5--5",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900833",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:SAC,
  author =       "Anonymous",
  title =        "Secure access for councillors",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "5--5",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900841",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:RLO,
  author =       "Anonymous",
  title =        "{Raxco} launches {\tt omniguard}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "5--5",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589490085X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:NFS,
  author =       "Anonymous",
  title =        "New firewall server launched",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "5--5",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900868",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:BAN,
  author =       "Anonymous",
  title =        "{Bell Atlantic} network delayed",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "5--6",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900876",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:RN,
  author =       "Anonymous",
  title =        "Revamping the net!",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "6--6",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900884",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:PME,
  author =       "Anonymous",
  title =        "{PGP} misconceptions explained",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "6--6",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900892",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:CPFa,
  author =       "Anonymous",
  title =        "Cellular phone fraud",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "7--10",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900906",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hancock:1994:IF,
  author =       "Bill Hancock",
  title =        "{Internet} firewalls",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "10--11",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900914",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Peterson:1994:FMP,
  author =       "Padgett Peterson",
  title =        "The fortress mentality --- {Part II}: The {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "11--14",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900922",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Ongetta:1994:EP,
  author =       "Silvano Ongetta",
  title =        "Effectiveness of passwords",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "14--17",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900930",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Schifreen:1994:WMH,
  author =       "Robert Schifreen",
  title =        "What motivates a hacker?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "17--19",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900949",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:Eb,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "8",
  pages =        "19--20",
  month =        aug,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:20 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900957",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:HTC,
  author =       "Anonymous",
  title =        "High-tech calling-card number theft",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "2--2",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901554",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:BBO,
  author =       "Anonymous",
  title =        "{Bulletin} board operators fined for piracy",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "2--2",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901562",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:OP,
  author =       "Anonymous",
  title =        "Online privacy",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "2--2",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901570",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:IBH,
  author =       "Anonymous",
  title =        "The {Internet} becomes the high seas of piracy",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "2--3",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901589",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:CCP,
  author =       "Anonymous",
  title =        "Combatting cellular phone fraud",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "3--3",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901597",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:UGW,
  author =       "Anonymous",
  title =        "{US} government wiretapping updated",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "3--3",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901600",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:SHO,
  author =       "Anonymous",
  title =        "Self-healing optical networks",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "3--4",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901619",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:NUD,
  author =       "Anonymous",
  title =        "New {UK} data protection registrar",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "4--4",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901627",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:NJ,
  author =       "Anonymous",
  title =        "Net judges",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "4--4",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901635",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:AVU,
  author =       "Anonymous",
  title =        "{Australian} virus update",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "4--5",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901643",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:UMM,
  author =       "Anonymous",
  title =        "{UK} messaging market commandeered",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "5--5",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901651",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:GTG,
  author =       "Anonymous",
  title =        "Global telecoms growth",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "5--5",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589490166X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:TIS,
  author =       "Anonymous",
  title =        "{Taiwan} invests in the superhighway era",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "5--5",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901678",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:HSO,
  author =       "Anonymous",
  title =        "High-speed optical test bed",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "5--5",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901686",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:BBC,
  author =       "Anonymous",
  title =        "{Baby Bells} commit to multimedia",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "5--6",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901694",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:ECD,
  author =       "Anonymous",
  title =        "{Ericsson} cooperates with {DynaSoft} on security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "6--6",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901708",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:MTA,
  author =       "Anonymous",
  title =        "{Microsoft} and {Telekom} announce multimedia
                 venture",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "6--6",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901716",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:VPS,
  author =       "Anonymous",
  title =        "Virus protection system for networks",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "6--6",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901724",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:NAN,
  author =       "Anonymous",
  title =        "{Norton} administrator for networks 1.5",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "6--6",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901732",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cheek:1994:SHK,
  author =       "Martin Cheek",
  title =        "{Sidewinder} helps keep {Internet} better secured",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "6--7",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901740",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Snell:1994:PBM,
  author =       "Monica Snell",
  title =        "Policies bring more security to E-mail",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "7--7",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901759",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hancock:1994:HPM,
  author =       "Bill Hancock",
  title =        "Hazards of promiscuous mode programming",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "8--9",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901767",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hruska:1994:VCN,
  author =       "Jan Hruska",
  title =        "Virus control on networks: Solving the unsolvable",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "10--13",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901775",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hansen:1994:UND,
  author =       "Lesley Hansen",
  title =        "Use of network design to reduce security risks",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "13--17",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901783",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Schifreen:1994:PSP,
  author =       "Robert Schifreen",
  title =        "Preventing software piracy",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "17--19",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901791",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:Ed,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "9",
  pages =        "20--20",
  month =        sep,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:21 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901805",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:SLB,
  author =       "Anonymous",
  title =        "Security leak at {BT}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "2--2",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900507",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:CAS,
  author =       "Anonymous",
  title =        "Computer abuse surveys",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "2--2",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900515",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:ILF,
  author =       "Anonymous",
  title =        "{Internet} liberation front",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "2--3",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900523",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:PCH,
  author =       "Anonymous",
  title =        "Pressure to charge hacker",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "3--3",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900531",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:CPFb,
  author =       "Anonymous",
  title =        "Cellular phone fraud arrest",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "3--3",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589490054X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:IPS,
  author =       "Anonymous",
  title =        "{Internet} pirates sale again",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "3--4",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900558",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:NEI,
  author =       "Anonymous",
  title =        "Nationwide {EDI} for {India}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "4--4",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900566",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:TGF,
  author =       "Anonymous",
  title =        "{Toronto} gets {Free-Net}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "4--4",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900574",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:MLN,
  author =       "Anonymous",
  title =        "{Microsoft} launch new online service",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "4--4",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900582",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:PND,
  author =       "Anonymous",
  title =        "{PC} network disaster recovery",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "5--5",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900590",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:GCB,
  author =       "Anonymous",
  title =        "The great `cyber-bucks' give away",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "5--5",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900604",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:HSS,
  author =       "Anonymous",
  title =        "High speed switching and networking",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "5--5",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900612",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:CUP,
  author =       "Anonymous",
  title =        "Checks for under-performing networks",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "5--5",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900620",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:CSN,
  author =       "Anonymous",
  title =        "Crime and security network",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "6--6",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900639",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:EEM,
  author =       "Anonymous",
  title =        "{EU} ends monopolies on phone networks",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "6--6",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900647",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Armstrong:1994:IC,
  author =       "Lisa Armstrong",
  title =        "{Internet} copyrights",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "6--6",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900655",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{English:1994:IWP,
  author =       "Erin English",
  title =        "{Internet} white pages with {PGP}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "7--7",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900663",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cheek:1994:FTC,
  author =       "Martin Cheek",
  title =        "Financial transactions to come onto the {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "7--7",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900671",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Armstrong:1994:PDS,
  author =       "Lisa Armstrong",
  title =        "{PersonaCard 100} data security token",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "7--8",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589490068X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hancock:1994:NKF,
  author =       "Bill Hancock",
  title =        "Naming is the key to the future",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "8--9",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900698",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Gordon:1994:ISC,
  author =       "Sara Gordon",
  title =        "{IRC} and security --- Can the two co-exist?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "10--17",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900701",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Schifreen:1994:HHD,
  author =       "Robert Schifreen",
  title =        "How hackers do it",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "17--19",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589490071X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:Ee,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "10",
  pages =        "20--20",
  month =        oct,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:22 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900728",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:LWN,
  author =       "Anonymous",
  title =        "{LAN\slash WAN} news",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "11",
  pages =        "2--5",
  month =        nov,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:24 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900965",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Madsen:1994:CC,
  author =       "Wayne Madsen",
  title =        "The {Clipper} controversy",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "11",
  pages =        "6--11",
  month =        nov,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:24 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900973",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Doyle:1994:TLS,
  author =       "Frank Doyle",
  title =        "Tricks of the {LAN} security trade",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "11",
  pages =        "12--13",
  month =        nov,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:24 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900981",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Madsen:1994:OIE,
  author =       "Wayne Madsen",
  title =        "Online industrial espionage",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "11",
  pages =        "14--18",
  month =        nov,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:24 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589490099X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Lindup:1994:CIU,
  author =       "Ken Lindup",
  title =        "Commercial {Internet} use: a new risk?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "11",
  pages =        "19--19",
  month =        nov,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:24 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901007",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:Ef,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "11",
  pages =        "20--20",
  month =        nov,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:24 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894901015",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:PCD,
  author =       "Anonymous",
  title =        "Piracy charges dismissed against {LaMacchia}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "12",
  pages =        "2--2",
  month =        dec,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:25 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900140",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:CSS,
  author =       "Anonymous",
  title =        "Computers security support centre set up",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "12",
  pages =        "2--3",
  month =        dec,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:25 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900159",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:CMN,
  author =       "Anonymous",
  title =        "Corporate move to the net",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "12",
  pages =        "3--3",
  month =        dec,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:25 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900167",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:CVG,
  author =       "Anonymous",
  title =        "Cellular on the verge of going mass market",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "12",
  pages =        "3--3",
  month =        dec,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:25 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900175",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:AAA,
  author =       "Anonymous",
  title =        "{Axent} announces acquisition of datamedia",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "12",
  pages =        "4--4",
  month =        dec,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:25 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900183",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:VAP,
  author =       "Anonymous",
  title =        "Virus alert program for information highway users",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "12",
  pages =        "4--4",
  month =        dec,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:25 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900191",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:KMP,
  author =       "Anonymous",
  title =        "Keeping e-mail private",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "12",
  pages =        "4--4",
  month =        dec,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:25 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900205",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:SNM,
  author =       "Anonymous",
  title =        "Secure network management initiative",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "12",
  pages =        "4--4",
  month =        dec,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:25 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900213",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Armstrong:1994:BAS,
  author =       "Lisa Armstrong",
  title =        "{Bank of America} secures the {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "12",
  pages =        "4--5",
  month =        dec,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:25 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900221",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hall:1994:LBL,
  author =       "Phil Hall",
  title =        "Laser beams as a {LAN} connectivity alternative",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "12",
  pages =        "5--6",
  month =        dec,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:25 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589490023X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Schwartau:1994:NN,
  author =       "Winn Schwartau",
  title =        "To net or not to net?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "12",
  pages =        "7--11",
  month =        dec,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:25 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900248",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Crocker:1994:IMI,
  author =       "Norman Crocker",
  title =        "An introduction to {MVS} integrity concerns",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "12",
  pages =        "12--16",
  month =        dec,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:25 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900256",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Peterson:1994:DLA,
  author =       "Padgett Peterson",
  title =        "Dangerous letters: {ANSI} bombs and forged e-mail",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "12",
  pages =        "17--19",
  month =        dec,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:25 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900264",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1994:Eg,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1994",
  number =       "12",
  pages =        "19--20",
  month =        dec,
  year =         "1994",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:25 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485894900272",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:ISA,
  author =       "Anonymous",
  title =        "{IP} spoofing attacks latest threat",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "2--2",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90059-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485898900599",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:OC,
  author =       "Anonymous",
  title =        "Organizations in cyberspace",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "2--2",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90060-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485898900605",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:RBF,
  author =       "Anonymous",
  title =        "{Russians} better at fighting phone fraud",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "2--3",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90061-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485898900617",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:BVS,
  author =       "Anonymous",
  title =        "A boom in {VAN} services",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "3--3",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90062-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485898900629",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:LS,
  author =       "Anonymous",
  title =        "The {LAN} surges on",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "3--3",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90063-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485898900630",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:CSM,
  author =       "Anonymous",
  title =        "{Concert} seeking 10\% of market",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "3--3",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90064-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485898900642",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SSD,
  author =       "Anonymous",
  title =        "{Securicor} supplies data security business service",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "3--4",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90065-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485898900654",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:CCD,
  author =       "Anonymous",
  title =        "{CyberSource}, the cyber-distributor",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "4--4",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90066-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485898900666",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:NMR,
  author =       "Anonymous",
  title =        "Network monitoring report generation system",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "4--4",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90067-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485898900678",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Armstrong:1995:AI,
  author =       "Lisa Armstrong",
  title =        "{AT\&T IVES}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "4--5",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90068-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589890068X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:NLSa,
  author =       "Anonymous",
  title =        "New level of security for global electronic trading",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "5--5",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90069-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485898900691",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FTT,
  author =       "Anonymous",
  title =        "Fault-tolerant {TCP\slash IP} for {LAN} to mainframe
                 connectivity",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "5--5",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90070-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485898900708",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:AII,
  author =       "Anonymous",
  title =        "Award for {IBM}'s {Internet} security firewall",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "5--5",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90071-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589890071X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FNS,
  author =       "Anonymous",
  title =        "Flood of network security products",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "5--6",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90072-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485898900721",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{English:1995:SKS,
  author =       "Erin English",
  title =        "{MIT} scales up {Kerberos} security system for
                 {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "6--6",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90073-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485898900733",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{English:1995:NCP,
  author =       "Erin English",
  title =        "A new certification programme for network security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "6--7",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90074-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485898900745",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{English:1995:SMS,
  author =       "Erin English",
  title =        "Security made simple with {SOCKS}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "7--7",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90075-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485898900757",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Wolfe:1995:IT,
  author =       "Henry Wolfe",
  title =        "The {Internet} threat",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "7--8",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)80038-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800800380",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Schwartau:1995:PAPa,
  author =       "Winn Schwartau",
  title =        "Password alternatives --- {Part 1}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "9--13",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)80039-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800800392",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Kovacich:1995:LAN,
  author =       "Gerald L. Kovacich",
  title =        "Local area networks security: Establishing policies
                 and procedures",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "13--16",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)80040-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800800409",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Saxby:1995:EMP,
  author =       "Stephen Saxby",
  title =        "Electronic monitoring poses E-mail dilemma",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "17--18",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90076-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485898900769",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Zajac:1995:BRM,
  author =       "Bernard P. Zajac",
  title =        "Book Review: {{\booktitle{E-{Mail} Security --- How To
                 Keep Your Electronic Messages Private}}: Bruce
                 Schneier, published by John Wiley \& Sons at \$24.95.
                 ISBN 0-471-05318-X}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "18--19",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90077-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485898900770",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:Ea,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "1",
  pages =        "20--20",
  month =        jan,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(98)90078-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:26 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485898900782",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:TEV,
  author =       "Anonymous",
  title =        "{Telnet} encryption vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "2--2",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901132",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:VM,
  author =       "Anonymous",
  title =        "Vulnerabilities in {\tt /bin/mail}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "2--3",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901140",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:HLT,
  author =       "Anonymous",
  title =        "Hacker leaves threatening messages",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "3--3",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901159",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Lindup:1995:MA,
  author =       "Ken Lindup",
  title =        "{Mitnick} arrested",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "3--4",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901167",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:BCA,
  author =       "Anonymous",
  title =        "{BR} complains about counterfeit {NetWare}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "4--4",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901175",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:GCG,
  author =       "Anonymous",
  title =        "Global communications group formed",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "4--4",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901183",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SCI,
  author =       "Anonymous",
  title =        "Support for corporate {Internet} users",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "4--4",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901191",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:MNR,
  author =       "Anonymous",
  title =        "{Microsoft Network} receives mixed response",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "4--5",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901205",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:OBG,
  author =       "Anonymous",
  title =        "Online banking growth",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "5--5",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901213",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:DPB,
  author =       "Anonymous",
  title =        "Draft plans to break {European} telecoms monopolies",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "5--5",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901221",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:GW,
  author =       "Anonymous",
  title =        "The growing {Web}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "5--5",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589590123X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:EUN,
  author =       "Anonymous",
  title =        "Eliminate unauthorized network access",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "5--6",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901248",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Snell:1995:SSI,
  author =       "Monica Snell",
  title =        "Secure shopping on the {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "6--6",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901256",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Armstrong:1995:ES,
  author =       "Lisa Armstrong",
  title =        "Endorsements for {SHTTP}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "6--7",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901264",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{English:1995:PTP,
  author =       "Erin English",
  title =        "Passwords through pagers",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "7--7",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901272",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hancock:1995:ARN,
  author =       "Bill Hancock",
  title =        "Assessing and reducing network risk",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "7--9",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)80041-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800800410",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Zajac:1995:CVL,
  author =       "Bernard P. Zajac",
  title =        "Computer viruses --- Legal options",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "9--10",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)80042-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800800422",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Schwartau:1995:PAPb,
  author =       "Winn Schwartau",
  title =        "Password alternatives --- {Part 2}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "11--15",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)80043-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800800434",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Kovacich:1995:SRV,
  author =       "Gerald Kovacich",
  title =        "Security requirements for voice messaging operations",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "15--18",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)80044-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800800446",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Lindup:1995:HW,
  author =       "Ken Lindup",
  title =        "The hacker war",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "19--19",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901280",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:Eb,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "2",
  pages =        "20--20",
  month =        feb,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:27 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901299",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SV,
  author =       "Anonymous",
  title =        "{Sendmail} vulnerabilities",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "3",
  pages =        "2--2",
  month =        mar,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:29 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901302",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:CVa,
  author =       "Anonymous",
  title =        "`{\tt at}' and `{\tt cron}' vulnerabilities",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "3",
  pages =        "2--3",
  month =        mar,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:29 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901310",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:PAV,
  author =       "Anonymous",
  title =        "Providers not accountable for virus distribution",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "3",
  pages =        "3--3",
  month =        mar,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:29 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901329",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:NSSa,
  author =       "Anonymous",
  title =        "{Natas} spreads in southwestern {United States}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "3",
  pages =        "3--3",
  month =        mar,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:29 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901337",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:BOI,
  author =       "Anonymous",
  title =        "Boom in online information",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "3",
  pages =        "3--4",
  month =        mar,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:29 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901345",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:AOP,
  author =       "Anonymous",
  title =        "{America Online} plans to sell 5\% stake",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "3",
  pages =        "4--4",
  month =        mar,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:29 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901353",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:ACN,
  author =       "Anonymous",
  title =        "{ACE\slash Client} for {NetWare}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "3",
  pages =        "4--4",
  month =        mar,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:29 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589590137X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:NEA,
  author =       "Anonymous",
  title =        "New {Ethernet} adapter card",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "3",
  pages =        "4--4",
  month =        mar,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:29 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901361",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SBL,
  author =       "Anonymous",
  title =        "Small businesses link through {BT}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "3",
  pages =        "4--5",
  month =        mar,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:29 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901388",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Riggs:1995:TTR,
  author =       "Brian Riggs",
  title =        "Top to tail router security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "3",
  pages =        "5--5",
  month =        mar,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:29 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901396",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Snell:1995:ASS,
  author =       "Monica Snell",
  title =        "{AT\&T} strengthen security of {Network Notes}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "3",
  pages =        "5--5",
  month =        mar,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:29 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589590140X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Thomsen:1995:ISS,
  author =       "Dan Thomsen",
  title =        "{IP} spoofing and session hijacking",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "3",
  pages =        "6--11",
  month =        mar,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)80045-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:29 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800800458",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Sheffield:1995:NRPa,
  author =       "Chris Sheffield",
  title =        "Network review --- {Part 1}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "3",
  pages =        "11--16",
  month =        mar,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)80046-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:29 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348580080046X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Lindup:1995:AKM,
  author =       "Ken Lindup",
  title =        "The arrest of {Kevin Mitnick}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "3",
  pages =        "16--19",
  month =        mar,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)80047-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:29 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800800471",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:Ec,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "3",
  pages =        "20--20",
  month =        mar,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:29 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901418",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:GTH,
  author =       "Anonymous",
  title =        "`{Good Times}' is a hoax",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "2--2",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897005",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SCD,
  author =       "Anonymous",
  title =        "{Satan} costs developer his job",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "2--2",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902090",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:HCC,
  author =       "Anonymous",
  title =        "Hacker charged in {Canada}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "2--2",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902104",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:CPH,
  author =       "Anonymous",
  title =        "Child porn hacker sentenced",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "2--3",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902112",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:BEG,
  author =       "Anonymous",
  title =        "{BT} engineer guilty of piracy",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "3--3",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897017",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:WWW,
  author =       "Anonymous",
  title =        "{World Wide Web} needs a security boost",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "3--3",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902120",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:BMM,
  author =       "Anonymous",
  title =        "{BT} makes moves in {Sweden} and {Italy}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "3--4",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902139",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FLM,
  author =       "Anonymous",
  title =        "Fibre links for major buildings",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "4--4",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902147",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:IIS,
  author =       "Anonymous",
  title =        "Investing in {Internet} security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "4--4",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902155",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:III,
  author =       "Anonymous",
  title =        "{IBM} increases {Internet} services",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "4--4",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902163",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:PDS,
  author =       "Anonymous",
  title =        "Private drive on superhighway",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "4--5",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902171",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:UPF,
  author =       "Anonymous",
  title =        "Users prefer frame relay",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "5--5",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589590218X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SDE,
  author =       "Anonymous",
  title =        "{SentryLink} data encryption devices",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "5--5",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902201",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:MPB,
  author =       "Anonymous",
  title =        "{MCI} and {Pacific Bell} offer {Internet} services",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "5--5",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902198",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FTW,
  author =       "Anonymous",
  title =        "Fault tolerant {Web} server",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "6--6",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589590221X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:DAS,
  author =       "Anonymous",
  title =        "{Defender} authentication software",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "6--6",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902228",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:NSPa,
  author =       "Anonymous",
  title =        "Network Security Plus",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "6--7",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902236",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Armstrong:1995:C,
  author =       "Lisa Armstrong",
  title =        "{CyberGuard}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "7--7",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897029",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Armstrong:1995:IT,
  author =       "Lisa Armstrong",
  title =        "Info-Terrorism",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "7--8",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897030",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Armstrong:1995:SP,
  author =       "Lisa Armstrong",
  title =        "Secure {PBX}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "8--8",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897042",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Riggs:1995:VA,
  author =       "Brian Riggs",
  title =        "Vaulting with {ATM}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "8--9",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897054",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Sheffield:1995:NRPb,
  author =       "Chris Sheffield",
  title =        "Network review --- {Part 2}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "9--13",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897078",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Armstrong:1995:OSC,
  author =       "Lisa Armstrong",
  title =        "{Oracle Secure C/S}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "9--9",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897066",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Saxby:1995:GSP,
  author =       "Stephen Saxby",
  title =        "{G7 Summit} poses challenge to governments on public
                 access to official information",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "14--15",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589689708X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:Ed,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "4",
  pages =        "15--16",
  month =        apr,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:30 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902244",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:BHT,
  author =       "Anonymous",
  title =        "The birth of the `hacker-tracker'",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "2--2",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901922",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:DIS,
  author =       "Anonymous",
  title =        "Developments in {Internet} security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "2--2",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901930",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:KFH,
  author =       "Anonymous",
  title =        "{Korea} fights the hackers",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "2--2",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901949",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FNI,
  author =       "Anonymous",
  title =        "Fears of {Net} insecurity",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "2--3",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901957",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FAH,
  author =       "Anonymous",
  title =        "Fixes for {AIX} holes",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "3--3",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901965",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FUF,
  author =       "Anonymous",
  title =        "Firewalls under fire",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "3--4",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901973",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FFA,
  author =       "Anonymous",
  title =        "Further fights against mobile phone fraud",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "4--5",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901981",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:IIN,
  author =       "Anonymous",
  title =        "{Internet} interest not necessarily business",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "5--5",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589590199X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:UFO,
  author =       "Anonymous",
  title =        "{US} fibre-optic cables set to triple",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "5--5",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902007",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:ISIa,
  author =       "Anonymous",
  title =        "{Internet} security issues addressed",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "5--6",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902015",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SUI,
  author =       "Anonymous",
  title =        "{SITA} unveils {Internet} service",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "6--6",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902023",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:CSS,
  author =       "Anonymous",
  title =        "Client\slash server security package",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "6--6",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589590204X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:NSI,
  author =       "Anonymous",
  title =        "{Netscape}'s {SSL Internet} security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "6--6",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902031",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:AANa,
  author =       "Anonymous",
  title =        "{ANR} addresses network security issues",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "6--7",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902058",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SWS,
  author =       "Anonymous",
  title =        "Secrets for {Windows}, security for {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "7--7",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902066",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:PSN,
  author =       "Anonymous",
  title =        "{PCMCIA} security for notebooks and {Novell LANs}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "7--7",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902074",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{English:1995:IVH,
  author =       "Erin English",
  title =        "{IP Version 6} holds promise for the future",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "7--8",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897091",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bournellis:1995:PET,
  author =       "Cynthia Bournellis",
  title =        "Putting an end to too many passwords",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "8--8",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897108",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{English:1995:SDG,
  author =       "Erin English",
  title =        "{SATAN} does not go undetected",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "8--9",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589689711X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bucholtz:1995:SCS,
  author =       "Chris Bucholtz",
  title =        "Suit challenges status of cryptography as munition",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "9--9",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897121",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hancock:1995:SMY,
  author =       "Bill Hancock",
  title =        "Stop that E-mail! {You} are probably breaking the
                 law!",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "10--12",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897133",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Gordon:1995:DA,
  author =       "Sarah Gordon",
  title =        "{Devil}'s advocate",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "12--15",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897145",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Sheffield:1995:NRPc,
  author =       "Chris Sheffield",
  title =        "Network review --- {Part 3}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "15--19",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897157",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:Ee,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "5",
  pages =        "20--20",
  month =        may,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:32 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902082",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:CISa,
  author =       "Anonymous",
  title =        "{Cisco IOS} software vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "2--2",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901701",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:HMP,
  author =       "Anonymous",
  title =        "Hackers monitored police",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "2--2",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589590171X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:URS,
  author =       "Anonymous",
  title =        "Underground Reconnaissance Service",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "2--2",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901728",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:BBC,
  author =       "Anonymous",
  title =        "{Black Baron} convicted",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "2--3",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901736",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:HPC,
  author =       "Anonymous",
  title =        "Hackers penetrate college computers",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "3--3",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901744",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:OCT,
  author =       "Anonymous",
  title =        "Outfoxing the cellular thieves",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "3--3",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901752",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:BBF,
  author =       "Anonymous",
  title =        "{Bulter Bunny} found guilty",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "3--3",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901760",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:RPI,
  author =       "Anonymous",
  title =        "Row puts {Internet} provision in doubt",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "4--4",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901779",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:IGP,
  author =       "Anonymous",
  title =        "{Internet} goes private in {Brazil}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "4--4",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901787",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:IA,
  author =       "Anonymous",
  title =        "Infohighway in {Africa}?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "4--4",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901795",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:ISIb,
  author =       "Anonymous",
  title =        "{Internet} steals international phone calls",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "4--5",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901809",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:MRA,
  author =       "Anonymous",
  title =        "{Mergent} reaches agreement with {Bull}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "5--5",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901817",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:EEW,
  author =       "Anonymous",
  title =        "{Europe} encrypts weather data",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "5--5",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897169",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:MNP,
  author =       "Anonymous",
  title =        "{Microsoft} network pushes into electronic commerce",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "5--6",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901825",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:BMA,
  author =       "Anonymous",
  title =        "Broad multimedia alliance",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "6--6",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901833",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:IMA,
  author =       "Anonymous",
  title =        "{ICL} and {Motorola} ally for network security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "6--6",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901841",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:NSD,
  author =       "Anonymous",
  title =        "{Nortel} and {Shiva} direct {Internet} traffic",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "6--6",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589590185X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:MPS,
  author =       "Anonymous",
  title =        "{Motorola} pushes its security portfolio",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "6--7",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897170",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:NSA,
  author =       "Anonymous",
  title =        "Network security assessment tool",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "7--7",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901868",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:MHF,
  author =       "Anonymous",
  title =        "{Motorola} helps firms protect data",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "7--7",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901876",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FDB,
  author =       "Anonymous",
  title =        "Financial data backed up by {ISDN}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "7--7",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901884",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:ISIc,
  author =       "Anonymous",
  title =        "{Internet} security improved",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "7--8",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901892",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bucholtz:1995:NSB,
  author =       "Chris Bucholtz",
  title =        "Networks suffer backup blues",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "8--8",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901906",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:TSD,
  author =       "Anonymous",
  title =        "The {`TouchLock'} security device",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "8--8",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897182",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:IGF,
  author =       "Anonymous",
  title =        "{Indian} groups face increased {Government} electronic
                 surveillance",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "9--9",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897194",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Riggs:1995:CPF,
  author =       "Brian Riggs",
  title =        "{Church} puts freedom of {Internet} on trial",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "10--10",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897212",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bucholtz:1995:JSH,
  author =       "Chris Bucholtz",
  title =        "Judge says hacker deserves more time",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "10--10",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897200",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bucholtz:1995:STC,
  author =       "Chris Bucholtz",
  title =        "Security takes centre stage at {Internet} conference",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "10--11",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897224",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Kaneshige:1995:BI,
  author =       "Tom Kaneshige",
  title =        "Banking on the {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "11--11",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897236",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bucholtz:1995:UWG,
  author =       "Chris Bucholtz",
  title =        "{US} war games fought",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "11--12",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897248",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bucholtz:1995:NSF,
  author =       "Chris Bucholtz",
  title =        "Network security far too lax",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "12--12",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589689725X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hancock:1995:SSE,
  author =       "Bill Hancock",
  title =        "Simple social engineering",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "13--14",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897261",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Worlock:1995:CCSa,
  author =       "David R. Worlock",
  title =        "The culture of control: Safeguarding intellectual
                 property in the age of networks --- {Part 1}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "14--17",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897273",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Saxby:1995:NRL,
  author =       "Stephen Saxby",
  title =        "Network-related law --- recent decisions from {USA}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "18--19",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897285",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:Ef,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "6",
  pages =        "20--20",
  month =        jun,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:33 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901914",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:PT,
  author =       "Anonymous",
  title =        "{PKZIP Trojan}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "2--2",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900942",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:RPC,
  author =       "Anonymous",
  title =        "Regulation of porn in cyberspace",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "2--2",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900950",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:CVb,
  author =       "Anonymous",
  title =        "{Caibua} virus",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "2--3",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900969",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:CFB,
  author =       "Anonymous",
  title =        "Campaign to fight \$3 billion a year problem",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "3--3",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900977",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SPP,
  author =       "Anonymous",
  title =        "{Swedish} pirates prosecuted",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "3--3",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900993",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:YVH,
  author =       "Anonymous",
  title =        "The year of the virus hoax",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "3--3",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900985",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SWR,
  author =       "Anonymous",
  title =        "Security worries with {Registration Wizard}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "4--4",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901000",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FAS,
  author =       "Anonymous",
  title =        "{Federal} agency to secure infohighway",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "4--4",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901019",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:NEV,
  author =       "Anonymous",
  title =        "New electronic verification standard",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "4--4",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901027",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:WOP,
  author =       "Anonymous",
  title =        "The worries of online purchasers",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "4--5",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901035",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:RN,
  author =       "Anonymous",
  title =        "Radio over the {Net}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "5--5",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901043",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:NEO,
  author =       "Anonymous",
  title =        "{Novell} and {EUNet} offer {Internet} connection",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "5--5",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589590106X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:EN,
  author =       "Anonymous",
  title =        "The electric network",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "5--5",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901051",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FKO,
  author =       "Anonymous",
  title =        "Firewalls to keep online spies at bay",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "6--6",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901078",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:WAV,
  author =       "Anonymous",
  title =        "{Windows} anti-virus virtual device driver",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "6--6",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901094",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:PGW,
  author =       "Anonymous",
  title =        "Protection as good as at the {Whitehouse}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "6--6",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901086",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:MSE,
  author =       "Anonymous",
  title =        "Message security for electronic communications",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "6--7",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901108",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SMM,
  author =       "Anonymous",
  title =        "Secure E-mail for {Microsoft-Mail} users",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "7--7",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897297",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Kaneshige:1995:GRS,
  author =       "Thomas Kaneshige",
  title =        "{Government}'s role in superhighway security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "7--7",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901116",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Kaneshige:1995:SGU,
  author =       "Tom Kaneshige",
  title =        "Software giants unite to filter the {Net}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "8--8",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897303",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bucholtz:1995:VMS,
  author =       "Chris Bucholtz",
  title =        "{Visa} and {MasterCard} settle on {Internet} security
                 standard",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "8--9",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897315",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bucholtz:1995:EEC,
  author =       "Chris Bucholtz",
  title =        "Encryption exports, {Clipper} policy criticized by
                 consortium",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "9--9",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897327",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Beseke:1995:DCI,
  author =       "Kermit Beseke",
  title =        "Developing a corporate {Internet} policy",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "10--13",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897339",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Worlock:1995:CCSb,
  author =       "David R. Worlock",
  title =        "The culture of control: Safeguarding intellectual
                 property in the age of networks --- {Part 2}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "13--17",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897340",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Peterson:1995:FMPa,
  author =       "Padgett Peterson",
  title =        "The fortress mentality --- {Part III}: Tokens,
                 one-time password devices and the {Roman Army}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "17--19",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897352",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:Eg,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "7",
  pages =        "20--20",
  month =        jul,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:35 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901124",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FHC,
  author =       "Anonymous",
  title =        "{French} hacker cracks {Netscape} code",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "2--2",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900802",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SVV,
  author =       "Anonymous",
  title =        "{Sendmail V.5} vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "2--2",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900810",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:JBH,
  author =       "Anonymous",
  title =        "{Japanese} battle hackers, viruses",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "2--3",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900829",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:CBA,
  author =       "Anonymous",
  title =        "{Citicorp} bank accounts breached",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "3--3",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900837",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SEE,
  author =       "Anonymous",
  title =        "Stronger encryption exportable",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "3--3",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900845",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:BSA,
  author =       "Anonymous",
  title =        "Bringing security to {ATM}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "3--4",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900853",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:ENE,
  author =       "Anonymous",
  title =        "{Europe} negotiates over encryption",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "4--4",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900861",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:NGP,
  author =       "Anonymous",
  title =        "{Netscape} goes public",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "4--4",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589590087X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:AFN,
  author =       "Anonymous",
  title =        "{AT\&T} finally notices the {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "4--4",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900888",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:A,
  author =       "Anonymous",
  title =        "The authorizer",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "4--5",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900896",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:NLSb,
  author =       "Anonymous",
  title =        "{Netscape}'s latest security effort",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "5--5",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589590090X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:NGN,
  author =       "Anonymous",
  title =        "New generation network security product",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "5--5",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900926",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:NSE,
  author =       "Anonymous",
  title =        "{NetCop} scans for explicit material",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "5--5",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900918",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bucholtz:1995:PMP,
  author =       "Chris Bucholtz",
  title =        "{Pilot}'s E-mail has {Pentagon} up in arms",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "5--6",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897364",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Kaneshige:1995:FSS,
  author =       "Thomas Kaneshige",
  title =        "Full service security shop to ward off hackers",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "6--6",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897376",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Kaneshige:1995:SSR,
  author =       "Thomas Kaneshige",
  title =        "Security systems for the road most travelled",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "6--7",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897388",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bournellis:1995:IPD,
  author =       "Cynthia Bournellis",
  title =        "{Internet} project defines middle ground",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "7--7",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589689739X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{English:1995:CCJ,
  author =       "Erin English",
  title =        "{CyberCash} and {Checkfree} join forces",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "7--8",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897406",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1995:IHPa,
  author =       "Fred Cohen",
  title =        "{Internet} holes --- {Part 1}: {Internet} Control
                 Message Protocol",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "8--10",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589689742X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{English:1995:CUN,
  author =       "Erin English",
  title =        "{CyberAngels} unite on the net",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "8--8",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897418",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Shaer:1995:SS,
  author =       "Caroline Shaer",
  title =        "Single sign-on",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "11--15",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897431",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Ongetta:1995:EDI,
  author =       "Silvano Ongetta",
  title =        "Electronic Data Interchange --- What are the security
                 measures?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "16--19",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897443",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:Eh,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "8",
  pages =        "19--20",
  month =        aug,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:37 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900934",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:NSSb,
  author =       "Anonymous",
  title =        "{Netscape}'s software security scare",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "2--2",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900594",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SPV,
  author =       "Anonymous",
  title =        "{Solaris} {\tt ps} vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "2--3",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900608",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:NSPb,
  author =       "Anonymous",
  title =        "New security patches from {Sun}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "3--3",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900616",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SSV,
  author =       "Anonymous",
  title =        "{Sun Sendmail {\tt -oR}} vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "3--4",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900624",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:UCT,
  author =       "Anonymous",
  title =        "Undercover cybercops trap hackers",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "4--4",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900632",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:TUI,
  author =       "Anonymous",
  title =        "Ties to {US} intelligence for domain name assigner",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "4--4",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900640",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:AOF,
  author =       "Anonymous",
  title =        "{America Online} fights hackers",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "4--4",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900659",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:OCP,
  author =       "Anonymous",
  title =        "Online child pornography debate continues",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "5--5",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900667",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:MWS,
  author =       "Anonymous",
  title =        "Malicious {Word} spreads to the {Net}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "5--5",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900675",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:DAV,
  author =       "Anonymous",
  title =        "Document about virus contains one",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "5--5",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900683",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Rees:1995:ELB,
  author =       "Frank Rees",
  title =        "An expensive lesson for bulletin board user",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "6--6",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900691",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:MISa,
  author =       "Anonymous",
  title =        "{Microsoft}'s {Internet} security claims criticized",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "6--6",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897455",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:ECP,
  author =       "Anonymous",
  title =        "Electronic cheques planned",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "6--7",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900705",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:MSM,
  author =       "Anonymous",
  title =        "Mobile services market set to triple",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "7--7",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900713",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:MISb,
  author =       "Anonymous",
  title =        "Making the {Internet} a safer place",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "7--7",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900721",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:AST,
  author =       "Anonymous",
  title =        "{AT\&T} splits into three",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "8--8",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(95)90073-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589590073X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:INL,
  author =       "Anonymous",
  title =        "Integrity of network link guaranteed",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "8--8",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(95)90074-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485895900748",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SWV,
  author =       "Anonymous",
  title =        "{Sophos}' {Windows 95} virus scanner",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "8--8",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(95)90075-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485895900756",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:HSL,
  author =       "Anonymous",
  title =        "{DES} for {HDLC\slash SDLC} links",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "8--8",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(95)90076-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485895900764",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:IFI,
  author =       "Anonymous",
  title =        "{Internet} firewall from {Integralis}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "8--9",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900772",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Barry:1995:SUL,
  author =       "David Barry",
  title =        "{SNMP} upgrade to lose security features",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "9--10",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897479",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Davis:1995:FC,
  author =       "Cindy Davis",
  title =        "Firewall Consortium",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "9--9",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900780",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:NSN,
  author =       "Anonymous",
  title =        "New secure {Net} products",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "9--9",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897467",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Kaneshige:1995:FPO,
  author =       "Thomas Kaneshige",
  title =        "{FBI} to police online amidst heated controversy",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "10--10",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897480",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hancock:1995:ANR,
  author =       "Bill Hancock",
  title =        "Attacking network routers",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "11--12",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897492",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Peterson:1995:FMPb,
  author =       "Padgett Peterson",
  title =        "The fortress mentality --- {Part IV}: Telecomputing,
                 telecommuting and serving remote customers",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "12--14",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897509",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1995:IHPb,
  author =       "Fred Cohen",
  title =        "{Internet} holes --- {Part 2}: Packet fragmentation
                 attacks",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "14--16",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897510",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Herschberg:1995:ICI,
  author =       "Bob Herschberg and Edo Roos Lindgreen",
  title =        "{Internet}: a certain insecurity",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "16--19",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897522",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:Ei,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "9",
  pages =        "20--20",
  month =        sep,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:38 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895900799",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SLV,
  author =       "Anonymous",
  title =        "{Sun 4.1x} loadmodule vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "2--2",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902570",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SVW,
  author =       "Anonymous",
  title =        "{\tt syslog} vulnerability workaround",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "2--2",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902589",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:TDV,
  author =       "Anonymous",
  title =        "{Telnet} daemon vulnerabilities",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "2--3",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902597",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:ISC,
  author =       "Anonymous",
  title =        "{Internet} security code",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "3--3",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902600",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:GCN,
  author =       "Anonymous",
  title =        "Growing cellular networks in {China}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "3--4",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902619",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SPC,
  author =       "Anonymous",
  title =        "Secure payments from {Cybercash}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "4--4",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902627",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:DIC,
  author =       "Anonymous",
  title =        "The digital {ID} case",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "4--4",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902635",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:MLM,
  author =       "Anonymous",
  title =        "{Microsoft} and {Lotus} make net moves",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "4--5",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902643",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FPF,
  author =       "Anonymous",
  title =        "Firewall partnership formed",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "5--5",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902651",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SST,
  author =       "Anonymous",
  title =        "Single sign-on technology",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "5--5",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902678",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FSN,
  author =       "Anonymous",
  title =        "Firewall security for network applications",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "5--5",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902686",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:AANb,
  author =       "Anonymous",
  title =        "{Azlan}'s alliance with {Netscape} and Supernet",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "5--5",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589590266X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FRE,
  author =       "Anonymous",
  title =        "Frame relay encryptor protects",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "5--6",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902694",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:HPE,
  author =       "Anonymous",
  title =        "{H-P}'s encryption engine proposal",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "6--6",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897534",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{English:1995:OES,
  author =       "Erin English",
  title =        "{Oracle} expands support for {Oracle7}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "6--6",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902708",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{English:1995:OEF,
  author =       "Erin English",
  title =        "{Oracle} embraces {Fortezza}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "7--7",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897558",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bournellis:1995:RNF,
  author =       "Cynthia Bournellis",
  title =        "{RSA} negotiates with firewall vendors to establish
                 {VPNs}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "7--7",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897546",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bucholtz:1995:NAS,
  author =       "Chris Bucholtz",
  title =        "{Netscape} answers security lapses with anti-bug
                 contest",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "7--8",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589689756X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Kaneshige:1995:AIC,
  author =       "Thomas Kaneshige",
  title =        "Auto industry to create its own network",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "8--8",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897571",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hancock:1995:ECI,
  author =       "Bill Hancock",
  title =        "Export of cryptographic information from the {US}: a
                 brief look at the problems",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "9--11",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897583",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1995:IHPc,
  author =       "Fred Cohen",
  title =        "{Internet} holes --- {Part 3}: The {\tt sendmail}
                 maelstrom",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "11--12",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897595",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Schultz:1995:NPF,
  author =       "E. Eugene Schultz",
  title =        "A new perspective on firewalls",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "13--17",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897601",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Banes:1995:PLN,
  author =       "D. W. Banes",
  title =        "Physical layer network security: What your {LAN} can
                 do for you",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "17--19",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897613",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:Ej,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "10",
  pages =        "20--20",
  month =        oct,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:40 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895902716",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SGI,
  author =       "Anonymous",
  title =        "{Silicon Graphics Inc.}'s {Ip} vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "2--2",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901426",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:UCL,
  author =       "Anonymous",
  title =        "30 {US} companies lose \$66 million",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "2--2",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901434",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FOW,
  author =       "Anonymous",
  title =        "{FBI} outlines a wiretapping future",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "2--3",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901442",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FFT,
  author =       "Anonymous",
  title =        "Flaw in fault-tolerance software",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "3--3",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897625",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Madsen:1995:FRC,
  author =       "Wayne Madsen",
  title =        "{Fortezza} reaches into civilian agencies",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "3--3",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901450",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:CCI,
  author =       "Anonymous",
  title =        "Companies crack down on {Internet} use",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "3--3",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901469",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:CISb,
  author =       "Anonymous",
  title =        "Check in at {Internet} site to check security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "3--4",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901477",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:WNI,
  author =       "Anonymous",
  title =        "Woe is the {Net}, or is it?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "4--4",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901485",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:CWS,
  author =       "Anonymous",
  title =        "Choosing a {Web} standard",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "4--4",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901493",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:PSV,
  author =       "Anonymous",
  title =        "Product scans for viruses before a download",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "4--4",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901507",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SSN,
  author =       "Anonymous",
  title =        "Single sign-on network security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "4--5",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901515",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:MIM,
  author =       "Anonymous",
  title =        "{Merlin}'s {Internet} magic",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "5--5",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901523",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:IUA,
  author =       "Anonymous",
  title =        "{Internet} user authentication security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "5--5",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901531",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:DSP,
  author =       "Anonymous",
  title =        "{OS/2} data security product to integrate {IBM}'s
                 security hooks",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "5--5",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589590154X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Browne:1995:UKL,
  author =       "Graham Browne",
  title =        "Using {DES} with keys longer than 56 bits",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "5--6",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897637",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hancock:1995:RHK,
  author =       "Bill Hancock",
  title =        "Recent history of known network breaches",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "6--9",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897649",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Leach:1995:SCN,
  author =       "John Leach and Colin Brown Zergo",
  title =        "Security considerations of network outsourcing",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "10--14",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897650",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1995:IHPd,
  author =       "Fred Cohen",
  title =        "{Internet} holes --- {Part 4}: Network news transfer
                 protocol",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "15--19",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897662",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:Ek,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "11",
  pages =        "20--20",
  month =        nov,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:42 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901558",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:XAV,
  author =       "Anonymous",
  title =        "{X} authentication vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "2--2",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901566",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:DIT,
  author =       "Anonymous",
  title =        "Dramatic increase in telephone hacking",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "2--2",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901574",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:PGP,
  author =       "Anonymous",
  title =        "Police given permission to tap E-mail",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "2--2",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901582",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:HUF,
  author =       "Anonymous",
  title =        "{HP-UX} {\tt ftp} vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "2--3",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901590",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:RLL,
  author =       "Anonymous",
  title =        "{RSA} loses licence for {Hellman--Merkle} algorithm",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "3--3",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901604",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:VGM,
  author =       "Anonymous",
  title =        "The viruses are getting more vicious",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "3--3",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901612",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:JLB,
  author =       "Anonymous",
  title =        "{JavaScript} language becomes a competitor",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "3--3",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901620",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FVB,
  author =       "Anonymous",
  title =        "First virtual bank claims to be secure",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "4--4",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901639",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
  keywords =     "Cardinal Bancshares; Huntington Bancshares; Security
                 First Network Bank; Wachovia Corporation",
}

@Article{Anonymous:1995:LDP,
  author =       "Anonymous",
  title =        "Long distance phone calls via the {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "4--4",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901655",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:SPW,
  author =       "Anonymous",
  title =        "Security problems with {Windows 95}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "4--4",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901647",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:PVM,
  author =       "Anonymous",
  title =        "Protection from viruses for E-mail",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "4--5",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901663",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:FA,
  author =       "Anonymous",
  title =        "A firewall for {ATM}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "5--5",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901671",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:UNS,
  author =       "Anonymous",
  title =        "{Unix} network security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "5--5",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589590168X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{English:1995:AVW,
  author =       "Erin English",
  title =        "{AOLGOLD} virus worries users",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "5--6",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897674",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{English:1995:ISS,
  author =       "Erin English",
  title =        "{IP} security standards battle it out",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "6--6",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897686",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1995:IHPe,
  author =       "Fred Cohen",
  title =        "{Internet} holes --- {Part 5a}: 50 ways to attack your
                 web systems",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "7--11",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897704",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{English:1995:EEP,
  author =       "Erin English",
  title =        "Exportable encryption policy found `unacceptable'",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "7--7",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897698",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
  remark =       "Discusses industry opposition to US Clinton
                 Administration's proposal for data encryption standard,
                 because of key-escrow requirement, and concern for
                 back-door decryption.",
}

@Article{Hancock:1995:IHR,
  author =       "Bill Hancock",
  title =        "{Internet} hacking resources",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "11--15",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896897716",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1995:El,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1995",
  number =       "12",
  pages =        "16--16",
  month =        dec,
  year =         "1995",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:43 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485895901698",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:RYV,
  author =       "Anonymous",
  title =        "{\tt rpc.ypupdated} vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "2--2",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90151-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901518",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:GUC,
  author =       "Anonymous",
  title =        "Growth in {UK} cell-phone fraud",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "2--3",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90152-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589690152X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:PKE,
  author =       "Anonymous",
  title =        "Public-key encryption flawed in time",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "3--3",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90153-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901531",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:ERK,
  author =       "Anonymous",
  title =        "Encryption report kept under lock and key",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "3--3",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90154-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901543",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:NDB,
  author =       "Anonymous",
  title =        "{NetConnect} distributes {BorderWare} firewall",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "3--4",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90155-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901555",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:NOS,
  author =       "Anonymous",
  title =        "{Novell}'s operating systems forecast to remain
                 dominant",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "4--4",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90156-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901567",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:FOB,
  author =       "Anonymous",
  title =        "Further online banking competition",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "4--4",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90157-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901579",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:NEC,
  author =       "Anonymous",
  title =        "The new era of cable modems",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "4--5",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90158-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901580",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SST,
  author =       "Anonymous",
  title =        "Spec for secure transactions",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "5--5",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90159-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901592",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:UDE,
  author =       "Anonymous",
  title =        "Users demand encryption policies",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "5--5",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90160-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901609",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:CGP,
  author =       "Anonymous",
  title =        "Cable growth potential massive",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "5--5",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90161-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901610",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SDU,
  author =       "Anonymous",
  title =        "Secure domain unit for network protection",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "5--6",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90162-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901622",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:BDI,
  author =       "Anonymous",
  title =        "Briefing document for {Internet} security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "6--6",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90163-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901634",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:ISA,
  author =       "Anonymous",
  title =        "Internal security across client\slash server
                 networks",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "6--6",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90164-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901646",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:NSA,
  author =       "Anonymous",
  title =        "Network security assessment tool for {Windows NT}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "7--7",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90165-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901658",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Kaneshige:1996:MGB,
  author =       "Thomas Kaneshige",
  title =        "{McAfee} gives the boot to virus",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "7--7",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90166-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589690166X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Kaneshige:1996:NSM,
  author =       "Thomas Kaneshige",
  title =        "Network security made easy with little black box",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "7--8",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90167-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901671",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{English:1996:STI,
  author =       "Erin English",
  title =        "{SEC} tackles {Internet} investment fraud",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "8--8",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90168-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901683",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{English:1996:LWM,
  author =       "Erin English",
  title =        "{Lotus} working on military version of {Notes}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "8--8",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90169-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901695",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1996:IHPa,
  author =       "Fred Cohen",
  title =        "{Internet} holes --- {Part 5b}: 50 ways to attack your
                 {Web} systems",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "9--13",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)90001-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800900011",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Kaneshige:1996:OSD,
  author =       "Thomas Kaneshige",
  title =        "{Oracle} to secure database access over the {Net}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "9--9",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90170-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901701",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hanson:1996:IAS,
  author =       "Lesley Hanson",
  title =        "The impact of {ATM} on security in the data network",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "13--17",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)90002-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800900023",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Lindup:1996:HH,
  author =       "Ken Lindup",
  title =        "Hackers for hire",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "18--18",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90171-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901713",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:Ea,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "1",
  pages =        "20--20",
  month =        jan,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90172-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:45 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901725",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:NVS,
  author =       "Anonymous",
  title =        "New version solves {BIND} security problems",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "2--2",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90041-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900410",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:HSV,
  author =       "Anonymous",
  title =        "{HP} {\tt syslog} vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "2--2",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90042-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900422",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:UPD,
  author =       "Anonymous",
  title =        "{UDP} port denial-of-service attack",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "2--3",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90043-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900434",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:VSL,
  author =       "Anonymous",
  title =        "Virus spreads like wild fire",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "3--3",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90044-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900446",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:WMVa,
  author =       "Anonymous",
  title =        "{Winword} macro viruses",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "3--4",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90045-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900458",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SSP,
  author =       "Anonymous",
  title =        "{Singapore}'s service providers confident of security
                 despite break-in",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "4--4",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90046-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589690046X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:CED,
  author =       "Anonymous",
  title =        "Compress and encrypt data simultaneously",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "4--5",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90047-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900471",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:NGW,
  author =       "Anonymous",
  title =        "The next {Great Wall of China}?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "5--5",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90048-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900483",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:EPP,
  author =       "Anonymous",
  title =        "Extended password protection for {CyberGuard
                 Firewall}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "5--5",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90049-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900495",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:IMP,
  author =       "Anonymous",
  title =        "{Internet} may not be profitable",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "5--6",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90050-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900501",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:PSP,
  author =       "Anonymous",
  title =        "The promise of secure phone banking",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "6--6",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90051-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900513",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:RAP,
  author =       "Anonymous",
  title =        "Remote access protection",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "6--6",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90052-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900525",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SDI,
  author =       "Anonymous",
  title =        "Secure deployment of {Internet} services",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "6--6",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90053-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900537",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:HVL,
  author =       "Anonymous",
  title =        "Humans and viruses locked out",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "6--7",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90054-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900549",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Sterlicchi:1996:WTI,
  author =       "John Sterlicchi",
  title =        "{Wayfarer} turns {Internet} into {LAN}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "7--7",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90055-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900550",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Sterlicchi:1996:NMS,
  author =       "John Sterlicchi",
  title =        "New moves to stimulate {EDI} growth",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "7--8",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90056-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900562",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Sterlicchi:1996:FNF,
  author =       "John Sterlicchi",
  title =        "First {NT} firewall soars in",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "8--9",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90057-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900574",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1996:IHPb,
  author =       "Fred Cohen",
  title =        "{Internet} holes --- {Part 6}: Automated attack and
                 defence",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "9--14",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)90003-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800900035",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Osen:1996:SCI,
  author =       "Janet Osen",
  title =        "Sex, crimes and the {Internet}: the {Jake Baker}
                 case",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "15--22",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)90004-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800900047",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:Eb,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "2",
  pages =        "24--24",
  month =        feb,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90058-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:46 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900586",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:CIN,
  author =       "Anonymous",
  title =        "Corrupt information from network servers",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "2--2",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90115-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901154",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SDC,
  author =       "Anonymous",
  title =        "{SunSoft} demo {CDs} contain a security threatening
                 flaw",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "2--2",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90116-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901166",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:ISP,
  author =       "Anonymous",
  title =        "{Internet} security purchase for {HP}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "2--3",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90117-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901178",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:CGS,
  author =       "Anonymous",
  title =        "{CompuServe} in {Germany} suffers another inquiry",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "3--3",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90118-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589690118X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:GPT,
  author =       "Anonymous",
  title =        "Governments pressed {Tor} agreement on encryption",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "3--3",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90119-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901191",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:BCI,
  author =       "Anonymous",
  title =        "Business class {Internet} service",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "3--4",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90120-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901208",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:VMC,
  author =       "Anonymous",
  title =        "{Visa} and {MasterCard} combine security
                 specifications",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "4--4",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90121-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589690121X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:IRR,
  author =       "Anonymous",
  title =        "{Integralis} revenues rise 60\%",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "4--4",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90122-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901221",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SAB,
  author =       "Anonymous",
  title =        "{SecurID} authentication for {BayRS} routers",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "4--4",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90123-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901233",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SSE,
  author =       "Anonymous",
  title =        "Security system for electronic cash",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "4--4",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90124-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901245",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:MII,
  author =       "Anonymous",
  title =        "{Microsoft}'s {Internet} information server",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "4--5",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90125-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901257",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:CNE,
  author =       "Anonymous",
  title =        "{CyberGuard}'s new enhancements",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "5--5",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90126-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901269",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:FND,
  author =       "Anonymous",
  title =        "The firewall with the new dual wall",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "5--5",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90127-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901270",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Sterlicchi:1996:STA,
  author =       "John Sterlicchi",
  title =        "Security technologies aid {ITT} transition",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "5--6",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90128-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901282",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1996:KGC,
  author =       "Atoosa Savarnejad",
  title =        "{Kerberos} gets cracked",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "6--6",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90129-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901294",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1996:IDS,
  author =       "Atoosa Savarnejad",
  title =        "{IBM} to develop secure version",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "6--6",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90130-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901300",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1996:IHPc,
  author =       "Fred Cohen",
  title =        "{Internet} holes --- {Part 7}: The human side",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "7--10",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)90005-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800900059",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Moyer:1996:SMF,
  author =       "Philip R. Moyer and E. Eugene Schultz",
  title =        "A systematic methodology for firewall penetration
                 testing",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "11--18",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)90006-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800900060",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Osen:1996:FIAa,
  author =       "Janet Osen",
  title =        "The {Freedom of Information Act} and the {2600 Club}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "19--19",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90131-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901312",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:Ec,
  author =       "Anonymous",
  title =        "Events 20",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "3",
  pages =        "20--20",
  month =        mar,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90132-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:48 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901324",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:WJB,
  author =       "Anonymous",
  title =        "Weaknesses in {Java} bytecode verifier",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "2--2",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90173-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901737",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:DOD,
  author =       "Anonymous",
  title =        "{Digital OSF/1} {\tt dxconsole} vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "2--2",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90174-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901749",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:ERM,
  author =       "Anonymous",
  title =        "Encryption restrictions may be eased",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "2--3",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90175-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901750",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:UGD,
  author =       "Anonymous",
  title =        "{UK Government} debates key escrow",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "3--3",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90176-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901762",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:IOB,
  author =       "Anonymous",
  title =        "{ITSEC} and {Orange Book} standards merge",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "3--3",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90178-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901786",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1996:NHK,
  author =       "Atoosa Savarnejad",
  title =        "{Netscape} hires {KPMG}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "3--3",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90177-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901774",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:NGJ,
  author =       "Anonymous",
  title =        "{Netscape} and {GE}'s joint {Internet} venture",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "3--4",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90179-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901798",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:NOB,
  author =       "Anonymous",
  title =        "Net opened to {British} businesses",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "4--4",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90180-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901804",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SEL,
  author =       "Anonymous",
  title =        "Secure electronic links to cross capital",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "4--4",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90181-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901816",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:URS,
  author =       "Anonymous",
  title =        "{Unix} rejected, security found wanting",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "4--4",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90182-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901828",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:AOI,
  author =       "Anonymous",
  title =        "Alliance offers integrated business solution",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "4--5",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90183-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589690183X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SIP,
  author =       "Anonymous",
  title =        "Secure {Internet} payments",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "5--5",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90184-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901841",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:MSW,
  author =       "Anonymous",
  title =        "More security for {Windows NT}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "5--5",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90185-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901853",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:WMVb,
  author =       "Anonymous",
  title =        "Word macro viruses detected and eliminated",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "5--6",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90186-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901865",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1996:IAS,
  author =       "Atoosa Savarnejad",
  title =        "{IDC} annual survey reveals extent of insecurity",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "6--6",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896836890",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1996:UCO,
  author =       "Atoosa Savarnejad",
  title =        "{US} company offers firewall challenge",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "6--7",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896836907",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hancock:1996:INS,
  author =       "Bill Hancock",
  title =        "Improving network security through port switching",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "7--8",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896836919",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1996:IHPd,
  author =       "Fred Cohen",
  title =        "{Internet} holes --- {Part 8}: Spam",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "8--10",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896836920",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Wood:1996:ICR,
  author =       "Charles Cresson Wood",
  title =        "An {Internet Curmudgeon}'s rants",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "10--11",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896836932",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Osen:1996:BNB,
  author =       "Janet Osen",
  title =        "Bad news for bulletin boards",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "11--13",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896836944",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hancock:1996:CYS,
  author =       "Bill Hancock",
  title =        "Can you social engineer your way into your network?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "14--15",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896836956",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:Ed,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "4",
  pages =        "16--16",
  month =        apr,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90187-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:49 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901877",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:WIN,
  author =       "Anonymous",
  title =        "Warning issued on new type of {Word} macro virus",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "5",
  pages =        "2--2",
  month =        may,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90105-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:51 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901051",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:EBS,
  author =       "Anonymous",
  title =        "Encryption battle sees possible break through",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "5",
  pages =        "2--2",
  month =        may,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90106-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:51 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901063",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:FMD,
  author =       "Anonymous",
  title =        "Firewall market developments",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "5",
  pages =        "2--2",
  month =        may,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90107-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:51 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901075",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:ENS,
  author =       "Anonymous",
  title =        "Enhanced network security offered",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "5",
  pages =        "2--3",
  month =        may,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90108-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:51 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901087",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:IEB,
  author =       "Anonymous",
  title =        "The {Internet}-enabled backup solution",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "5",
  pages =        "3--3",
  month =        may,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90109-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:51 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901099",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:PIS,
  author =       "Anonymous",
  title =        "Private information sent safely over public frame
                 relay network",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "5",
  pages =        "3--3",
  month =        may,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90110-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:51 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901105",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1996:CRW,
  author =       "Atoosa Savarnejad",
  title =        "{Californian} representative warns against
                 cyberfraud",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "5",
  pages =        "4--4",
  month =        may,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90111-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:51 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901117",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1996:PBC,
  author =       "Atoosa Savarnejad",
  title =        "{PGP} becomes a company",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "5",
  pages =        "4--4",
  month =        may,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90112-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:51 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901129",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1996:COF,
  author =       "Atoosa Savarnejad",
  title =        "{Cisco} offers free encryption technology",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "5",
  pages =        "4--5",
  month =        may,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90113-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:51 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901130",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1996:IHPe,
  author =       "Fred Cohen",
  title =        "{Internet} holes --- {Part 9}: {IP} address forgery
                 and how to eliminate it",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "5",
  pages =        "5--12",
  month =        may,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:51 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589681909X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Parker:1996:RCG,
  author =       "Tom Parker",
  title =        "The role of cryptography in global communications",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "5",
  pages =        "13--17",
  month =        may,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:51 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896819106",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Peterson:1996:IAM,
  author =       "A. Padgett Peterson",
  title =        "{Internet} attack mechanisms",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "5",
  pages =        "17--19",
  month =        may,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:51 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896819118",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:Ee,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "5",
  pages =        "20--20",
  month =        may,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90114-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:51 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901142",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:ICD,
  author =       "Anonymous",
  title =        "Interpreters in {CGI} bin directories",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "2--2",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90133-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901336",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:NPT,
  author =       "Anonymous",
  title =        "{NIS+} password tables left insecure",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "2--2",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90134-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901348",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:IDT,
  author =       "Anonymous",
  title =        "{IRIX} desktop tool vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "2--2",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90135-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589690135X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SHI,
  author =       "Anonymous",
  title =        "Security hole in {IIS} software",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "2--3",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90136-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901361",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:EME,
  author =       "Anonymous",
  title =        "Electronic mail encryption standards' rivalry",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "3--3",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90137-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901373",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:MDI,
  author =       "Anonymous",
  title =        "{Microsoft}'s designs for {Internet} security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "3--3",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90138-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901385",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:MIS,
  author =       "Anonymous",
  title =        "Managed {Internet} service",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "4--4",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90139-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901397",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:IIS,
  author =       "Anonymous",
  title =        "{Internet}\slash intranet security from {Gradient} and
                 {HP}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "4--4",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90141-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901415",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:PRS,
  author =       "Anonymous",
  title =        "{Performing Right Society}'s network secured",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "4--4",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90140-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901403",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:PSG,
  author =       "Anonymous",
  title =        "{PC Security} gets investment from {Motorola}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "4--5",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90142-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901427",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:OAS,
  author =       "Anonymous",
  title =        "{OpeN/2} authorization software",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "5--5",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90143-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901439",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:LDC,
  author =       "Anonymous",
  title =        "{LAN} diagnostic consultancy service",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "5--5",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90144-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901440",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SSS,
  author =       "Anonymous",
  title =        "Single sign-on security for enterprise-wide systems",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "5--6",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90145-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901452",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:FTN,
  author =       "Anonymous",
  title =        "Firewall targeted for {NetWare}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "6--6",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90146-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901464",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:PDA,
  author =       "Anonymous",
  title =        "Protection for dial access systems",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "6--6",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90148-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901488",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SAS,
  author =       "Anonymous",
  title =        "{SoftID} authentication software",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "6--6",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90147-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901476",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:AVS,
  author =       "Anonymous",
  title =        "Anti-virus solution for network firewalls",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "6--7",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90149-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589690149X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1996:IHPf,
  author =       "Fred Cohen",
  title =        "{Internet} holes --- {Part 10}: {UDP} viruses",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "7--10",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896884510",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Peterson:1996:MSO,
  author =       "A. Padgett Peterson",
  title =        "E-mail security --- An oxymoron?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "10--13",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896884522",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Schultz:1996:BRF,
  author =       "E. Eugene Schultz",
  title =        "Building the right firewall",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "13--17",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896884534",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Osen:1996:FIAb,
  author =       "Janet Osen",
  title =        "The {Freedom of Information Act} and the {2600 Club}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "17--19",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896884546",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:Ef,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "6",
  pages =        "20--20",
  month =        jun,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90150-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:52 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901506",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:VDS,
  author =       "Anonymous",
  title =        "Vulnerability in {DEC} software security kits",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "2--2",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90089-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900896",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:VDP,
  author =       "Anonymous",
  title =        "Vulnerability in the {\tt dip} program",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "2--2",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90090-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900902",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SV,
  author =       "Anonymous",
  title =        "{Suidperl} vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "2--3",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90091-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900914",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:RMC,
  author =       "Anonymous",
  title =        "Right mouse click could allow in viruses",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "3--3",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90092-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900926",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SAO,
  author =       "Anonymous",
  title =        "Security and authentication offered",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "3--4",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90093-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900938",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:BGH,
  author =       "Anonymous",
  title =        "Businesses get help to beat {Internet} crime",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "4--4",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90094-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589690094X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:CAI,
  author =       "Anonymous",
  title =        "Companies adopt {Internet} commerce solutions",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "4--4",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90095-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900951",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:TSN,
  author =       "Anonymous",
  title =        "Total secure networking solutions incorporates
                 {CyberGuard}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "4--5",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90096-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900963",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:CCC,
  author =       "Anonymous",
  title =        "Credit-card company seeks strong encryption",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "5--5",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90097-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900975",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:BPE,
  author =       "Anonymous",
  title =        "{Barclays}' pilot for electronic commerce",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "5--5",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90098-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900987",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:LDI,
  author =       "Anonymous",
  title =        "Librarians develop {Internet} protocol",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "5--6",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90099-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900999",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SVP,
  author =       "Anonymous",
  title =        "Secure Virtual Private Networks",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "6--6",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90100-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901002",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SLN,
  author =       "Anonymous",
  title =        "{Serverware} launches new version of {SeNTry}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "6--6",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90101-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901014",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:II,
  author =       "Anonymous",
  title =        "{IronBridge} and {IronWall}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "6--7",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90102-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901026",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:CMA,
  author =       "Anonymous",
  title =        "{CKS MyNet}, the answer to single sign-on?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "7--7",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90103-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896901038",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Sterlicchi:1996:SFM,
  author =       "John Sterlicchi",
  title =        "Security framework from {Microsoft}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "7--8",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896837354",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1996:RSM,
  author =       "Atoosa Savarnejad",
  title =        "Revisions in {SET} mark advances to secure cyberspace
                 shopping",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "8--8",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896837366",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1996:IHPg,
  author =       "Fred Cohen",
  title =        "{Internet} holes --- {Part 11}: {Internet} lightning
                 rods",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "9--13",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589683738X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Kaneshige:1996:MMC,
  author =       "Thomas Kaneshige",
  title =        "{McAfee} and {Microsoft} clean up {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "9--9",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896837378",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Solomon:1996:EVP,
  author =       "Alan Solomon",
  title =        "The end of the virus problem",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "13--17",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896837391",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Lindup:1996:SAW,
  author =       "Ken Lindup",
  title =        "{Superman} is alive and well and living in {Wapping}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "18--18",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/1353-4858(96)83740-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896837408",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:Eg,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "7",
  pages =        "20--20",
  month =        jul,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90104-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:53 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589690104X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SKP,
  author =       "Anonymous",
  title =        "{Solaris 2.5 KCMS} programs vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "8",
  pages =        "2--2",
  month =        aug,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90030-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:55 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900306",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:HUV,
  author =       "Anonymous",
  title =        "{HP-UX} vulnerabilities",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "8",
  pages =        "2--2",
  month =        aug,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90031-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:55 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900318",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:RV,
  author =       "Anonymous",
  title =        "The {\tt rdist} vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "8",
  pages =        "2--3",
  month =        aug,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90032-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:55 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589690032X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:FVC,
  author =       "Anonymous",
  title =        "First virus capable of infecting {Excel} spreadsheet",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "8",
  pages =        "3--3",
  month =        aug,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90033-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:55 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900331",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:JMC,
  author =       "Anonymous",
  title =        "Joint marketing for {CyberGuard} and {EDS}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "8",
  pages =        "3--3",
  month =        aug,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90034-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:55 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900343",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:EWS,
  author =       "Anonymous",
  title =        "Enterprise {Web} solutions from {Netscape} and
                 {NeXT}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "8",
  pages =        "3--3",
  month =        aug,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90035-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:55 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900355",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:UNS,
  author =       "Anonymous",
  title =        "{Usenet} news via satellite",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "8",
  pages =        "3--4",
  month =        aug,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90036-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:55 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900367",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:BFS,
  author =       "Anonymous",
  title =        "{Baysecure Framework}'s security enhanced by
                 {ACE\slash Server}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "8",
  pages =        "4--4",
  month =        aug,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90037-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:55 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900379",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:NNVa,
  author =       "Anonymous",
  title =        "New {NT} virus scanner",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "8",
  pages =        "4--4",
  month =        aug,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90038-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:55 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900380",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:CPT,
  author =       "Anonymous",
  title =        "{CryptoSystem} protects {TCP\slash IP} networks",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "8",
  pages =        "4--5",
  month =        aug,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90039-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:55 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900392",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{David:1996:IGY,
  author =       "Jon David",
  title =        "The {Internet} --- Gateway to your information
                 assets",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "8",
  pages =        "5--7",
  month =        aug,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:55 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896811524",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hancock:1996:OSA,
  author =       "Bill Hancock",
  title =        "Operating system attacks from network resources",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "8",
  pages =        "8--11",
  month =        aug,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:55 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896811536",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1996:IHPh,
  author =       "Fred Cohen",
  title =        "{Internet} holes --- {Part 12a}: {Internet} incident
                 response",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "8",
  pages =        "12--14",
  month =        aug,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:55 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896811548",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Peterson:1996:PSR,
  author =       "Padgett Peterson",
  title =        "Providing secure, recoverable e-mail",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "8",
  pages =        "15--19",
  month =        aug,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:55 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589681155X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:Eh,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "8",
  pages =        "20--20",
  month =        aug,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90040-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:55 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900409",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:VE,
  author =       "Anonymous",
  title =        "Vulnerability in {\tt expreserve}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "2--2",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90016-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900161",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SPF,
  author =       "Anonymous",
  title =        "Security problem in {\tt fm\_fls}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "2--2",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90017-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900173",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:VFN,
  author =       "Anonymous",
  title =        "Virus fears for new operating systems",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "2--2",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90018-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900185",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:MCM,
  author =       "Anonymous",
  title =        "Merge creates mega security response team",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "2--3",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90019-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900197",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SBS,
  author =       "Anonymous",
  title =        "Secure banking and shopping on {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "3--3",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90020-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900203",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:ISO,
  author =       "Anonymous",
  title =        "{Internet} security offerings from {HP}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "3--3",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90021-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900215",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:ARB,
  author =       "Anonymous",
  title =        "Agreement reached between {Microsoft} and {RSA}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "3--4",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90022-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900227",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:NCD,
  author =       "Anonymous",
  title =        "Name change for {Digital Pathways}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "4--4",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90023-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900239",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:LAW,
  author =       "Anonymous",
  title =        "On-{LAN} authentication for {Windows NT}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "4--4",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90025-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900252",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:DRR,
  author =       "Anonymous",
  title =        "{Digital} resells {Raptor}'s security products",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "4--4",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90024-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900240",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:EKE,
  author =       "Anonymous",
  title =        "Encryption without key exchange",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "4--5",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90026-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900264",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:NER,
  author =       "Anonymous",
  title =        "The next {Eagle} from {Raptor}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "5--5",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896844011",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:FPM,
  author =       "Anonymous",
  title =        "Further protection from E-mail viruses",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "5--5",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896900276",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Persyn:1996:JTH,
  author =       "Tim Persyn",
  title =        "Journalists take to hacking",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "5--5",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896900288",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bee:1996:UGA,
  author =       "Andrianne Bee",
  title =        "{US} government allows selling of strong encryption to
                 {US} clients",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "6--6",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896844035",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bee:1996:NPC,
  author =       "Andrianne Bee",
  title =        "{NCSA} programme certifies {Web} sites",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "6--6",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896844023",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Gordon:1996:GVS,
  author =       "Sarah Gordon",
  title =        "Are good virus simulators still a bad idea?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "7--13",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896844047",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1996:IHPi,
  author =       "Fred Cohen",
  title =        "{Internet} holes --- {Part 12(b)}: {Internet} incident
                 response",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "13--17",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896844059",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Osen:1996:VMP,
  author =       "Janet Osen",
  title =        "The {Virtual Magistrate [Project]}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "18--18",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896844060",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:Ei,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "9",
  pages =        "20--20",
  month =        sep,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90029-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:56 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589690029X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:TSF,
  author =       "Anonymous",
  title =        "{TCP SYN} flooding and {IP} spoofing attacks",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "10",
  pages =        "2--2",
  month =        oct,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90059-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:57 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900598",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:FSV,
  author =       "Anonymous",
  title =        "Further {\tt sendmail} vulnerabilities",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "10",
  pages =        "2--3",
  month =        oct,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90060-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:57 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900604",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:IHV,
  author =       "Anonymous",
  title =        "{Irina}, a hoax not a virus",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "10",
  pages =        "3--3",
  month =        oct,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90061-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:57 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900616",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:CFIa,
  author =       "Anonymous",
  title =        "Corporations fear {ICE\_T} virus emergence",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "10",
  pages =        "3--3",
  month =        oct,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90062-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:57 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900628",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:KEB,
  author =       "Anonymous",
  title =        "Key escrow becomes key recovery",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "10",
  pages =        "3--4",
  month =        oct,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90063-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:57 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589690063X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:FDE,
  author =       "Anonymous",
  title =        "Further doubts emerge over {NT} security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "10",
  pages =        "4--4",
  month =        oct,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90064-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:57 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900641",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:PAA,
  author =       "Anonymous",
  title =        "Privacy advocates not appeased by key recovery",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "10",
  pages =        "4--4",
  month =        oct,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90065-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:57 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900653",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:RCM,
  author =       "Anonymous",
  title =        "{Reflex} creates macro virus trapper",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "10",
  pages =        "4--4",
  month =        oct,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90066-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:57 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900665",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:AFP,
  author =       "Anonymous",
  title =        "The {Authorizer} firewall, protection for {X25}
                 networks",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "10",
  pages =        "5--5",
  month =        oct,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:57 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896826493",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:VSX,
  author =       "Anonymous",
  title =        "Virus scanner for {X.400} messaging system",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "10",
  pages =        "5--5",
  month =        oct,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:57 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896900677",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1996:MDA,
  author =       "Atoosa Savarnejad",
  title =        "Multi-discipline alliance spans all security aspects",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "10",
  pages =        "5--5",
  month =        oct,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:57 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896900689",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1996:NLF,
  author =       "Atoosa Savarnejad",
  title =        "{Netsolve} launches first {ISP}-independent
                 outsourcing product",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "10",
  pages =        "6--6",
  month =        oct,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:57 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/135348589682650X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bee:1996:SEI,
  author =       "Adrianne Bee",
  title =        "Soon even the {Internet} will take {American
                 Express}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "10",
  pages =        "6--7",
  month =        oct,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:57 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896826511",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1996:IHPj,
  author =       "Fred Cohen",
  title =        "{Internet} holes --- {Part 13}: The {SYN} flood",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "10",
  pages =        "7--9",
  month =        oct,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:57 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896826523",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{David:1996:SWS,
  author =       "Jon David",
  title =        "Sniffers --- The whole story",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "10",
  pages =        "9--13",
  month =        oct,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:57 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896826535",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Osen:1996:CDAa,
  author =       "Janet Osen",
  title =        "The {Communications Decency Act} and the karma of
                 chaos --- {Part 1}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "10",
  pages =        "13--19",
  month =        oct,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:57 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896826547",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:Ej,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "10",
  pages =        "20--20",
  month =        oct,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90069-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:57 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900690",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SDM,
  author =       "Anonymous",
  title =        "{Sendmail} daemon mode vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "2--2",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90000-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900008",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:HDC,
  author =       "Anonymous",
  title =        "Hackers not deterred by certification scheme",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "2--2",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90001-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589690001X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:ISC,
  author =       "Anonymous",
  title =        "Invasion of {Supreme Court}'s homepage",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "2--2",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90002-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900021",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:NNVb,
  author =       "Anonymous",
  title =        "{Netscape Navigator} virus scare",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "2--2",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90003-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900033",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SRI,
  author =       "Anonymous",
  title =        "Survey reveals {Internet}-borne viruses on increase",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "3--3",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)81222-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897812226",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{McCormack:1996:CSR,
  author =       "Michael McCormack",
  title =        "Content self-regulation recommended",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "3--3",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485896900045",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:CIP,
  author =       "Anonymous",
  title =        "Combatants of {Internet} porn",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "3--4",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90005-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900057",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:ICH,
  author =       "Anonymous",
  title =        "{Internet} commerce hampered by security fears",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "4--4",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90006-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900069",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SVN,
  author =       "Anonymous",
  title =        "{Smartcards} vulnerable to new attack",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "4--4",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90007-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900070",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:TWS,
  author =       "Anonymous",
  title =        "{TV Web}-surfing device breaks export regulations",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "4--4",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90008-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900082",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:UEM,
  author =       "Anonymous",
  title =        "Users experience major problems with networks",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "4--5",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90009-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900094",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:JCB,
  author =       "Anonymous",
  title =        "{Japanese} company buys into security market",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "5--5",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90010-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900100",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:SAI,
  author =       "Anonymous",
  title =        "Secure access for {Internet}\slash intranet
                 connectivity",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "5--5",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90012-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900124",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:HPS,
  author =       "Anonymous",
  title =        "Hacker-proof system for data coding",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "5--5",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90011-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900112",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:ITP,
  author =       "Anonymous",
  title =        "{Internet} Transaction Processing solutions",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "5--6",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90013-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900136",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:CFIb,
  author =       "Anonymous",
  title =        "{Cisco}'s firewall for {Internet}\slash intranet",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "6--6",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90014-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900148",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bee:1996:HCS,
  author =       "Adrianne Bee",
  title =        "How cyber-safe is your company?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "6--7",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)81223-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897812238",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bee:1996:VAA,
  author =       "Adrianne Bee",
  title =        "Vendor alliances aim to make {Internet} safe for
                 business",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "7--7",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)81224-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589781224X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bee:1996:CS,
  author =       "Adrianne Bee",
  title =        "Cyber stamps",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "7--8",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)81225-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897812251",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Kaneshige:1996:VRA,
  author =       "Thomas Kaneshige",
  title =        "Vendors rally for answers to {Panix Attacks}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "8--8",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)81226-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897812263",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Kaneshige:1996:MCR,
  author =       "Thomas Kaneshige",
  title =        "{Microsoft}'s catapult raises {NT} firewall bar",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "8--9",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)81227-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897812275",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{David:1996:FPI,
  author =       "Jon David",
  title =        "The future of {PGP} on the {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "9--12",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)81228-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897812287",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Osen:1996:CDAb,
  author =       "Janet Osen",
  title =        "The {Communications Decency Act} --- {Part 2}: The
                 language of the {Communications Decency Act}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "12--18",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)81229-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897812299",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:Ek,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "11",
  pages =        "20--20",
  month =        nov,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90015-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:56:58 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589690015X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:HAV,
  author =       "Anonymous",
  title =        "{HP 9000} access vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "2--2",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90070-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900707",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:PBR,
  author =       "Anonymous",
  title =        "Password buffer over-run vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "2--2",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90071-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900719",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:FPV,
  author =       "Anonymous",
  title =        "{\tt fpkg2swpkg} program vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "2--2",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90072-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900720",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:NBR,
  author =       "Anonymous",
  title =        "{\tt newgrp} buffer over-run vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "2--3",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90073-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900732",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:CSC,
  author =       "Anonymous",
  title =        "Computer security concerns ranked low in survey",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "3--3",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90074-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900744",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:ISS,
  author =       "Anonymous",
  title =        "{Internet} shopping secured by {SET} for {Taiwanese}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "3--3",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90075-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900756",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:HET,
  author =       "Anonymous",
  title =        "Hardware encryption technology complies with
                 encryption regulations",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "4--4",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90076-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900768",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:ECP,
  author =       "Anonymous",
  title =        "Extending copyright protection for the {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "4--4",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90077-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589690077X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:IBU,
  author =       "Anonymous",
  title =        "Increase in business users needing the {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "4--5",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90078-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900781",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:EFI,
  author =       "Anonymous",
  title =        "Electronic fingerprint identifies owner of image",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "5--5",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90079-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900793",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:GIC,
  author =       "Anonymous",
  title =        "Global {Internet} commerce",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "5--5",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90081-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900811",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:PRI,
  author =       "Anonymous",
  title =        "{PICS} recommended for {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "5--5",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90080-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589690080X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:KSA,
  author =       "Anonymous",
  title =        "{Kane Security Analyst} assesses network virus
                 protection",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "5--5",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90082-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900823",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:EPD,
  author =       "Anonymous",
  title =        "Electronic privacy device from {Harris}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "6--6",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90083-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900835",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:NSS,
  author =       "Anonymous",
  title =        "New software security token",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "6--6",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90084-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900847",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:PEB,
  author =       "Anonymous",
  title =        "Protection for electronic business communications",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "6--7",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90085-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900859",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:ISW,
  author =       "Anonymous",
  title =        "{Internet} security for {Windows NT} environments",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "7--7",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90086-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900860",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Madsen:1996:CCL,
  author =       "Wayne Madsen",
  title =        "{Congressional Committee} looks at {US} encryption
                 policy",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "7--8",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90087-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900872",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1996:MNS,
  author =       "Fred Cohen",
  title =        "Managing network security --- {Part 1}: How good do
                 you have to be?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "9--11",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)90007-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800900072",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{David:1996:AI,
  author =       "Jon David",
  title =        "Auditing the {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "11--14",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)90008-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800900084",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Gordon:1996:RWA,
  author =       "Sarah Gordon and Richard Ford",
  title =        "Real world anti-virus product reviews and evaluations
                 --- {Part 1}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "14--18",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(00)90009-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485800900096",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1996:El,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1996",
  number =       "12",
  pages =        "20--20",
  month =        dec,
  year =         "1996",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(96)90088-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:00 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485896900884",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:KSS,
  author =       "Anonymous",
  title =        "{Korn} shell {\tt suid\_exec} vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "2--2",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83489-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897834897",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:VSI,
  author =       "Anonymous",
  title =        "Vulnerabilities in {SGI IRIX}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "2--2",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83488-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897834885",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:DSA,
  author =       "Anonymous",
  title =        "Denial of service attack via {\tt ping}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "3--3",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83490-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897834903",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:CAA,
  author =       "Anonymous",
  title =        "Computer attacks against {WebCom}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "3--4",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83491-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897834915",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:GWS,
  author =       "Anonymous",
  title =        "{Government}'s {Web} site attacked by hackers",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "4--4",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83493-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897834939",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:TER,
  author =       "Anonymous",
  title =        "Tightening of encryption regulations in {Japan}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "4--4",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83492-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897834927",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:ECR,
  author =       "Anonymous",
  title =        "Encryption compromise on rocky ground",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "4--5",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83494-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897834940",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:EPS,
  author =       "Anonymous",
  title =        "{Eagle} provides security for {Internet} product",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "5--5",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83497-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897834976",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:PUB,
  author =       "Anonymous",
  title =        "Panel urges better protection",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "5--5",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83496-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897834964",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:SVHa,
  author =       "Anonymous",
  title =        "The season for virus hoaxes",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "5--5",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83495-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897834952",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:AAA,
  author =       "Anonymous",
  title =        "{Axent} acquires {AssureNet} pathways",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "5--6",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83498-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897834988",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:WSP,
  author =       "Anonymous",
  title =        "Worldwide single-point security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "6--6",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83501-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897835015",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:ERA,
  author =       "Anonymous",
  title =        "Enhanced remote access security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "6--6",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83500-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897835003",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:PKS,
  author =       "Anonymous",
  title =        "Public key smartcard available",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "6--6",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83499-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589783499X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:DEU,
  author =       "Anonymous",
  title =        "Desktop encryption utility",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "7--7",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83504-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897835040",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:SVHb,
  author =       "Anonymous",
  title =        "Security for vulnerable high speed networks",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "7--7",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83503-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897835039",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Huynh:1997:PCW,
  author =       "Danthanh Huynh",
  title =        "{Professor} criticizes {Web} security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "7--7",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83502-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897835027",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
  keywords =     "Professor Edward Felton",
}

@Article{Cohen:1997:MNSa,
  author =       "Fred Cohen",
  title =        "Managing network security --- {Part 2}: Where should
                 we concentrate protection?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "8--11",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83505-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897835052",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Gordon:1997:RWA,
  author =       "Sarah Gordon and Richard Ford",
  title =        "Real world anti-virus product reviews and evaluations
                 --- {Part 2}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "11--18",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83506-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897835064",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:Ea,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "1",
  pages =        "20--20",
  month =        jan,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90035-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:01 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900350",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:VRT,
  author =       "Anonymous",
  title =        "Vulnerability in {{\tt rlogin\slash Term}}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "2--2",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)86634-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897866342",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:MCB,
  author =       "Anonymous",
  title =        "{MIME} conversion buffer overflow",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "2--3",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)86635-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897866354",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:RBE,
  author =       "Anonymous",
  title =        "{RSA}'s $ 40$-bit encryption algorithm cracked",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "3--3",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)86638-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589786638X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:TV,
  author =       "Anonymous",
  title =        "{\tt talkd} vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "3--3",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)86637-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897866378",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:HOS,
  author =       "Anonymous",
  title =        "The holes in online security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "3--3",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)86636-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897866366",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:ECH,
  author =       "Anonymous",
  title =        "Electronic commerce hindered by fear of crime",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "3--4",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)86639-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897866391",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:UDC,
  author =       "Anonymous",
  title =        "{US DoD COTS} snafu",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "4--4",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)86640-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897866408",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:CFG,
  author =       "Anonymous",
  title =        "Companies form group to support cross-platform
                 encryption",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "4--4",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485897900593",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:EIC,
  author =       "Anonymous",
  title =        "Exploit intranets without compromising security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "4--5",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)86641-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589786641X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:PCI,
  author =       "Anonymous",
  title =        "Power-cached {Internet}\slash intranet gateway",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "5--5",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)86644-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897866445",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:SEI,
  author =       "Anonymous",
  title =        "Security for enterprise {Internet} applications",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "5--5",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)86643-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897866433",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:AVP,
  author =       "Anonymous",
  title =        "Anti-virus protection for {Office 97}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "5--5",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)86642-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897866421",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:VFL,
  author =       "Anonymous",
  title =        "Virus found on {Linux} system",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "5--6",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)86645-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897866457",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bee:1997:LE,
  author =       "Adrianne Bee",
  title =        "The latest on encryption",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "6--7",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)86646-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897866469",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1997:IFS,
  author =       "Atoosa Savarnejad",
  title =        "{Intranet} firewalls susceptible to internal attacks",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "7--7",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)86648-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897866482",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1997:WIF,
  author =       "Atoosa Savarnejad",
  title =        "Warning issued, flaw in {Unix} software",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "7--7",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)86647-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897866470",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Schultz:1997:WFF,
  author =       "E. Eugene Schultz",
  title =        "When firewalls fail: Lessons learned from firewall
                 testing",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "8--11",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)86649-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897866494",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1997:MNSb,
  author =       "Fred Cohen",
  title =        "Managing Network Security --- {Part 3}: Network
                 security as a control issue",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "12--15",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)86650-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897866500",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Aubrey-Jones:1997:IV,
  author =       "David Aubrey-Jones",
  title =        "{Internet} --- Virusnet?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "15--19",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)86651-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897866512",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:Eb,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "2",
  pages =        "20--20",
  month =        feb,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90060-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:03 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589790060X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:BFJ,
  author =       "Anonymous",
  title =        "Bug found in {Java Virtual Machine}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "3",
  pages =        "2--2",
  month =        mar,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83033-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:04 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897830334",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:FFI,
  author =       "Anonymous",
  title =        "Flaw found in {Internet Explorer}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "3",
  pages =        "2--2",
  month =        mar,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83032-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:04 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897830322",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:HNT,
  author =       "Anonymous",
  title =        "{\tt httpd} {\tt nph-test-cgi} script vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "3",
  pages =        "2--2",
  month =        mar,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83030-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:04 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897830309",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:EKB,
  author =       "Anonymous",
  title =        "Encryption key of 48 bits cracked",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "3",
  pages =        "2--2",
  month =        mar,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83031-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:04 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897830310",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:FCR,
  author =       "Anonymous",
  title =        "{French} companies restricted from using high-end
                 encryption",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "3",
  pages =        "3--3",
  month =        mar,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83036-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:04 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589783036X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:PEH,
  author =       "Anonymous",
  title =        "{PGP} encryption heavily criticized",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "3",
  pages =        "3--3",
  month =        mar,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83035-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:04 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897830358",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:VIS,
  author =       "Anonymous",
  title =        "Vulnerability in {InterNetNews} server",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "3",
  pages =        "3--3",
  month =        mar,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83034-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:04 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897830346",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Szweda:1997:FIA,
  author =       "Roy Szweda",
  title =        "{Finjan} introduces {ActiveX Security Manager}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "3",
  pages =        "3--4",
  month =        mar,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83037-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:04 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897830371",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:ASA,
  author =       "Anonymous",
  title =        "{ACE\slash Server} Access Manager launched",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "3",
  pages =        "4--4",
  month =        mar,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90033-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:04 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900337",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Szweda:1997:NSN,
  author =       "Roy Szweda",
  title =        "{NCSA} supports new {TIS ForceField}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "3",
  pages =        "4--5",
  month =        mar,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83038-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:04 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897830383",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1997:ILS,
  author =       "Atoosa Savarnejad",
  title =        "{IBM} launches {SecureWay}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "3",
  pages =        "5--5",
  month =        mar,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83039-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:04 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897830395",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1997:ERS,
  author =       "Atoosa Savarnejad",
  title =        "{eTrust} to roll out in second quarter",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "3",
  pages =        "5--6",
  month =        mar,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83040-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:04 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897830401",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hancock:1997:UCE,
  author =       "Bill Hancock",
  title =        "The {US} cryptographic export debate --- Round five?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "3",
  pages =        "6--7",
  month =        mar,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83041-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:04 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897830413",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1997:MNSc,
  author =       "Fred Cohen",
  title =        "Managing network security --- {Part 4}: Integrity
                 first, usually",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "3",
  pages =        "8--10",
  month =        mar,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83042-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:04 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897830425",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Osen:1997:MMM,
  author =       "Janet Osen",
  title =        "The medium is the message: a media specific analysis
                 of the {Communications Decency Act}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "3",
  pages =        "10--16",
  month =        mar,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83043-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:04 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897830437",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Osen:1997:WMT,
  author =       "Janet Osen",
  title =        "For whom the modem tolls: The travails of {America
                 Online}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "3",
  pages =        "17--19",
  month =        mar,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83044-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:04 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897830449",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:Ec,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "3",
  pages =        "20--20",
  month =        mar,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90034-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:04 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900349",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:ESS,
  author =       "Anonymous",
  title =        "{Explorer} security still patchy",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "2--2",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89992-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897899928",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:VIP,
  author =       "Anonymous",
  title =        "Vulnerability in {IMAP} and {POP}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "2--2",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89991-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897899916",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:CAN,
  author =       "Anonymous",
  title =        "Current attacks on news servers",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "2--3",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89993-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589789993X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:VKI,
  author =       "Anonymous",
  title =        "{VirusPatrol} keeps {Internet} users virus free",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "3--3",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89995-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897899953",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Szweda:1997:RSN,
  author =       "Roy Szweda",
  title =        "{Rainbow} supports {Netscape}'s open multi-platform
                 security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "3--3",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89994-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897899941",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:SEA,
  author =       "Anonymous",
  title =        "Strong encryption available worldwide",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "3--4",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89996-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897899965",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:MSJ,
  author =       "Anonymous",
  title =        "{MicroLan} Systems joins {CSAPP}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "4--4",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89997-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897899977",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Szweda:1997:AMD,
  author =       "Roy Szweda",
  title =        "{AT\&T\slash Mondex} deal enables {Web}
                 `micropayments'",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "4--4",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485897900313",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:FSU,
  author =       "Anonymous",
  title =        "File security uses smartcard and {RSA} encryption",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "5--5",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89999-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897899990",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:ESF,
  author =       "Anonymous",
  title =        "Enhanced security features for {Netscape} web
                 servers",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "5--5",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89998-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897899989",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:SVP,
  author =       "Anonymous",
  title =        "Secure virtual private networking over the
                 {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "5--6",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)80000-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897800001",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:MRW,
  author =       "Anonymous",
  title =        "{MIMEsweeper} redefines Web\slash E-mail security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "6--6",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)80003-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897800037",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:LDA,
  author =       "Anonymous",
  title =        "{Lotus Domino} anti-virus solution",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "6--6",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)80002-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897800025",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:EAS,
  author =       "Anonymous",
  title =        "Easy authentication and signature verification",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "6--6",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)80001-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897800013",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1997:HYC,
  author =       "Atoosa Savarnejad",
  title =        "Having your cookies and eating them too",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "6--7",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)80004-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897800049",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1997:ITS,
  author =       "Atoosa Savarnejad",
  title =        "{IBM} and {TIS} strike an agreement",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "7--8",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)80005-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897800050",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1997:CAI,
  author =       "Atoosa Savarnejad",
  title =        "{Cisco} allies with industry leaders for security
                 initiative",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "8--8",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)80006-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897800062",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Moyer:1997:EFI,
  author =       "Philip R. Moyer",
  title =        "Enhanced firewall infrastructure testing methodology",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "9--15",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)80007-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897800074",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1997:MNSd,
  author =       "Fred Cohen",
  title =        "Managing network security --- {Part 5}: Risk
                 management or risk analysis",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "15--19",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)80008-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897800086",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:Ed,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "4",
  pages =        "20--20",
  month =        apr,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90032-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:06 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900325",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:VLa,
  author =       "Anonymous",
  title =        "Vulnerability in {{\tt libXt}}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "2--2",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)85687-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897856875",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:NLS,
  author =       "Anonymous",
  title =        "Natural language service libraries vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "2--3",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)85688-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897856887",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:JAS,
  author =       "Anonymous",
  title =        "{Java} applets that steal computer cycles",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "3--3",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)85690-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897856905",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:VPA,
  author =       "Anonymous",
  title =        "Vulnerabilities in pluggable authentication module",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "3--3",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)85689-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897856899",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:HPW,
  author =       "Anonymous",
  title =        "High profile {Web} sites warrant high security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "3--4",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)85691-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897856917",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:NSS,
  author =       "Anonymous",
  title =        "{NT} systems shut down by {Telnet} hack",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "4--4",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)85693-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897856930",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:SCI,
  author =       "Anonymous",
  title =        "Secure E-commerce for insurers",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "4--4",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)85692-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897856929",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:MCM,
  author =       "Anonymous",
  title =        "{Microsoft} closes E-mail service",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "4--4",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/1353485897900362",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:CPF,
  author =       "Anonymous",
  title =        "Cellular phone fraud prevention working?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "4--5",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)85694-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897856942",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:IUT,
  author =       "Anonymous",
  title =        "{Internet} used as {Trojan} horse",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "5--5",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90037-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900374",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:PDI,
  author =       "Anonymous",
  title =        "Providers divided over {Internet} proposal",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "5--5",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90038-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900386",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:IFN,
  author =       "Anonymous",
  title =        "Intranets to far out-number {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "5--6",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90039-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900398",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:NFM,
  author =       "Anonymous",
  title =        "Networks flooded with E-mail messages",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "6--6",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90040-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900404",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:GAV,
  author =       "Anonymous",
  title =        "Global anti-virus research programme launched",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "6--6",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90041-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900416",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:INSa,
  author =       "Anonymous",
  title =        "Integrated network security products",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "6--6",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90042-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900428",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:MTU,
  author =       "Anonymous",
  title =        "Multi-tier {Unix} security product offered",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "7--7",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90043-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589790043X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:NDS,
  author =       "Anonymous",
  title =        "New detection system takes on multi-million phone
                 fraud",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "7--8",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90044-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900441",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:DRN,
  author =       "Anonymous",
  title =        "Detection and repair for new online virus",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "8--8",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90045-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900453",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:RAS,
  author =       "Anonymous",
  title =        "Remote access solution to encrypt data",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "8--8",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90046-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900465",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Sechrist:1997:IPC,
  author =       "Douglas Sechrist",
  title =        "{Internet} phone calls breaking through corporate
                 firewalls",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "8--9",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90047-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900477",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1997:SFN,
  author =       "Atoosa Savarnejad",
  title =        "Sparks fly over {NT} security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "9--10",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90049-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900490",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Breitrose:1997:HHI,
  author =       "Charlie Breitrose",
  title =        "Hackers hit {ISPs} by the dozens",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "9--9",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90048-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900489",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1997:ANS,
  author =       "Atoosa Savarnejad",
  title =        "Another {NT} security hole discovered",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "10--11",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90050-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900507",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Capen:1997:CPA,
  author =       "Ian Capen",
  title =        "{Check Point} announces security software alliance",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "11--11",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90051-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900519",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:CTL,
  author =       "Anonymous",
  title =        "To catch a thief \ldots{} unmasking the telecoms
                 fraudster",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "12--13",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90052-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900520",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1997:MNSe,
  author =       "Fred Cohen",
  title =        "Managing network security --- {Part 6}: Computer games
                 and network security management",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "14--18",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90053-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900532",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Lindup:1997:WLM,
  author =       "Ken Lindup",
  title =        "Would {Lenin} make a good security officer?",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "19--19",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90054-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900544",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:Ee,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "5",
  pages =        "20--20",
  month =        may,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90055-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:07 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900556",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:MV,
  author =       "Anonymous",
  title =        "{Metamail} vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "2--2",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89514-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897895141",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:IRP,
  author =       "Anonymous",
  title =        "{IRIX} {\tt runpriv} program vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "2--3",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89515-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897895153",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:VSX,
  author =       "Anonymous",
  title =        "Vulnerability with {Solaris 2.x PC} buffer overflow",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "3--3",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89516-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897895165",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1997:ISC,
  author =       "Atoosa Savarnejad",
  title =        "{ISP} security consortium formed",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "4--4",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89518-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897895189",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:IO,
  author =       "Anonymous",
  title =        "{Internet} is on its own",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "4--4",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89517-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897895177",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:NSA,
  author =       "Anonymous",
  title =        "{NSA} sued for algorithm",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "4--4",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90007-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900076",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:ECD,
  author =       "Anonymous",
  title =        "Experts claim {DTI}'s scheme has catastrophic flaws",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "4--5",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89519-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897895190",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:WDS,
  author =       "Anonymous",
  title =        "Worldwide debut for {SKIP}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "5--5",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89522-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897895220",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:BUF,
  author =       "Anonymous",
  title =        "Breakthrough for {UK} firm with {US} encryption
                 restrictions",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "5--5",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89521-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897895219",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:LDR,
  author =       "Anonymous",
  title =        "Low data rate communications security improved",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "5--5",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89520-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897895207",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:DPM,
  author =       "Anonymous",
  title =        "Data protected at most finite level",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "5--6",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89523-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897895232",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:EAJ,
  author =       "Anonymous",
  title =        "Encryption and authentication for {Java}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "6--6",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89525-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897895256",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:NBF,
  author =       "Anonymous",
  title =        "{NT}-based firewall for mixed {TCP\slash IP} and {IPX}
                 networks",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "6--6",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89524-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897895244",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1997:PTU,
  author =       "Atoosa Savarnejad",
  title =        "{Princeton} team uncovers flaw in {Java}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "6--7",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89526-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897895268",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1997:AMS,
  author =       "Atoosa Savarnejad",
  title =        "{AOL4FREE} makes second round as {Trojan} horse
                 infection",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "7--7",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89528-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897895281",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Breitrose:1997:TMO,
  author =       "Charlie Breitrose",
  title =        "Trend Micro offers free virus protection from the
                 {Web}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "7--7",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89527-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589789527X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hansen:1997:NIS,
  author =       "Lesley Hansen",
  title =        "Network infrastructure security",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "8--12",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89529-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897895293",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1997:MNSf,
  author =       "Fred Cohen",
  title =        "Managing network security --- {Part 7}: Prevent,
                 detect and respond",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "13--16",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89530-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589789530X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Saxby:1997:PCI,
  author =       "Stephen Saxby",
  title =        "Policies for cyberspace --- Illegal content on the
                 {Internet}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "16--19",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89531-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897895311",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:Ef,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "6",
  pages =        "20--20",
  month =        jun,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)90008-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:09 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897900088",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Breitrose:1997:CHG,
  author =       "Charlie Breitrose",
  title =        "Computer hacking glitch for {Ramsey} murder
                 investigators",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "2--2",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89862-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898625",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:NNS,
  author =       "Anonymous",
  title =        "{Netscape Navigator} security problem",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "2--2",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89861-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898613",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:SSA,
  author =       "Anonymous",
  title =        "{Solaris solstice AdminSuite} vulnerabilities",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "3--3",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89863-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898637",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:VP,
  author =       "Anonymous",
  title =        "Vulnerability in the {\tt at}(1) program",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "3--4",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89864-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898649",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Szweda:1997:EYL,
  author =       "Roy Szweda",
  title =        "{Ernst \& Young LLP} --- {WheelGroup Corp.} alliance",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "4--4",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89866-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898662",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:SCVa,
  author =       "Anonymous",
  title =        "{SunOS} {\tt chkey} vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "4--4",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89865-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898650",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:API,
  author =       "Anonymous",
  title =        "Alliance provides {Internet} security to large
                 enterprises",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "4--5",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89867-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898674",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1997:MOE,
  author =       "Atoosa Savarnejad",
  title =        "{Microsoft} to offer enhanced firewall features in new
                 server",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "5--5",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89869-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898698",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:LTR,
  author =       "Anonymous",
  title =        "{Lucent Technologies} to resell {Raptor}'s firewalls",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "5--5",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89868-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898686",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:AUH,
  author =       "Anonymous",
  title =        "{AOL} users hit further problems with hackers",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "6--6",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89871-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898716",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Szweda:1997:STF,
  author =       "Roy Szweda",
  title =        "{Sun} takes on {Feds} over {US} encryption
                 regulations",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "6--6",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89870-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898704",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Breitrose:1997:MJW,
  author =       "Charlie Breitrose",
  title =        "{Microsoft} joins {Web} security consortium",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "6--7",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89872-8",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898728",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Szweda:1997:HFS,
  author =       "Roy Szweda",
  title =        "Holographic fingerprint security device",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "7--7",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89874-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898741",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:UEL,
  author =       "Anonymous",
  title =        "{US} export licence for $ 128$-bit encryption for
                 {Microsoft}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "7--7",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89873-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348589789873X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Szweda:1997:ESW,
  author =       "Roy Szweda",
  title =        "Encryption software for {Windows}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "8--8",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89877-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898777",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:SPO,
  author =       "Anonymous",
  title =        "{SessionWall-3} protects organizations from abuse",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "8--8",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89876-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898765",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:EIM,
  author =       "Anonymous",
  title =        "Enhancements to improve model for signing {Internet}
                 Code",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "8--8",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89875-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898753",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Savarnejad:1997:GAD,
  author =       "Atoosa Savarnejad",
  title =        "Group asks for disclosure of travel records of crypto
                 czar",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "8--9",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89878-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898789",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Breitrose:1997:ALD,
  author =       "Charlie Breitrose",
  title =        "{American} legislators debate encryption laws",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "9--10",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89879-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898790",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Breitrose:1997:WSG,
  author =       "Charlie Breitrose",
  title =        "{Web} security group unveils certification programme",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "10--10",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89880-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898807",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Madsen:1997:KEE,
  author =       "Wayne Madsen",
  title =        "{Key Escrow Encryption Bill} hits {Congress}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "11--12",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89881-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898819",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:1997:MNSg,
  author =       "Fred Cohen",
  title =        "Managing network security --- {Part 8}: Relativistic
                 risk assessment",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "13--14",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89882-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898820",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Schultz:1997:BRIa,
  author =       "Eugene Schultz",
  title =        "Book Review: {{\booktitle{Internet security: Risk
                 analysis, strategies, and firewalls}}: Othmar Kyas,
                 International Thomson Computer Press, 1997}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "7",
  pages =        "15--15",
  month =        jul,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)89883-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897898832",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:WNN,
  author =       "Anonymous",
  title =        "{Windows NT NtOpenProcessToken} vulnerability",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "8",
  pages =        "2--2",
  month =        aug,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83224-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:12 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897832242",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:1997:VLb,
  author =       "Anonymous",
  title =        "Vulnerability in {\tt ld.so}",
  journal =      j-NETWORK-SECURITY,
  volume =       "1997",
  number =       "8",
  pages =        "2--2",
  month =        aug,
  year =         "1997",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(97)83223-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 16:57:12 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485897832230",
  acknowledgement =