@Preamble{
"\hyphenation{
}" #
"\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|http://www.math.utah.edu/~beebe/|"}
@String{j-NETWORK-SECURITY = "Network Security"}
@Article{Steffora:1994:UEC,
author = "Ann Steffora",
title = "User education critical to effective network
security",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "2--2",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900280",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Steffora:1994:ICM,
author = "Ann Steffora",
title = "{Internet} community has many ways to handle security
infringements",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "3--3",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900299",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:FFC,
author = "Anonymous",
title = "Flaw found in {Clipper} technology",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "3--4",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900302",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:J,
author = "Anonymous",
title = "Junkie",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "4--4",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900310",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:WDS,
author = "Anonymous",
title = "Wireless data services take-off",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "4--4",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900329",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:MDC,
author = "Anonymous",
title = "Mobile data comms market sees rapid growth",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "4--5",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900337",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:UIP,
author = "Anonymous",
title = "{UK} invests in photonics",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "5--5",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900345",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:NDF,
author = "Anonymous",
title = "{Nynex} develops fibre-optic infrastracture",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "5--5",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900353",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:PUP,
author = "Anonymous",
title = "{Proginet} unveils plan to link {IBM} mainframes to
{Netware}",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "5--5",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900361",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:ULP,
author = "Anonymous",
title = "{US} legislature pushes for uniform online health
privacy rules",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "5--6",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589490037X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:ERB,
author = "Anonymous",
title = "Encryption restrictions bind manufacturer's hands",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "6--6",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900388",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:EC,
author = "Anonymous",
title = "Electronic cash",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "6--6",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900396",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:CC,
author = "Anonymous",
title = "{CyberSAFE Challenger 5.2.1}",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "7--7",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589490040X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:SSS,
author = "Anonymous",
title = "{SDI} secures {Shiva LANs}",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "7--7",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900418",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:SM,
author = "Anonymous",
title = "Security manager",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "7--7",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900426",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:INS,
author = "Anonymous",
title = "Increased {NetSP} security",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "7--7",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900434",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Michaels:1994:LUL,
author = "Steven Michaels",
title = "{LAN} users are lax on security",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "8--8",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900442",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Riggs:1994:COC,
author = "Brian Riggs",
title = "Cracking down on online crime",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "8--8",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900450",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Highland:1994:HSD,
author = "Harold Joseph Highland",
title = "How secure is data over the {Internet}?",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "9--11",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900469",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Peterson:1994:FMT,
author = "Padgett Peterson",
title = "The fortress mentality: Its time has come again",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "12--13",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900477",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hancock:1994:IPS,
author = "William M. Hancock",
title = "Issues and problems in secure remote access",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "14--18",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900485",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Lindup:1994:TRH,
author = "Ken Lindup",
title = "Is there a role for hackers in polite society?",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "6",
pages = "19--19",
month = jun,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:17 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900493",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Armstrong:1994:PNS,
author = "Lisa Armstrong",
title = "Are public networks safe?",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "7",
pages = "2--2",
month = jul,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:19 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900019",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Snell:1994:PIN,
author = "Monica Snell",
title = "Protecting the internal network",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "7",
pages = "2--2",
month = jul,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:19 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900027",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{English:1994:CNI,
author = "Erin English",
title = "Cache of nude images found at nuclear weapons lab",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "7",
pages = "2--3",
month = jul,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:19 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900035",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Snell:1994:UUI,
author = "Monica Snell",
title = "Users upset over {Internet} ads",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "7",
pages = "3--3",
month = jul,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:19 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900043",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:CCD,
author = "Anonymous",
title = "Changes to come for {DCS}",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "7",
pages = "3--4",
month = jul,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:19 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900051",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:LMO,
author = "Anonymous",
title = "{LAN} mail to overtake host mail",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "7",
pages = "4--4",
month = jul,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:19 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589490006X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:NPS,
author = "Anonymous",
title = "{Novell} and {PC} security collaborate",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "7",
pages = "4--4",
month = jul,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:19 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900078",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:CAM,
author = "Anonymous",
title = "Communications available to more countries",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "7",
pages = "4--4",
month = jul,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:19 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900086",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Snell:1994:LNI,
author = "Monica Snell",
title = "{Lotus} notes the {Internet} advantage",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "7",
pages = "4--5",
month = jul,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:19 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900094",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Armstrong:1994:SN,
author = "Lisa Armstrong",
title = "A sparekey to {Netware}",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "7",
pages = "5--5",
month = jul,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:19 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900108",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Lawrence:1994:SCS,
author = "L. G. Lawrence",
title = "Security in a client server environment",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "7",
pages = "5--15",
month = jul,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:19 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900116",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Gordon:1994:SSH,
author = "S. Gordon and I. Nedelchev",
title = "Sniffing in the sun: History of a disaster",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "7",
pages = "16--19",
month = jul,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:19 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900124",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:Ea,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "7",
pages = "20--20",
month = jul,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:19 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900132",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:UCC,
author = "Anonymous",
title = "{US} companies count {Internet} security options",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "2--2",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900736",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:SCI,
author = "Anonymous",
title = "Security for commerce on the {Internet}",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "2--2",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900744",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:RCS,
author = "Anonymous",
title = "Ring of crime in {Scotland}",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "2--3",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900752",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:CMI,
author = "Anonymous",
title = "{CIA} to mine {Internet}",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "3--3",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900760",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:IVC,
author = "Anonymous",
title = "{IBM}'s virus collection grows",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "3--3",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900779",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:RNT,
author = "Anonymous",
title = "Rise in number of teleworkers",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "4--4",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900787",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:HWD,
author = "Anonymous",
title = "Home workers demand {ISDN}",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "4--4",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900795",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:MPN,
author = "Anonymous",
title = "Mobile phone network promoted",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "4--4",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900809",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:HRO,
author = "Anonymous",
title = "High-rise optic links",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "4--4",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900817",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:FRS,
author = "Anonymous",
title = "Fund raising for satellite phone system",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "4--5",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900825",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:IRL,
author = "Anonymous",
title = "Improved remote {LAN} access",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "5--5",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900833",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:SAC,
author = "Anonymous",
title = "Secure access for councillors",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "5--5",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900841",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:RLO,
author = "Anonymous",
title = "{Raxco} launches {\tt omniguard}",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "5--5",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589490085X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:NFS,
author = "Anonymous",
title = "New firewall server launched",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "5--5",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900868",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:BAN,
author = "Anonymous",
title = "{Bell Atlantic} network delayed",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "5--6",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900876",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:RN,
author = "Anonymous",
title = "Revamping the net!",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "6--6",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900884",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:PME,
author = "Anonymous",
title = "{PGP} misconceptions explained",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "6--6",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900892",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:CPFa,
author = "Anonymous",
title = "Cellular phone fraud",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "7--10",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900906",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hancock:1994:IF,
author = "Bill Hancock",
title = "{Internet} firewalls",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "10--11",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900914",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Peterson:1994:FMP,
author = "Padgett Peterson",
title = "The fortress mentality --- {Part II}: The {Internet}",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "11--14",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900922",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Ongetta:1994:EP,
author = "Silvano Ongetta",
title = "Effectiveness of passwords",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "14--17",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900930",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Schifreen:1994:WMH,
author = "Robert Schifreen",
title = "What motivates a hacker?",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "17--19",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900949",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:Eb,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "8",
pages = "19--20",
month = aug,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:20 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900957",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:HTC,
author = "Anonymous",
title = "High-tech calling-card number theft",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "2--2",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901554",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:BBO,
author = "Anonymous",
title = "{Bulletin} board operators fined for piracy",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "2--2",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901562",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:OP,
author = "Anonymous",
title = "Online privacy",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "2--2",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901570",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:IBH,
author = "Anonymous",
title = "The {Internet} becomes the high seas of piracy",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "2--3",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901589",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:CCP,
author = "Anonymous",
title = "Combatting cellular phone fraud",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "3--3",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901597",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:UGW,
author = "Anonymous",
title = "{US} government wiretapping updated",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "3--3",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901600",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:SHO,
author = "Anonymous",
title = "Self-healing optical networks",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "3--4",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901619",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:NUD,
author = "Anonymous",
title = "New {UK} data protection registrar",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "4--4",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901627",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:NJ,
author = "Anonymous",
title = "Net judges",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "4--4",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901635",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:AVU,
author = "Anonymous",
title = "{Australian} virus update",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "4--5",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901643",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:UMM,
author = "Anonymous",
title = "{UK} messaging market commandeered",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "5--5",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901651",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:GTG,
author = "Anonymous",
title = "Global telecoms growth",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "5--5",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589490166X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:TIS,
author = "Anonymous",
title = "{Taiwan} invests in the superhighway era",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "5--5",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901678",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:HSO,
author = "Anonymous",
title = "High-speed optical test bed",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "5--5",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901686",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:BBC,
author = "Anonymous",
title = "{Baby Bells} commit to multimedia",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "5--6",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901694",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:ECD,
author = "Anonymous",
title = "{Ericsson} cooperates with {DynaSoft} on security",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "6--6",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901708",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:MTA,
author = "Anonymous",
title = "{Microsoft} and {Telekom} announce multimedia
venture",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "6--6",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901716",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:VPS,
author = "Anonymous",
title = "Virus protection system for networks",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "6--6",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901724",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:NAN,
author = "Anonymous",
title = "{Norton} administrator for networks 1.5",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "6--6",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901732",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cheek:1994:SHK,
author = "Martin Cheek",
title = "{Sidewinder} helps keep {Internet} better secured",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "6--7",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901740",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Snell:1994:PBM,
author = "Monica Snell",
title = "Policies bring more security to E-mail",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "7--7",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901759",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hancock:1994:HPM,
author = "Bill Hancock",
title = "Hazards of promiscuous mode programming",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "8--9",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901767",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hruska:1994:VCN,
author = "Jan Hruska",
title = "Virus control on networks: Solving the unsolvable",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "10--13",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901775",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hansen:1994:UND,
author = "Lesley Hansen",
title = "Use of network design to reduce security risks",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "13--17",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901783",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Schifreen:1994:PSP,
author = "Robert Schifreen",
title = "Preventing software piracy",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "17--19",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901791",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:Ed,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "9",
pages = "20--20",
month = sep,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:21 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901805",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:SLB,
author = "Anonymous",
title = "Security leak at {BT}",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "2--2",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900507",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:CAS,
author = "Anonymous",
title = "Computer abuse surveys",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "2--2",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900515",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:ILF,
author = "Anonymous",
title = "{Internet} liberation front",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "2--3",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900523",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:PCH,
author = "Anonymous",
title = "Pressure to charge hacker",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "3--3",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900531",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:CPFb,
author = "Anonymous",
title = "Cellular phone fraud arrest",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "3--3",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589490054X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:IPS,
author = "Anonymous",
title = "{Internet} pirates sale again",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "3--4",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900558",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:NEI,
author = "Anonymous",
title = "Nationwide {EDI} for {India}",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "4--4",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900566",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:TGF,
author = "Anonymous",
title = "{Toronto} gets {Free-Net}",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "4--4",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900574",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:MLN,
author = "Anonymous",
title = "{Microsoft} launch new online service",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "4--4",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900582",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:PND,
author = "Anonymous",
title = "{PC} network disaster recovery",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "5--5",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900590",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:GCB,
author = "Anonymous",
title = "The great `cyber-bucks' give away",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "5--5",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900604",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:HSS,
author = "Anonymous",
title = "High speed switching and networking",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "5--5",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900612",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:CUP,
author = "Anonymous",
title = "Checks for under-performing networks",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "5--5",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900620",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:CSN,
author = "Anonymous",
title = "Crime and security network",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "6--6",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900639",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:EEM,
author = "Anonymous",
title = "{EU} ends monopolies on phone networks",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "6--6",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900647",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Armstrong:1994:IC,
author = "Lisa Armstrong",
title = "{Internet} copyrights",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "6--6",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900655",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{English:1994:IWP,
author = "Erin English",
title = "{Internet} white pages with {PGP}",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "7--7",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900663",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cheek:1994:FTC,
author = "Martin Cheek",
title = "Financial transactions to come onto the {Internet}",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "7--7",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900671",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Armstrong:1994:PDS,
author = "Lisa Armstrong",
title = "{PersonaCard 100} data security token",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "7--8",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589490068X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hancock:1994:NKF,
author = "Bill Hancock",
title = "Naming is the key to the future",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "8--9",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900698",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Gordon:1994:ISC,
author = "Sara Gordon",
title = "{IRC} and security --- Can the two co-exist?",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "10--17",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900701",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Schifreen:1994:HHD,
author = "Robert Schifreen",
title = "How hackers do it",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "17--19",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589490071X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:Ee,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "10",
pages = "20--20",
month = oct,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:22 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900728",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:LWN,
author = "Anonymous",
title = "{LAN\slash WAN} news",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "11",
pages = "2--5",
month = nov,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:24 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900965",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Madsen:1994:CC,
author = "Wayne Madsen",
title = "The {Clipper} controversy",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "11",
pages = "6--11",
month = nov,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:24 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900973",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Doyle:1994:TLS,
author = "Frank Doyle",
title = "Tricks of the {LAN} security trade",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "11",
pages = "12--13",
month = nov,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:24 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900981",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Madsen:1994:OIE,
author = "Wayne Madsen",
title = "Online industrial espionage",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "11",
pages = "14--18",
month = nov,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:24 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589490099X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Lindup:1994:CIU,
author = "Ken Lindup",
title = "Commercial {Internet} use: a new risk?",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "11",
pages = "19--19",
month = nov,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:24 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901007",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:Ef,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "11",
pages = "20--20",
month = nov,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:24 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894901015",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:PCD,
author = "Anonymous",
title = "Piracy charges dismissed against {LaMacchia}",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "12",
pages = "2--2",
month = dec,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:25 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900140",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:CSS,
author = "Anonymous",
title = "Computers security support centre set up",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "12",
pages = "2--3",
month = dec,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:25 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900159",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:CMN,
author = "Anonymous",
title = "Corporate move to the net",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "12",
pages = "3--3",
month = dec,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:25 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900167",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:CVG,
author = "Anonymous",
title = "Cellular on the verge of going mass market",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "12",
pages = "3--3",
month = dec,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:25 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900175",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:AAA,
author = "Anonymous",
title = "{Axent} announces acquisition of datamedia",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "12",
pages = "4--4",
month = dec,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:25 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900183",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:VAP,
author = "Anonymous",
title = "Virus alert program for information highway users",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "12",
pages = "4--4",
month = dec,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:25 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900191",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:KMP,
author = "Anonymous",
title = "Keeping e-mail private",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "12",
pages = "4--4",
month = dec,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:25 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900205",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:SNM,
author = "Anonymous",
title = "Secure network management initiative",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "12",
pages = "4--4",
month = dec,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:25 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900213",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Armstrong:1994:BAS,
author = "Lisa Armstrong",
title = "{Bank of America} secures the {Internet}",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "12",
pages = "4--5",
month = dec,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:25 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900221",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hall:1994:LBL,
author = "Phil Hall",
title = "Laser beams as a {LAN} connectivity alternative",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "12",
pages = "5--6",
month = dec,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:25 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589490023X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Schwartau:1994:NN,
author = "Winn Schwartau",
title = "To net or not to net?",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "12",
pages = "7--11",
month = dec,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:25 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900248",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Crocker:1994:IMI,
author = "Norman Crocker",
title = "An introduction to {MVS} integrity concerns",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "12",
pages = "12--16",
month = dec,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:25 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900256",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Peterson:1994:DLA,
author = "Padgett Peterson",
title = "Dangerous letters: {ANSI} bombs and forged e-mail",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "12",
pages = "17--19",
month = dec,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:25 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900264",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1994:Eg,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1994",
number = "12",
pages = "19--20",
month = dec,
year = "1994",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:25 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485894900272",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:ISA,
author = "Anonymous",
title = "{IP} spoofing attacks latest threat",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "2--2",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90059-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485898900599",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:OC,
author = "Anonymous",
title = "Organizations in cyberspace",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "2--2",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90060-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485898900605",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:RBF,
author = "Anonymous",
title = "{Russians} better at fighting phone fraud",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "2--3",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90061-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485898900617",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:BVS,
author = "Anonymous",
title = "A boom in {VAN} services",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "3--3",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90062-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485898900629",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:LS,
author = "Anonymous",
title = "The {LAN} surges on",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "3--3",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90063-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485898900630",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:CSM,
author = "Anonymous",
title = "{Concert} seeking 10\% of market",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "3--3",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90064-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485898900642",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SSD,
author = "Anonymous",
title = "{Securicor} supplies data security business service",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "3--4",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90065-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485898900654",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:CCD,
author = "Anonymous",
title = "{CyberSource}, the cyber-distributor",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "4--4",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90066-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485898900666",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:NMR,
author = "Anonymous",
title = "Network monitoring report generation system",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "4--4",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90067-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485898900678",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Armstrong:1995:AI,
author = "Lisa Armstrong",
title = "{AT\&T IVES}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "4--5",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90068-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589890068X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:NLSa,
author = "Anonymous",
title = "New level of security for global electronic trading",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "5--5",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90069-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485898900691",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FTT,
author = "Anonymous",
title = "Fault-tolerant {TCP\slash IP} for {LAN} to mainframe
connectivity",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "5--5",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90070-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485898900708",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:AII,
author = "Anonymous",
title = "Award for {IBM}'s {Internet} security firewall",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "5--5",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90071-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589890071X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FNS,
author = "Anonymous",
title = "Flood of network security products",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "5--6",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90072-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485898900721",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{English:1995:SKS,
author = "Erin English",
title = "{MIT} scales up {Kerberos} security system for
{Internet}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "6--6",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90073-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485898900733",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{English:1995:NCP,
author = "Erin English",
title = "A new certification programme for network security",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "6--7",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90074-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485898900745",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{English:1995:SMS,
author = "Erin English",
title = "Security made simple with {SOCKS}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "7--7",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90075-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485898900757",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Wolfe:1995:IT,
author = "Henry Wolfe",
title = "The {Internet} threat",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "7--8",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)80038-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485800800380",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Schwartau:1995:PAPa,
author = "Winn Schwartau",
title = "Password alternatives --- {Part 1}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "9--13",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)80039-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485800800392",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Kovacich:1995:LAN,
author = "Gerald L. Kovacich",
title = "Local area networks security: Establishing policies
and procedures",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "13--16",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)80040-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485800800409",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Saxby:1995:EMP,
author = "Stephen Saxby",
title = "Electronic monitoring poses E-mail dilemma",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "17--18",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90076-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485898900769",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Zajac:1995:BRM,
author = "Bernard P. Zajac",
title = "Book Review: {{\booktitle{E-{Mail} Security --- How To
Keep Your Electronic Messages Private}}: Bruce
Schneier, published by John Wiley \& Sons at \$24.95.
ISBN 0-471-05318-X}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "18--19",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90077-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485898900770",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:Ea,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "1",
pages = "20--20",
month = jan,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(98)90078-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:26 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485898900782",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:TEV,
author = "Anonymous",
title = "{Telnet} encryption vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "2--2",
month = feb,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901132",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:VM,
author = "Anonymous",
title = "Vulnerabilities in {\tt /bin/mail}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "2--3",
month = feb,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901140",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:HLT,
author = "Anonymous",
title = "Hacker leaves threatening messages",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "3--3",
month = feb,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901159",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Lindup:1995:MA,
author = "Ken Lindup",
title = "{Mitnick} arrested",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "3--4",
month = feb,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901167",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:BCA,
author = "Anonymous",
title = "{BR} complains about counterfeit {NetWare}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "4--4",
month = feb,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901175",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:GCG,
author = "Anonymous",
title = "Global communications group formed",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "4--4",
month = feb,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901183",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SCI,
author = "Anonymous",
title = "Support for corporate {Internet} users",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "4--4",
month = feb,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901191",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:MNR,
author = "Anonymous",
title = "{Microsoft Network} receives mixed response",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "4--5",
month = feb,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901205",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:OBG,
author = "Anonymous",
title = "Online banking growth",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "5--5",
month = feb,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901213",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:DPB,
author = "Anonymous",
title = "Draft plans to break {European} telecoms monopolies",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "5--5",
month = feb,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901221",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:GW,
author = "Anonymous",
title = "The growing {Web}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "5--5",
month = feb,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589590123X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:EUN,
author = "Anonymous",
title = "Eliminate unauthorized network access",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "5--6",
month = feb,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901248",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Snell:1995:SSI,
author = "Monica Snell",
title = "Secure shopping on the {Internet}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "6--6",
month = feb,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901256",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Armstrong:1995:ES,
author = "Lisa Armstrong",
title = "Endorsements for {SHTTP}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "6--7",
month = feb,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901264",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{English:1995:PTP,
author = "Erin English",
title = "Passwords through pagers",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "7--7",
month = feb,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901272",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hancock:1995:ARN,
author = "Bill Hancock",
title = "Assessing and reducing network risk",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "7--9",
month = feb,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)80041-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485800800410",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Zajac:1995:CVL,
author = "Bernard P. Zajac",
title = "Computer viruses --- Legal options",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "9--10",
month = feb,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)80042-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485800800422",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Schwartau:1995:PAPb,
author = "Winn Schwartau",
title = "Password alternatives --- {Part 2}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "11--15",
month = feb,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)80043-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485800800434",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Kovacich:1995:SRV,
author = "Gerald Kovacich",
title = "Security requirements for voice messaging operations",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "15--18",
month = feb,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)80044-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485800800446",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Lindup:1995:HW,
author = "Ken Lindup",
title = "The hacker war",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "19--19",
month = feb,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901280",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:Eb,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "2",
pages = "20--20",
month = feb,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:27 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901299",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SV,
author = "Anonymous",
title = "{Sendmail} vulnerabilities",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "3",
pages = "2--2",
month = mar,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:29 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901302",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:CVa,
author = "Anonymous",
title = "`{\tt at}' and `{\tt cron}' vulnerabilities",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "3",
pages = "2--3",
month = mar,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:29 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901310",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:PAV,
author = "Anonymous",
title = "Providers not accountable for virus distribution",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "3",
pages = "3--3",
month = mar,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:29 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901329",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:NSSa,
author = "Anonymous",
title = "{Natas} spreads in southwestern {United States}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "3",
pages = "3--3",
month = mar,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:29 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901337",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:BOI,
author = "Anonymous",
title = "Boom in online information",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "3",
pages = "3--4",
month = mar,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:29 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901345",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:AOP,
author = "Anonymous",
title = "{America Online} plans to sell 5\% stake",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "3",
pages = "4--4",
month = mar,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:29 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901353",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:ACN,
author = "Anonymous",
title = "{ACE\slash Client} for {NetWare}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "3",
pages = "4--4",
month = mar,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:29 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589590137X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:NEA,
author = "Anonymous",
title = "New {Ethernet} adapter card",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "3",
pages = "4--4",
month = mar,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:29 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901361",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SBL,
author = "Anonymous",
title = "Small businesses link through {BT}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "3",
pages = "4--5",
month = mar,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:29 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901388",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Riggs:1995:TTR,
author = "Brian Riggs",
title = "Top to tail router security",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "3",
pages = "5--5",
month = mar,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:29 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901396",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Snell:1995:ASS,
author = "Monica Snell",
title = "{AT\&T} strengthen security of {Network Notes}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "3",
pages = "5--5",
month = mar,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:29 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589590140X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Thomsen:1995:ISS,
author = "Dan Thomsen",
title = "{IP} spoofing and session hijacking",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "3",
pages = "6--11",
month = mar,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)80045-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:29 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485800800458",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Sheffield:1995:NRPa,
author = "Chris Sheffield",
title = "Network review --- {Part 1}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "3",
pages = "11--16",
month = mar,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)80046-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:29 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348580080046X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Lindup:1995:AKM,
author = "Ken Lindup",
title = "The arrest of {Kevin Mitnick}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "3",
pages = "16--19",
month = mar,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)80047-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:29 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485800800471",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:Ec,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "3",
pages = "20--20",
month = mar,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:29 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901418",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:GTH,
author = "Anonymous",
title = "`{Good Times}' is a hoax",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "2--2",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897005",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SCD,
author = "Anonymous",
title = "{Satan} costs developer his job",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "2--2",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902090",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:HCC,
author = "Anonymous",
title = "Hacker charged in {Canada}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "2--2",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902104",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:CPH,
author = "Anonymous",
title = "Child porn hacker sentenced",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "2--3",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902112",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:BEG,
author = "Anonymous",
title = "{BT} engineer guilty of piracy",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "3--3",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897017",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:WWW,
author = "Anonymous",
title = "{World Wide Web} needs a security boost",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "3--3",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902120",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:BMM,
author = "Anonymous",
title = "{BT} makes moves in {Sweden} and {Italy}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "3--4",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902139",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FLM,
author = "Anonymous",
title = "Fibre links for major buildings",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "4--4",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902147",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:IIS,
author = "Anonymous",
title = "Investing in {Internet} security",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "4--4",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902155",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:III,
author = "Anonymous",
title = "{IBM} increases {Internet} services",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "4--4",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902163",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:PDS,
author = "Anonymous",
title = "Private drive on superhighway",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "4--5",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902171",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:UPF,
author = "Anonymous",
title = "Users prefer frame relay",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "5--5",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589590218X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SDE,
author = "Anonymous",
title = "{SentryLink} data encryption devices",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "5--5",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902201",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:MPB,
author = "Anonymous",
title = "{MCI} and {Pacific Bell} offer {Internet} services",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "5--5",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902198",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FTW,
author = "Anonymous",
title = "Fault tolerant {Web} server",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "6--6",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589590221X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:DAS,
author = "Anonymous",
title = "{Defender} authentication software",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "6--6",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902228",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:NSPa,
author = "Anonymous",
title = "Network Security Plus",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "6--7",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902236",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Armstrong:1995:C,
author = "Lisa Armstrong",
title = "{CyberGuard}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "7--7",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897029",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Armstrong:1995:IT,
author = "Lisa Armstrong",
title = "Info-Terrorism",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "7--8",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897030",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Armstrong:1995:SP,
author = "Lisa Armstrong",
title = "Secure {PBX}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "8--8",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897042",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Riggs:1995:VA,
author = "Brian Riggs",
title = "Vaulting with {ATM}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "8--9",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897054",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Sheffield:1995:NRPb,
author = "Chris Sheffield",
title = "Network review --- {Part 2}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "9--13",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897078",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Armstrong:1995:OSC,
author = "Lisa Armstrong",
title = "{Oracle Secure C/S}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "9--9",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897066",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Saxby:1995:GSP,
author = "Stephen Saxby",
title = "{G7 Summit} poses challenge to governments on public
access to official information",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "14--15",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589689708X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:Ed,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "4",
pages = "15--16",
month = apr,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:30 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902244",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:BHT,
author = "Anonymous",
title = "The birth of the `hacker-tracker'",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "2--2",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901922",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:DIS,
author = "Anonymous",
title = "Developments in {Internet} security",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "2--2",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901930",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:KFH,
author = "Anonymous",
title = "{Korea} fights the hackers",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "2--2",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901949",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FNI,
author = "Anonymous",
title = "Fears of {Net} insecurity",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "2--3",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901957",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FAH,
author = "Anonymous",
title = "Fixes for {AIX} holes",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "3--3",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901965",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FUF,
author = "Anonymous",
title = "Firewalls under fire",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "3--4",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901973",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FFA,
author = "Anonymous",
title = "Further fights against mobile phone fraud",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "4--5",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901981",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:IIN,
author = "Anonymous",
title = "{Internet} interest not necessarily business",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "5--5",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589590199X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:UFO,
author = "Anonymous",
title = "{US} fibre-optic cables set to triple",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "5--5",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902007",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:ISIa,
author = "Anonymous",
title = "{Internet} security issues addressed",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "5--6",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902015",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SUI,
author = "Anonymous",
title = "{SITA} unveils {Internet} service",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "6--6",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902023",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:CSS,
author = "Anonymous",
title = "Client\slash server security package",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "6--6",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589590204X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:NSI,
author = "Anonymous",
title = "{Netscape}'s {SSL Internet} security",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "6--6",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902031",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:AANa,
author = "Anonymous",
title = "{ANR} addresses network security issues",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "6--7",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902058",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SWS,
author = "Anonymous",
title = "Secrets for {Windows}, security for {Internet}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "7--7",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902066",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:PSN,
author = "Anonymous",
title = "{PCMCIA} security for notebooks and {Novell LANs}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "7--7",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902074",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{English:1995:IVH,
author = "Erin English",
title = "{IP Version 6} holds promise for the future",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "7--8",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897091",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bournellis:1995:PET,
author = "Cynthia Bournellis",
title = "Putting an end to too many passwords",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "8--8",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897108",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{English:1995:SDG,
author = "Erin English",
title = "{SATAN} does not go undetected",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "8--9",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589689711X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bucholtz:1995:SCS,
author = "Chris Bucholtz",
title = "Suit challenges status of cryptography as munition",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "9--9",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897121",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hancock:1995:SMY,
author = "Bill Hancock",
title = "Stop that E-mail! {You} are probably breaking the
law!",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "10--12",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897133",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Gordon:1995:DA,
author = "Sarah Gordon",
title = "{Devil}'s advocate",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "12--15",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897145",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Sheffield:1995:NRPc,
author = "Chris Sheffield",
title = "Network review --- {Part 3}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "15--19",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897157",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:Ee,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "5",
pages = "20--20",
month = may,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:32 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902082",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:CISa,
author = "Anonymous",
title = "{Cisco IOS} software vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "2--2",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901701",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:HMP,
author = "Anonymous",
title = "Hackers monitored police",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "2--2",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589590171X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:URS,
author = "Anonymous",
title = "Underground Reconnaissance Service",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "2--2",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901728",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:BBC,
author = "Anonymous",
title = "{Black Baron} convicted",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "2--3",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901736",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:HPC,
author = "Anonymous",
title = "Hackers penetrate college computers",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "3--3",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901744",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:OCT,
author = "Anonymous",
title = "Outfoxing the cellular thieves",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "3--3",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901752",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:BBF,
author = "Anonymous",
title = "{Bulter Bunny} found guilty",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "3--3",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901760",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:RPI,
author = "Anonymous",
title = "Row puts {Internet} provision in doubt",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "4--4",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901779",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:IGP,
author = "Anonymous",
title = "{Internet} goes private in {Brazil}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "4--4",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901787",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:IA,
author = "Anonymous",
title = "Infohighway in {Africa}?",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "4--4",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901795",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:ISIb,
author = "Anonymous",
title = "{Internet} steals international phone calls",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "4--5",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901809",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:MRA,
author = "Anonymous",
title = "{Mergent} reaches agreement with {Bull}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "5--5",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901817",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:EEW,
author = "Anonymous",
title = "{Europe} encrypts weather data",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "5--5",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897169",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:MNP,
author = "Anonymous",
title = "{Microsoft} network pushes into electronic commerce",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "5--6",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901825",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:BMA,
author = "Anonymous",
title = "Broad multimedia alliance",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "6--6",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901833",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:IMA,
author = "Anonymous",
title = "{ICL} and {Motorola} ally for network security",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "6--6",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901841",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:NSD,
author = "Anonymous",
title = "{Nortel} and {Shiva} direct {Internet} traffic",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "6--6",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589590185X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:MPS,
author = "Anonymous",
title = "{Motorola} pushes its security portfolio",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "6--7",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897170",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:NSA,
author = "Anonymous",
title = "Network security assessment tool",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "7--7",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901868",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:MHF,
author = "Anonymous",
title = "{Motorola} helps firms protect data",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "7--7",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901876",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FDB,
author = "Anonymous",
title = "Financial data backed up by {ISDN}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "7--7",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901884",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:ISIc,
author = "Anonymous",
title = "{Internet} security improved",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "7--8",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901892",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bucholtz:1995:NSB,
author = "Chris Bucholtz",
title = "Networks suffer backup blues",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "8--8",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901906",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:TSD,
author = "Anonymous",
title = "The {`TouchLock'} security device",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "8--8",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897182",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:IGF,
author = "Anonymous",
title = "{Indian} groups face increased {Government} electronic
surveillance",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "9--9",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897194",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Riggs:1995:CPF,
author = "Brian Riggs",
title = "{Church} puts freedom of {Internet} on trial",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "10--10",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897212",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bucholtz:1995:JSH,
author = "Chris Bucholtz",
title = "Judge says hacker deserves more time",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "10--10",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897200",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bucholtz:1995:STC,
author = "Chris Bucholtz",
title = "Security takes centre stage at {Internet} conference",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "10--11",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897224",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Kaneshige:1995:BI,
author = "Tom Kaneshige",
title = "Banking on the {Internet}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "11--11",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897236",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bucholtz:1995:UWG,
author = "Chris Bucholtz",
title = "{US} war games fought",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "11--12",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897248",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bucholtz:1995:NSF,
author = "Chris Bucholtz",
title = "Network security far too lax",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "12--12",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589689725X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hancock:1995:SSE,
author = "Bill Hancock",
title = "Simple social engineering",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "13--14",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897261",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Worlock:1995:CCSa,
author = "David R. Worlock",
title = "The culture of control: Safeguarding intellectual
property in the age of networks --- {Part 1}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "14--17",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897273",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Saxby:1995:NRL,
author = "Stephen Saxby",
title = "Network-related law --- recent decisions from {USA}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "18--19",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897285",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:Ef,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "6",
pages = "20--20",
month = jun,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:33 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901914",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:PT,
author = "Anonymous",
title = "{PKZIP Trojan}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "2--2",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900942",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:RPC,
author = "Anonymous",
title = "Regulation of porn in cyberspace",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "2--2",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900950",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:CVb,
author = "Anonymous",
title = "{Caibua} virus",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "2--3",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900969",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:CFB,
author = "Anonymous",
title = "Campaign to fight \$3 billion a year problem",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "3--3",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900977",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SPP,
author = "Anonymous",
title = "{Swedish} pirates prosecuted",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "3--3",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900993",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:YVH,
author = "Anonymous",
title = "The year of the virus hoax",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "3--3",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900985",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SWR,
author = "Anonymous",
title = "Security worries with {Registration Wizard}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "4--4",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901000",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FAS,
author = "Anonymous",
title = "{Federal} agency to secure infohighway",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "4--4",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901019",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:NEV,
author = "Anonymous",
title = "New electronic verification standard",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "4--4",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901027",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:WOP,
author = "Anonymous",
title = "The worries of online purchasers",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "4--5",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901035",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:RN,
author = "Anonymous",
title = "Radio over the {Net}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "5--5",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901043",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:NEO,
author = "Anonymous",
title = "{Novell} and {EUNet} offer {Internet} connection",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "5--5",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589590106X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:EN,
author = "Anonymous",
title = "The electric network",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "5--5",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901051",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FKO,
author = "Anonymous",
title = "Firewalls to keep online spies at bay",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "6--6",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901078",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:WAV,
author = "Anonymous",
title = "{Windows} anti-virus virtual device driver",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "6--6",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901094",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:PGW,
author = "Anonymous",
title = "Protection as good as at the {Whitehouse}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "6--6",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901086",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:MSE,
author = "Anonymous",
title = "Message security for electronic communications",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "6--7",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901108",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SMM,
author = "Anonymous",
title = "Secure E-mail for {Microsoft-Mail} users",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "7--7",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897297",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Kaneshige:1995:GRS,
author = "Thomas Kaneshige",
title = "{Government}'s role in superhighway security",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "7--7",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901116",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Kaneshige:1995:SGU,
author = "Tom Kaneshige",
title = "Software giants unite to filter the {Net}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "8--8",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897303",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bucholtz:1995:VMS,
author = "Chris Bucholtz",
title = "{Visa} and {MasterCard} settle on {Internet} security
standard",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "8--9",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897315",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bucholtz:1995:EEC,
author = "Chris Bucholtz",
title = "Encryption exports, {Clipper} policy criticized by
consortium",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "9--9",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897327",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Beseke:1995:DCI,
author = "Kermit Beseke",
title = "Developing a corporate {Internet} policy",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "10--13",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897339",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Worlock:1995:CCSb,
author = "David R. Worlock",
title = "The culture of control: Safeguarding intellectual
property in the age of networks --- {Part 2}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "13--17",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897340",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Peterson:1995:FMPa,
author = "Padgett Peterson",
title = "The fortress mentality --- {Part III}: Tokens,
one-time password devices and the {Roman Army}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "17--19",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897352",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:Eg,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "7",
pages = "20--20",
month = jul,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:35 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901124",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FHC,
author = "Anonymous",
title = "{French} hacker cracks {Netscape} code",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "2--2",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900802",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SVV,
author = "Anonymous",
title = "{Sendmail V.5} vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "2--2",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900810",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:JBH,
author = "Anonymous",
title = "{Japanese} battle hackers, viruses",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "2--3",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900829",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:CBA,
author = "Anonymous",
title = "{Citicorp} bank accounts breached",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "3--3",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900837",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SEE,
author = "Anonymous",
title = "Stronger encryption exportable",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "3--3",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900845",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:BSA,
author = "Anonymous",
title = "Bringing security to {ATM}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "3--4",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900853",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:ENE,
author = "Anonymous",
title = "{Europe} negotiates over encryption",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "4--4",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900861",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:NGP,
author = "Anonymous",
title = "{Netscape} goes public",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "4--4",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589590087X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:AFN,
author = "Anonymous",
title = "{AT\&T} finally notices the {Internet}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "4--4",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900888",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:A,
author = "Anonymous",
title = "The authorizer",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "4--5",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900896",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:NLSb,
author = "Anonymous",
title = "{Netscape}'s latest security effort",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "5--5",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589590090X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:NGN,
author = "Anonymous",
title = "New generation network security product",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "5--5",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900926",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:NSE,
author = "Anonymous",
title = "{NetCop} scans for explicit material",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "5--5",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900918",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bucholtz:1995:PMP,
author = "Chris Bucholtz",
title = "{Pilot}'s E-mail has {Pentagon} up in arms",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "5--6",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897364",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Kaneshige:1995:FSS,
author = "Thomas Kaneshige",
title = "Full service security shop to ward off hackers",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "6--6",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897376",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Kaneshige:1995:SSR,
author = "Thomas Kaneshige",
title = "Security systems for the road most travelled",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "6--7",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897388",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bournellis:1995:IPD,
author = "Cynthia Bournellis",
title = "{Internet} project defines middle ground",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "7--7",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589689739X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{English:1995:CCJ,
author = "Erin English",
title = "{CyberCash} and {Checkfree} join forces",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "7--8",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897406",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1995:IHPa,
author = "Fred Cohen",
title = "{Internet} holes --- {Part 1}: {Internet} Control
Message Protocol",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "8--10",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589689742X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{English:1995:CUN,
author = "Erin English",
title = "{CyberAngels} unite on the net",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "8--8",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897418",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Shaer:1995:SS,
author = "Caroline Shaer",
title = "Single sign-on",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "11--15",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897431",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Ongetta:1995:EDI,
author = "Silvano Ongetta",
title = "Electronic Data Interchange --- What are the security
measures?",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "16--19",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897443",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:Eh,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "8",
pages = "19--20",
month = aug,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:37 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900934",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:NSSb,
author = "Anonymous",
title = "{Netscape}'s software security scare",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "2--2",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900594",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SPV,
author = "Anonymous",
title = "{Solaris} {\tt ps} vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "2--3",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900608",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:NSPb,
author = "Anonymous",
title = "New security patches from {Sun}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "3--3",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900616",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SSV,
author = "Anonymous",
title = "{Sun Sendmail {\tt -oR}} vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "3--4",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900624",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:UCT,
author = "Anonymous",
title = "Undercover cybercops trap hackers",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "4--4",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900632",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:TUI,
author = "Anonymous",
title = "Ties to {US} intelligence for domain name assigner",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "4--4",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900640",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:AOF,
author = "Anonymous",
title = "{America Online} fights hackers",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "4--4",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900659",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:OCP,
author = "Anonymous",
title = "Online child pornography debate continues",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "5--5",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900667",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:MWS,
author = "Anonymous",
title = "Malicious {Word} spreads to the {Net}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "5--5",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900675",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:DAV,
author = "Anonymous",
title = "Document about virus contains one",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "5--5",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900683",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Rees:1995:ELB,
author = "Frank Rees",
title = "An expensive lesson for bulletin board user",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "6--6",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900691",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:MISa,
author = "Anonymous",
title = "{Microsoft}'s {Internet} security claims criticized",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "6--6",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897455",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:ECP,
author = "Anonymous",
title = "Electronic cheques planned",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "6--7",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900705",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:MSM,
author = "Anonymous",
title = "Mobile services market set to triple",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "7--7",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900713",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:MISb,
author = "Anonymous",
title = "Making the {Internet} a safer place",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "7--7",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900721",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:AST,
author = "Anonymous",
title = "{AT\&T} splits into three",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "8--8",
month = sep,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(95)90073-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589590073X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:INL,
author = "Anonymous",
title = "Integrity of network link guaranteed",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "8--8",
month = sep,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(95)90074-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485895900748",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SWV,
author = "Anonymous",
title = "{Sophos}' {Windows 95} virus scanner",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "8--8",
month = sep,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(95)90075-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485895900756",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:HSL,
author = "Anonymous",
title = "{DES} for {HDLC\slash SDLC} links",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "8--8",
month = sep,
year = "1995",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(95)90076-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485895900764",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:IFI,
author = "Anonymous",
title = "{Internet} firewall from {Integralis}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "8--9",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900772",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Barry:1995:SUL,
author = "David Barry",
title = "{SNMP} upgrade to lose security features",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "9--10",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897479",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Davis:1995:FC,
author = "Cindy Davis",
title = "Firewall Consortium",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "9--9",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900780",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:NSN,
author = "Anonymous",
title = "New secure {Net} products",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "9--9",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897467",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Kaneshige:1995:FPO,
author = "Thomas Kaneshige",
title = "{FBI} to police online amidst heated controversy",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "10--10",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897480",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hancock:1995:ANR,
author = "Bill Hancock",
title = "Attacking network routers",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "11--12",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897492",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Peterson:1995:FMPb,
author = "Padgett Peterson",
title = "The fortress mentality --- {Part IV}: Telecomputing,
telecommuting and serving remote customers",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "12--14",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897509",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1995:IHPb,
author = "Fred Cohen",
title = "{Internet} holes --- {Part 2}: Packet fragmentation
attacks",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "14--16",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897510",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Herschberg:1995:ICI,
author = "Bob Herschberg and Edo Roos Lindgreen",
title = "{Internet}: a certain insecurity",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "16--19",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897522",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:Ei,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "9",
pages = "20--20",
month = sep,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:38 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895900799",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SLV,
author = "Anonymous",
title = "{Sun 4.1x} loadmodule vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "2--2",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902570",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SVW,
author = "Anonymous",
title = "{\tt syslog} vulnerability workaround",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "2--2",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902589",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:TDV,
author = "Anonymous",
title = "{Telnet} daemon vulnerabilities",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "2--3",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902597",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:ISC,
author = "Anonymous",
title = "{Internet} security code",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "3--3",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902600",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:GCN,
author = "Anonymous",
title = "Growing cellular networks in {China}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "3--4",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902619",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SPC,
author = "Anonymous",
title = "Secure payments from {Cybercash}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "4--4",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902627",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:DIC,
author = "Anonymous",
title = "The digital {ID} case",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "4--4",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902635",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:MLM,
author = "Anonymous",
title = "{Microsoft} and {Lotus} make net moves",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "4--5",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902643",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FPF,
author = "Anonymous",
title = "Firewall partnership formed",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "5--5",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902651",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SST,
author = "Anonymous",
title = "Single sign-on technology",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "5--5",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902678",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FSN,
author = "Anonymous",
title = "Firewall security for network applications",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "5--5",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902686",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:AANb,
author = "Anonymous",
title = "{Azlan}'s alliance with {Netscape} and Supernet",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "5--5",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589590266X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FRE,
author = "Anonymous",
title = "Frame relay encryptor protects",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "5--6",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902694",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:HPE,
author = "Anonymous",
title = "{H-P}'s encryption engine proposal",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "6--6",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897534",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{English:1995:OES,
author = "Erin English",
title = "{Oracle} expands support for {Oracle7}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "6--6",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902708",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{English:1995:OEF,
author = "Erin English",
title = "{Oracle} embraces {Fortezza}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "7--7",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897558",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bournellis:1995:RNF,
author = "Cynthia Bournellis",
title = "{RSA} negotiates with firewall vendors to establish
{VPNs}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "7--7",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897546",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bucholtz:1995:NAS,
author = "Chris Bucholtz",
title = "{Netscape} answers security lapses with anti-bug
contest",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "7--8",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589689756X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Kaneshige:1995:AIC,
author = "Thomas Kaneshige",
title = "Auto industry to create its own network",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "8--8",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897571",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hancock:1995:ECI,
author = "Bill Hancock",
title = "Export of cryptographic information from the {US}: a
brief look at the problems",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "9--11",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897583",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1995:IHPc,
author = "Fred Cohen",
title = "{Internet} holes --- {Part 3}: The {\tt sendmail}
maelstrom",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "11--12",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897595",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Schultz:1995:NPF,
author = "E. Eugene Schultz",
title = "A new perspective on firewalls",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "13--17",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897601",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Banes:1995:PLN,
author = "D. W. Banes",
title = "Physical layer network security: What your {LAN} can
do for you",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "17--19",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897613",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:Ej,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "10",
pages = "20--20",
month = oct,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:40 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895902716",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SGI,
author = "Anonymous",
title = "{Silicon Graphics Inc.}'s {Ip} vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "2--2",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901426",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:UCL,
author = "Anonymous",
title = "30 {US} companies lose \$66 million",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "2--2",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901434",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FOW,
author = "Anonymous",
title = "{FBI} outlines a wiretapping future",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "2--3",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901442",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FFT,
author = "Anonymous",
title = "Flaw in fault-tolerance software",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "3--3",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897625",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Madsen:1995:FRC,
author = "Wayne Madsen",
title = "{Fortezza} reaches into civilian agencies",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "3--3",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901450",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:CCI,
author = "Anonymous",
title = "Companies crack down on {Internet} use",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "3--3",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901469",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:CISb,
author = "Anonymous",
title = "Check in at {Internet} site to check security",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "3--4",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901477",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:WNI,
author = "Anonymous",
title = "Woe is the {Net}, or is it?",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "4--4",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901485",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:CWS,
author = "Anonymous",
title = "Choosing a {Web} standard",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "4--4",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901493",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:PSV,
author = "Anonymous",
title = "Product scans for viruses before a download",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "4--4",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901507",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SSN,
author = "Anonymous",
title = "Single sign-on network security",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "4--5",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901515",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:MIM,
author = "Anonymous",
title = "{Merlin}'s {Internet} magic",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "5--5",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901523",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:IUA,
author = "Anonymous",
title = "{Internet} user authentication security",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "5--5",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901531",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:DSP,
author = "Anonymous",
title = "{OS/2} data security product to integrate {IBM}'s
security hooks",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "5--5",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589590154X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Browne:1995:UKL,
author = "Graham Browne",
title = "Using {DES} with keys longer than 56 bits",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "5--6",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897637",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hancock:1995:RHK,
author = "Bill Hancock",
title = "Recent history of known network breaches",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "6--9",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897649",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Leach:1995:SCN,
author = "John Leach and Colin Brown Zergo",
title = "Security considerations of network outsourcing",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "10--14",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897650",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1995:IHPd,
author = "Fred Cohen",
title = "{Internet} holes --- {Part 4}: Network news transfer
protocol",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "15--19",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897662",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:Ek,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "11",
pages = "20--20",
month = nov,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:42 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901558",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:XAV,
author = "Anonymous",
title = "{X} authentication vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "2--2",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901566",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:DIT,
author = "Anonymous",
title = "Dramatic increase in telephone hacking",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "2--2",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901574",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:PGP,
author = "Anonymous",
title = "Police given permission to tap E-mail",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "2--2",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901582",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:HUF,
author = "Anonymous",
title = "{HP-UX} {\tt ftp} vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "2--3",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901590",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:RLL,
author = "Anonymous",
title = "{RSA} loses licence for {Hellman--Merkle} algorithm",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "3--3",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901604",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:VGM,
author = "Anonymous",
title = "The viruses are getting more vicious",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "3--3",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901612",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:JLB,
author = "Anonymous",
title = "{JavaScript} language becomes a competitor",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "3--3",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901620",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FVB,
author = "Anonymous",
title = "First virtual bank claims to be secure",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "4--4",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901639",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
keywords = "Cardinal Bancshares; Huntington Bancshares; Security
First Network Bank; Wachovia Corporation",
}
@Article{Anonymous:1995:LDP,
author = "Anonymous",
title = "Long distance phone calls via the {Internet}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "4--4",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901655",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:SPW,
author = "Anonymous",
title = "Security problems with {Windows 95}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "4--4",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901647",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:PVM,
author = "Anonymous",
title = "Protection from viruses for E-mail",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "4--5",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901663",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:FA,
author = "Anonymous",
title = "A firewall for {ATM}",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "5--5",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901671",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:UNS,
author = "Anonymous",
title = "{Unix} network security",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "5--5",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589590168X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{English:1995:AVW,
author = "Erin English",
title = "{AOLGOLD} virus worries users",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "5--6",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897674",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{English:1995:ISS,
author = "Erin English",
title = "{IP} security standards battle it out",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "6--6",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897686",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1995:IHPe,
author = "Fred Cohen",
title = "{Internet} holes --- {Part 5a}: 50 ways to attack your
web systems",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "7--11",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897704",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{English:1995:EEP,
author = "Erin English",
title = "Exportable encryption policy found `unacceptable'",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "7--7",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897698",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
remark = "Discusses industry opposition to US Clinton
Administration's proposal for data encryption standard,
because of key-escrow requirement, and concern for
back-door decryption.",
}
@Article{Hancock:1995:IHR,
author = "Bill Hancock",
title = "{Internet} hacking resources",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "11--15",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896897716",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1995:El,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1995",
number = "12",
pages = "16--16",
month = dec,
year = "1995",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:43 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485895901698",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:RYV,
author = "Anonymous",
title = "{\tt rpc.ypupdated} vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "2--2",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90151-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901518",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:GUC,
author = "Anonymous",
title = "Growth in {UK} cell-phone fraud",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "2--3",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90152-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589690152X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:PKE,
author = "Anonymous",
title = "Public-key encryption flawed in time",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "3--3",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90153-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901531",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:ERK,
author = "Anonymous",
title = "Encryption report kept under lock and key",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "3--3",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90154-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901543",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:NDB,
author = "Anonymous",
title = "{NetConnect} distributes {BorderWare} firewall",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "3--4",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90155-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901555",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:NOS,
author = "Anonymous",
title = "{Novell}'s operating systems forecast to remain
dominant",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "4--4",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90156-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901567",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:FOB,
author = "Anonymous",
title = "Further online banking competition",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "4--4",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90157-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901579",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:NEC,
author = "Anonymous",
title = "The new era of cable modems",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "4--5",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90158-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901580",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SST,
author = "Anonymous",
title = "Spec for secure transactions",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "5--5",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90159-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901592",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:UDE,
author = "Anonymous",
title = "Users demand encryption policies",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "5--5",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90160-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901609",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:CGP,
author = "Anonymous",
title = "Cable growth potential massive",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "5--5",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90161-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901610",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SDU,
author = "Anonymous",
title = "Secure domain unit for network protection",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "5--6",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90162-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901622",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:BDI,
author = "Anonymous",
title = "Briefing document for {Internet} security",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "6--6",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90163-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901634",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:ISA,
author = "Anonymous",
title = "Internal security across client\slash server
networks",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "6--6",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90164-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901646",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:NSA,
author = "Anonymous",
title = "Network security assessment tool for {Windows NT}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "7--7",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90165-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901658",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Kaneshige:1996:MGB,
author = "Thomas Kaneshige",
title = "{McAfee} gives the boot to virus",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "7--7",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90166-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589690166X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Kaneshige:1996:NSM,
author = "Thomas Kaneshige",
title = "Network security made easy with little black box",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "7--8",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90167-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901671",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{English:1996:STI,
author = "Erin English",
title = "{SEC} tackles {Internet} investment fraud",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "8--8",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90168-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901683",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{English:1996:LWM,
author = "Erin English",
title = "{Lotus} working on military version of {Notes}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "8--8",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90169-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901695",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1996:IHPa,
author = "Fred Cohen",
title = "{Internet} holes --- {Part 5b}: 50 ways to attack your
{Web} systems",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "9--13",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)90001-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485800900011",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Kaneshige:1996:OSD,
author = "Thomas Kaneshige",
title = "{Oracle} to secure database access over the {Net}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "9--9",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90170-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901701",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hanson:1996:IAS,
author = "Lesley Hanson",
title = "The impact of {ATM} on security in the data network",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "13--17",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)90002-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485800900023",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Lindup:1996:HH,
author = "Ken Lindup",
title = "Hackers for hire",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "18--18",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90171-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901713",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:Ea,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "1",
pages = "20--20",
month = jan,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90172-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:45 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901725",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:NVS,
author = "Anonymous",
title = "New version solves {BIND} security problems",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "2--2",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90041-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900410",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:HSV,
author = "Anonymous",
title = "{HP} {\tt syslog} vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "2--2",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90042-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900422",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:UPD,
author = "Anonymous",
title = "{UDP} port denial-of-service attack",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "2--3",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90043-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900434",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:VSL,
author = "Anonymous",
title = "Virus spreads like wild fire",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "3--3",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90044-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900446",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:WMVa,
author = "Anonymous",
title = "{Winword} macro viruses",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "3--4",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90045-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900458",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SSP,
author = "Anonymous",
title = "{Singapore}'s service providers confident of security
despite break-in",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "4--4",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90046-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589690046X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:CED,
author = "Anonymous",
title = "Compress and encrypt data simultaneously",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "4--5",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90047-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900471",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:NGW,
author = "Anonymous",
title = "The next {Great Wall of China}?",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "5--5",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90048-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900483",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:EPP,
author = "Anonymous",
title = "Extended password protection for {CyberGuard
Firewall}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "5--5",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90049-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900495",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:IMP,
author = "Anonymous",
title = "{Internet} may not be profitable",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "5--6",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90050-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900501",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:PSP,
author = "Anonymous",
title = "The promise of secure phone banking",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "6--6",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90051-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900513",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:RAP,
author = "Anonymous",
title = "Remote access protection",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "6--6",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90052-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900525",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SDI,
author = "Anonymous",
title = "Secure deployment of {Internet} services",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "6--6",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90053-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900537",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:HVL,
author = "Anonymous",
title = "Humans and viruses locked out",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "6--7",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90054-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900549",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Sterlicchi:1996:WTI,
author = "John Sterlicchi",
title = "{Wayfarer} turns {Internet} into {LAN}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "7--7",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90055-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900550",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Sterlicchi:1996:NMS,
author = "John Sterlicchi",
title = "New moves to stimulate {EDI} growth",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "7--8",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90056-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900562",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Sterlicchi:1996:FNF,
author = "John Sterlicchi",
title = "First {NT} firewall soars in",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "8--9",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90057-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900574",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1996:IHPb,
author = "Fred Cohen",
title = "{Internet} holes --- {Part 6}: Automated attack and
defence",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "9--14",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)90003-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485800900035",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Osen:1996:SCI,
author = "Janet Osen",
title = "Sex, crimes and the {Internet}: the {Jake Baker}
case",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "15--22",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)90004-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485800900047",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:Eb,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "2",
pages = "24--24",
month = feb,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90058-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:46 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900586",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:CIN,
author = "Anonymous",
title = "Corrupt information from network servers",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "2--2",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90115-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901154",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SDC,
author = "Anonymous",
title = "{SunSoft} demo {CDs} contain a security threatening
flaw",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "2--2",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90116-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901166",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:ISP,
author = "Anonymous",
title = "{Internet} security purchase for {HP}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "2--3",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90117-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901178",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:CGS,
author = "Anonymous",
title = "{CompuServe} in {Germany} suffers another inquiry",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "3--3",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90118-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589690118X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:GPT,
author = "Anonymous",
title = "Governments pressed {Tor} agreement on encryption",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "3--3",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90119-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901191",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:BCI,
author = "Anonymous",
title = "Business class {Internet} service",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "3--4",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90120-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901208",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:VMC,
author = "Anonymous",
title = "{Visa} and {MasterCard} combine security
specifications",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "4--4",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90121-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589690121X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:IRR,
author = "Anonymous",
title = "{Integralis} revenues rise 60\%",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "4--4",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90122-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901221",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SAB,
author = "Anonymous",
title = "{SecurID} authentication for {BayRS} routers",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "4--4",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90123-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901233",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SSE,
author = "Anonymous",
title = "Security system for electronic cash",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "4--4",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90124-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901245",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:MII,
author = "Anonymous",
title = "{Microsoft}'s {Internet} information server",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "4--5",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90125-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901257",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:CNE,
author = "Anonymous",
title = "{CyberGuard}'s new enhancements",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "5--5",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90126-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901269",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:FND,
author = "Anonymous",
title = "The firewall with the new dual wall",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "5--5",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90127-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901270",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Sterlicchi:1996:STA,
author = "John Sterlicchi",
title = "Security technologies aid {ITT} transition",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "5--6",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90128-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901282",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1996:KGC,
author = "Atoosa Savarnejad",
title = "{Kerberos} gets cracked",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "6--6",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90129-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901294",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1996:IDS,
author = "Atoosa Savarnejad",
title = "{IBM} to develop secure version",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "6--6",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90130-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901300",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1996:IHPc,
author = "Fred Cohen",
title = "{Internet} holes --- {Part 7}: The human side",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "7--10",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)90005-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485800900059",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Moyer:1996:SMF,
author = "Philip R. Moyer and E. Eugene Schultz",
title = "A systematic methodology for firewall penetration
testing",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "11--18",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)90006-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485800900060",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Osen:1996:FIAa,
author = "Janet Osen",
title = "The {Freedom of Information Act} and the {2600 Club}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "19--19",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90131-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901312",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:Ec,
author = "Anonymous",
title = "Events 20",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "3",
pages = "20--20",
month = mar,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90132-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:48 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901324",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:WJB,
author = "Anonymous",
title = "Weaknesses in {Java} bytecode verifier",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "2--2",
month = apr,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90173-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901737",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:DOD,
author = "Anonymous",
title = "{Digital OSF/1} {\tt dxconsole} vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "2--2",
month = apr,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90174-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901749",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:ERM,
author = "Anonymous",
title = "Encryption restrictions may be eased",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "2--3",
month = apr,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90175-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901750",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:UGD,
author = "Anonymous",
title = "{UK Government} debates key escrow",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "3--3",
month = apr,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90176-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901762",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:IOB,
author = "Anonymous",
title = "{ITSEC} and {Orange Book} standards merge",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "3--3",
month = apr,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90178-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901786",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1996:NHK,
author = "Atoosa Savarnejad",
title = "{Netscape} hires {KPMG}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "3--3",
month = apr,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90177-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901774",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:NGJ,
author = "Anonymous",
title = "{Netscape} and {GE}'s joint {Internet} venture",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "3--4",
month = apr,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90179-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901798",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:NOB,
author = "Anonymous",
title = "Net opened to {British} businesses",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "4--4",
month = apr,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90180-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901804",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SEL,
author = "Anonymous",
title = "Secure electronic links to cross capital",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "4--4",
month = apr,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90181-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901816",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:URS,
author = "Anonymous",
title = "{Unix} rejected, security found wanting",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "4--4",
month = apr,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90182-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901828",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:AOI,
author = "Anonymous",
title = "Alliance offers integrated business solution",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "4--5",
month = apr,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90183-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589690183X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SIP,
author = "Anonymous",
title = "Secure {Internet} payments",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "5--5",
month = apr,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90184-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901841",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:MSW,
author = "Anonymous",
title = "More security for {Windows NT}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "5--5",
month = apr,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90185-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901853",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:WMVb,
author = "Anonymous",
title = "Word macro viruses detected and eliminated",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "5--6",
month = apr,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90186-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901865",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1996:IAS,
author = "Atoosa Savarnejad",
title = "{IDC} annual survey reveals extent of insecurity",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "6--6",
month = apr,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896836890",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1996:UCO,
author = "Atoosa Savarnejad",
title = "{US} company offers firewall challenge",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "6--7",
month = apr,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896836907",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hancock:1996:INS,
author = "Bill Hancock",
title = "Improving network security through port switching",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "7--8",
month = apr,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896836919",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1996:IHPd,
author = "Fred Cohen",
title = "{Internet} holes --- {Part 8}: Spam",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "8--10",
month = apr,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896836920",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Wood:1996:ICR,
author = "Charles Cresson Wood",
title = "An {Internet Curmudgeon}'s rants",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "10--11",
month = apr,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896836932",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Osen:1996:BNB,
author = "Janet Osen",
title = "Bad news for bulletin boards",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "11--13",
month = apr,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896836944",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hancock:1996:CYS,
author = "Bill Hancock",
title = "Can you social engineer your way into your network?",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "14--15",
month = apr,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896836956",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:Ed,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "4",
pages = "16--16",
month = apr,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90187-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:49 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901877",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:WIN,
author = "Anonymous",
title = "Warning issued on new type of {Word} macro virus",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "5",
pages = "2--2",
month = may,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90105-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:51 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901051",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:EBS,
author = "Anonymous",
title = "Encryption battle sees possible break through",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "5",
pages = "2--2",
month = may,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90106-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:51 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901063",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:FMD,
author = "Anonymous",
title = "Firewall market developments",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "5",
pages = "2--2",
month = may,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90107-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:51 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901075",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:ENS,
author = "Anonymous",
title = "Enhanced network security offered",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "5",
pages = "2--3",
month = may,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90108-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:51 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901087",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:IEB,
author = "Anonymous",
title = "The {Internet}-enabled backup solution",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "5",
pages = "3--3",
month = may,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90109-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:51 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901099",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:PIS,
author = "Anonymous",
title = "Private information sent safely over public frame
relay network",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "5",
pages = "3--3",
month = may,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90110-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:51 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901105",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1996:CRW,
author = "Atoosa Savarnejad",
title = "{Californian} representative warns against
cyberfraud",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "5",
pages = "4--4",
month = may,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90111-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:51 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901117",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1996:PBC,
author = "Atoosa Savarnejad",
title = "{PGP} becomes a company",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "5",
pages = "4--4",
month = may,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90112-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:51 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901129",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1996:COF,
author = "Atoosa Savarnejad",
title = "{Cisco} offers free encryption technology",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "5",
pages = "4--5",
month = may,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90113-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:51 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901130",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1996:IHPe,
author = "Fred Cohen",
title = "{Internet} holes --- {Part 9}: {IP} address forgery
and how to eliminate it",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "5",
pages = "5--12",
month = may,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:51 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589681909X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Parker:1996:RCG,
author = "Tom Parker",
title = "The role of cryptography in global communications",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "5",
pages = "13--17",
month = may,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:51 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896819106",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Peterson:1996:IAM,
author = "A. Padgett Peterson",
title = "{Internet} attack mechanisms",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "5",
pages = "17--19",
month = may,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:51 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896819118",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:Ee,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "5",
pages = "20--20",
month = may,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90114-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:51 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901142",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:ICD,
author = "Anonymous",
title = "Interpreters in {CGI} bin directories",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "2--2",
month = jun,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90133-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901336",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:NPT,
author = "Anonymous",
title = "{NIS+} password tables left insecure",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "2--2",
month = jun,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90134-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901348",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:IDT,
author = "Anonymous",
title = "{IRIX} desktop tool vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "2--2",
month = jun,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90135-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589690135X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SHI,
author = "Anonymous",
title = "Security hole in {IIS} software",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "2--3",
month = jun,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90136-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901361",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:EME,
author = "Anonymous",
title = "Electronic mail encryption standards' rivalry",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "3--3",
month = jun,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90137-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901373",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:MDI,
author = "Anonymous",
title = "{Microsoft}'s designs for {Internet} security",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "3--3",
month = jun,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90138-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901385",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:MIS,
author = "Anonymous",
title = "Managed {Internet} service",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "4--4",
month = jun,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90139-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901397",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:IIS,
author = "Anonymous",
title = "{Internet}\slash intranet security from {Gradient} and
{HP}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "4--4",
month = jun,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90141-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901415",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:PRS,
author = "Anonymous",
title = "{Performing Right Society}'s network secured",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "4--4",
month = jun,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90140-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901403",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:PSG,
author = "Anonymous",
title = "{PC Security} gets investment from {Motorola}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "4--5",
month = jun,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90142-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901427",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:OAS,
author = "Anonymous",
title = "{OpeN/2} authorization software",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "5--5",
month = jun,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90143-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901439",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:LDC,
author = "Anonymous",
title = "{LAN} diagnostic consultancy service",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "5--5",
month = jun,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90144-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901440",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SSS,
author = "Anonymous",
title = "Single sign-on security for enterprise-wide systems",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "5--6",
month = jun,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90145-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901452",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:FTN,
author = "Anonymous",
title = "Firewall targeted for {NetWare}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "6--6",
month = jun,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90146-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901464",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:PDA,
author = "Anonymous",
title = "Protection for dial access systems",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "6--6",
month = jun,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90148-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901488",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SAS,
author = "Anonymous",
title = "{SoftID} authentication software",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "6--6",
month = jun,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90147-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901476",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:AVS,
author = "Anonymous",
title = "Anti-virus solution for network firewalls",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "6--7",
month = jun,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90149-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589690149X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1996:IHPf,
author = "Fred Cohen",
title = "{Internet} holes --- {Part 10}: {UDP} viruses",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "7--10",
month = jun,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896884510",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Peterson:1996:MSO,
author = "A. Padgett Peterson",
title = "E-mail security --- An oxymoron?",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "10--13",
month = jun,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896884522",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Schultz:1996:BRF,
author = "E. Eugene Schultz",
title = "Building the right firewall",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "13--17",
month = jun,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896884534",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Osen:1996:FIAb,
author = "Janet Osen",
title = "The {Freedom of Information Act} and the {2600 Club}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "17--19",
month = jun,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896884546",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:Ef,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "6",
pages = "20--20",
month = jun,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90150-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:52 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901506",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:VDS,
author = "Anonymous",
title = "Vulnerability in {DEC} software security kits",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "2--2",
month = jul,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90089-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900896",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:VDP,
author = "Anonymous",
title = "Vulnerability in the {\tt dip} program",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "2--2",
month = jul,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90090-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900902",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SV,
author = "Anonymous",
title = "{Suidperl} vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "2--3",
month = jul,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90091-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900914",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:RMC,
author = "Anonymous",
title = "Right mouse click could allow in viruses",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "3--3",
month = jul,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90092-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900926",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SAO,
author = "Anonymous",
title = "Security and authentication offered",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "3--4",
month = jul,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90093-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900938",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:BGH,
author = "Anonymous",
title = "Businesses get help to beat {Internet} crime",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "4--4",
month = jul,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90094-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589690094X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:CAI,
author = "Anonymous",
title = "Companies adopt {Internet} commerce solutions",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "4--4",
month = jul,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90095-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900951",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:TSN,
author = "Anonymous",
title = "Total secure networking solutions incorporates
{CyberGuard}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "4--5",
month = jul,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90096-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900963",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:CCC,
author = "Anonymous",
title = "Credit-card company seeks strong encryption",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "5--5",
month = jul,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90097-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900975",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:BPE,
author = "Anonymous",
title = "{Barclays}' pilot for electronic commerce",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "5--5",
month = jul,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90098-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900987",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:LDI,
author = "Anonymous",
title = "Librarians develop {Internet} protocol",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "5--6",
month = jul,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90099-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900999",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SVP,
author = "Anonymous",
title = "Secure Virtual Private Networks",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "6--6",
month = jul,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90100-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901002",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SLN,
author = "Anonymous",
title = "{Serverware} launches new version of {SeNTry}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "6--6",
month = jul,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90101-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901014",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:II,
author = "Anonymous",
title = "{IronBridge} and {IronWall}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "6--7",
month = jul,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90102-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901026",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:CMA,
author = "Anonymous",
title = "{CKS MyNet}, the answer to single sign-on?",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "7--7",
month = jul,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90103-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896901038",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Sterlicchi:1996:SFM,
author = "John Sterlicchi",
title = "Security framework from {Microsoft}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "7--8",
month = jul,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896837354",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1996:RSM,
author = "Atoosa Savarnejad",
title = "Revisions in {SET} mark advances to secure cyberspace
shopping",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "8--8",
month = jul,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896837366",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1996:IHPg,
author = "Fred Cohen",
title = "{Internet} holes --- {Part 11}: {Internet} lightning
rods",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "9--13",
month = jul,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589683738X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Kaneshige:1996:MMC,
author = "Thomas Kaneshige",
title = "{McAfee} and {Microsoft} clean up {Internet}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "9--9",
month = jul,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896837378",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Solomon:1996:EVP,
author = "Alan Solomon",
title = "The end of the virus problem",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "13--17",
month = jul,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896837391",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Lindup:1996:SAW,
author = "Ken Lindup",
title = "{Superman} is alive and well and living in {Wapping}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "18--18",
month = jul,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/1353-4858(96)83740-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896837408",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:Eg,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "7",
pages = "20--20",
month = jul,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90104-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:53 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589690104X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SKP,
author = "Anonymous",
title = "{Solaris 2.5 KCMS} programs vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "8",
pages = "2--2",
month = aug,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90030-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:55 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900306",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:HUV,
author = "Anonymous",
title = "{HP-UX} vulnerabilities",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "8",
pages = "2--2",
month = aug,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90031-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:55 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900318",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:RV,
author = "Anonymous",
title = "The {\tt rdist} vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "8",
pages = "2--3",
month = aug,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90032-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:55 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589690032X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:FVC,
author = "Anonymous",
title = "First virus capable of infecting {Excel} spreadsheet",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "8",
pages = "3--3",
month = aug,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90033-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:55 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900331",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:JMC,
author = "Anonymous",
title = "Joint marketing for {CyberGuard} and {EDS}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "8",
pages = "3--3",
month = aug,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90034-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:55 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900343",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:EWS,
author = "Anonymous",
title = "Enterprise {Web} solutions from {Netscape} and
{NeXT}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "8",
pages = "3--3",
month = aug,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90035-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:55 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900355",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:UNS,
author = "Anonymous",
title = "{Usenet} news via satellite",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "8",
pages = "3--4",
month = aug,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90036-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:55 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900367",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:BFS,
author = "Anonymous",
title = "{Baysecure Framework}'s security enhanced by
{ACE\slash Server}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "8",
pages = "4--4",
month = aug,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90037-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:55 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900379",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:NNVa,
author = "Anonymous",
title = "New {NT} virus scanner",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "8",
pages = "4--4",
month = aug,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90038-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:55 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900380",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:CPT,
author = "Anonymous",
title = "{CryptoSystem} protects {TCP\slash IP} networks",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "8",
pages = "4--5",
month = aug,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90039-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:55 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900392",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{David:1996:IGY,
author = "Jon David",
title = "The {Internet} --- Gateway to your information
assets",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "8",
pages = "5--7",
month = aug,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:55 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896811524",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hancock:1996:OSA,
author = "Bill Hancock",
title = "Operating system attacks from network resources",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "8",
pages = "8--11",
month = aug,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:55 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896811536",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1996:IHPh,
author = "Fred Cohen",
title = "{Internet} holes --- {Part 12a}: {Internet} incident
response",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "8",
pages = "12--14",
month = aug,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:55 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896811548",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Peterson:1996:PSR,
author = "Padgett Peterson",
title = "Providing secure, recoverable e-mail",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "8",
pages = "15--19",
month = aug,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:55 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589681155X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:Eh,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "8",
pages = "20--20",
month = aug,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90040-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:55 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900409",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:VE,
author = "Anonymous",
title = "Vulnerability in {\tt expreserve}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "2--2",
month = sep,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90016-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900161",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SPF,
author = "Anonymous",
title = "Security problem in {\tt fm\_fls}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "2--2",
month = sep,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90017-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900173",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:VFN,
author = "Anonymous",
title = "Virus fears for new operating systems",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "2--2",
month = sep,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90018-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900185",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:MCM,
author = "Anonymous",
title = "Merge creates mega security response team",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "2--3",
month = sep,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90019-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900197",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SBS,
author = "Anonymous",
title = "Secure banking and shopping on {Internet}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "3--3",
month = sep,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90020-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900203",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:ISO,
author = "Anonymous",
title = "{Internet} security offerings from {HP}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "3--3",
month = sep,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90021-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900215",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:ARB,
author = "Anonymous",
title = "Agreement reached between {Microsoft} and {RSA}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "3--4",
month = sep,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90022-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900227",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:NCD,
author = "Anonymous",
title = "Name change for {Digital Pathways}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "4--4",
month = sep,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90023-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900239",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:LAW,
author = "Anonymous",
title = "On-{LAN} authentication for {Windows NT}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "4--4",
month = sep,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90025-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900252",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:DRR,
author = "Anonymous",
title = "{Digital} resells {Raptor}'s security products",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "4--4",
month = sep,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90024-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900240",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:EKE,
author = "Anonymous",
title = "Encryption without key exchange",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "4--5",
month = sep,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90026-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900264",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:NER,
author = "Anonymous",
title = "The next {Eagle} from {Raptor}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "5--5",
month = sep,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896844011",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:FPM,
author = "Anonymous",
title = "Further protection from E-mail viruses",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "5--5",
month = sep,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896900276",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Persyn:1996:JTH,
author = "Tim Persyn",
title = "Journalists take to hacking",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "5--5",
month = sep,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896900288",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bee:1996:UGA,
author = "Andrianne Bee",
title = "{US} government allows selling of strong encryption to
{US} clients",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "6--6",
month = sep,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896844035",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bee:1996:NPC,
author = "Andrianne Bee",
title = "{NCSA} programme certifies {Web} sites",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "6--6",
month = sep,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896844023",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Gordon:1996:GVS,
author = "Sarah Gordon",
title = "Are good virus simulators still a bad idea?",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "7--13",
month = sep,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896844047",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1996:IHPi,
author = "Fred Cohen",
title = "{Internet} holes --- {Part 12(b)}: {Internet} incident
response",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "13--17",
month = sep,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896844059",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Osen:1996:VMP,
author = "Janet Osen",
title = "The {Virtual Magistrate [Project]}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "18--18",
month = sep,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896844060",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:Ei,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "9",
pages = "20--20",
month = sep,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90029-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:56 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589690029X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:TSF,
author = "Anonymous",
title = "{TCP SYN} flooding and {IP} spoofing attacks",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "10",
pages = "2--2",
month = oct,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90059-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:57 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900598",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:FSV,
author = "Anonymous",
title = "Further {\tt sendmail} vulnerabilities",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "10",
pages = "2--3",
month = oct,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90060-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:57 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900604",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:IHV,
author = "Anonymous",
title = "{Irina}, a hoax not a virus",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "10",
pages = "3--3",
month = oct,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90061-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:57 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900616",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:CFIa,
author = "Anonymous",
title = "Corporations fear {ICE\_T} virus emergence",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "10",
pages = "3--3",
month = oct,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90062-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:57 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900628",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:KEB,
author = "Anonymous",
title = "Key escrow becomes key recovery",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "10",
pages = "3--4",
month = oct,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90063-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:57 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589690063X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:FDE,
author = "Anonymous",
title = "Further doubts emerge over {NT} security",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "10",
pages = "4--4",
month = oct,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90064-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:57 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900641",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:PAA,
author = "Anonymous",
title = "Privacy advocates not appeased by key recovery",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "10",
pages = "4--4",
month = oct,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90065-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:57 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900653",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:RCM,
author = "Anonymous",
title = "{Reflex} creates macro virus trapper",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "10",
pages = "4--4",
month = oct,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90066-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:57 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900665",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:AFP,
author = "Anonymous",
title = "The {Authorizer} firewall, protection for {X25}
networks",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "10",
pages = "5--5",
month = oct,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:57 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896826493",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:VSX,
author = "Anonymous",
title = "Virus scanner for {X.400} messaging system",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "10",
pages = "5--5",
month = oct,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:57 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896900677",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1996:MDA,
author = "Atoosa Savarnejad",
title = "Multi-discipline alliance spans all security aspects",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "10",
pages = "5--5",
month = oct,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:57 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896900689",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1996:NLF,
author = "Atoosa Savarnejad",
title = "{Netsolve} launches first {ISP}-independent
outsourcing product",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "10",
pages = "6--6",
month = oct,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:57 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/135348589682650X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bee:1996:SEI,
author = "Adrianne Bee",
title = "Soon even the {Internet} will take {American
Express}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "10",
pages = "6--7",
month = oct,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:57 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896826511",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1996:IHPj,
author = "Fred Cohen",
title = "{Internet} holes --- {Part 13}: The {SYN} flood",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "10",
pages = "7--9",
month = oct,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:57 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896826523",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{David:1996:SWS,
author = "Jon David",
title = "Sniffers --- The whole story",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "10",
pages = "9--13",
month = oct,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:57 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896826535",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Osen:1996:CDAa,
author = "Janet Osen",
title = "The {Communications Decency Act} and the karma of
chaos --- {Part 1}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "10",
pages = "13--19",
month = oct,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:57 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896826547",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:Ej,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "10",
pages = "20--20",
month = oct,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90069-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:57 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900690",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SDM,
author = "Anonymous",
title = "{Sendmail} daemon mode vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "2--2",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90000-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900008",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:HDC,
author = "Anonymous",
title = "Hackers not deterred by certification scheme",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "2--2",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90001-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589690001X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:ISC,
author = "Anonymous",
title = "Invasion of {Supreme Court}'s homepage",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "2--2",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90002-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900021",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:NNVb,
author = "Anonymous",
title = "{Netscape Navigator} virus scare",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "2--2",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90003-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900033",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SRI,
author = "Anonymous",
title = "Survey reveals {Internet}-borne viruses on increase",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "3--3",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)81222-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897812226",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{McCormack:1996:CSR,
author = "Michael McCormack",
title = "Content self-regulation recommended",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "3--3",
month = nov,
year = "1996",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485896900045",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:CIP,
author = "Anonymous",
title = "Combatants of {Internet} porn",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "3--4",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90005-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900057",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:ICH,
author = "Anonymous",
title = "{Internet} commerce hampered by security fears",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "4--4",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90006-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900069",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SVN,
author = "Anonymous",
title = "{Smartcards} vulnerable to new attack",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "4--4",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90007-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900070",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:TWS,
author = "Anonymous",
title = "{TV Web}-surfing device breaks export regulations",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "4--4",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90008-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900082",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:UEM,
author = "Anonymous",
title = "Users experience major problems with networks",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "4--5",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90009-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900094",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:JCB,
author = "Anonymous",
title = "{Japanese} company buys into security market",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "5--5",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90010-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900100",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:SAI,
author = "Anonymous",
title = "Secure access for {Internet}\slash intranet
connectivity",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "5--5",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90012-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900124",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:HPS,
author = "Anonymous",
title = "Hacker-proof system for data coding",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "5--5",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90011-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900112",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:ITP,
author = "Anonymous",
title = "{Internet} Transaction Processing solutions",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "5--6",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90013-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900136",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:CFIb,
author = "Anonymous",
title = "{Cisco}'s firewall for {Internet}\slash intranet",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "6--6",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90014-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900148",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bee:1996:HCS,
author = "Adrianne Bee",
title = "How cyber-safe is your company?",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "6--7",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)81223-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897812238",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bee:1996:VAA,
author = "Adrianne Bee",
title = "Vendor alliances aim to make {Internet} safe for
business",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "7--7",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)81224-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589781224X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bee:1996:CS,
author = "Adrianne Bee",
title = "Cyber stamps",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "7--8",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)81225-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897812251",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Kaneshige:1996:VRA,
author = "Thomas Kaneshige",
title = "Vendors rally for answers to {Panix Attacks}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "8--8",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)81226-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897812263",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Kaneshige:1996:MCR,
author = "Thomas Kaneshige",
title = "{Microsoft}'s catapult raises {NT} firewall bar",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "8--9",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)81227-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897812275",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{David:1996:FPI,
author = "Jon David",
title = "The future of {PGP} on the {Internet}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "9--12",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)81228-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897812287",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Osen:1996:CDAb,
author = "Janet Osen",
title = "The {Communications Decency Act} --- {Part 2}: The
language of the {Communications Decency Act}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "12--18",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)81229-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897812299",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:Ek,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "11",
pages = "20--20",
month = nov,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90015-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:56:58 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589690015X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:HAV,
author = "Anonymous",
title = "{HP 9000} access vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "2--2",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90070-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900707",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:PBR,
author = "Anonymous",
title = "Password buffer over-run vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "2--2",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90071-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900719",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:FPV,
author = "Anonymous",
title = "{\tt fpkg2swpkg} program vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "2--2",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90072-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900720",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:NBR,
author = "Anonymous",
title = "{\tt newgrp} buffer over-run vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "2--3",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90073-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900732",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:CSC,
author = "Anonymous",
title = "Computer security concerns ranked low in survey",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "3--3",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90074-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900744",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:ISS,
author = "Anonymous",
title = "{Internet} shopping secured by {SET} for {Taiwanese}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "3--3",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90075-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900756",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:HET,
author = "Anonymous",
title = "Hardware encryption technology complies with
encryption regulations",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "4--4",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90076-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900768",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:ECP,
author = "Anonymous",
title = "Extending copyright protection for the {Internet}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "4--4",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90077-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589690077X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:IBU,
author = "Anonymous",
title = "Increase in business users needing the {Internet}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "4--5",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90078-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900781",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:EFI,
author = "Anonymous",
title = "Electronic fingerprint identifies owner of image",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "5--5",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90079-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900793",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:GIC,
author = "Anonymous",
title = "Global {Internet} commerce",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "5--5",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90081-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900811",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:PRI,
author = "Anonymous",
title = "{PICS} recommended for {Internet}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "5--5",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90080-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589690080X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:KSA,
author = "Anonymous",
title = "{Kane Security Analyst} assesses network virus
protection",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "5--5",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90082-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900823",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:EPD,
author = "Anonymous",
title = "Electronic privacy device from {Harris}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "6--6",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90083-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900835",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:NSS,
author = "Anonymous",
title = "New software security token",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "6--6",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90084-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900847",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:PEB,
author = "Anonymous",
title = "Protection for electronic business communications",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "6--7",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90085-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900859",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:ISW,
author = "Anonymous",
title = "{Internet} security for {Windows NT} environments",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "7--7",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90086-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900860",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Madsen:1996:CCL,
author = "Wayne Madsen",
title = "{Congressional Committee} looks at {US} encryption
policy",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "7--8",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90087-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900872",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1996:MNS,
author = "Fred Cohen",
title = "Managing network security --- {Part 1}: How good do
you have to be?",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "9--11",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)90007-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485800900072",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{David:1996:AI,
author = "Jon David",
title = "Auditing the {Internet}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "11--14",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)90008-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485800900084",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Gordon:1996:RWA,
author = "Sarah Gordon and Richard Ford",
title = "Real world anti-virus product reviews and evaluations
--- {Part 1}",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "14--18",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(00)90009-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485800900096",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1996:El,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1996",
number = "12",
pages = "20--20",
month = dec,
year = "1996",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(96)90088-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:00 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485896900884",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:KSS,
author = "Anonymous",
title = "{Korn} shell {\tt suid\_exec} vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "2--2",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83489-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897834897",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:VSI,
author = "Anonymous",
title = "Vulnerabilities in {SGI IRIX}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "2--2",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83488-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897834885",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:DSA,
author = "Anonymous",
title = "Denial of service attack via {\tt ping}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "3--3",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83490-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897834903",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:CAA,
author = "Anonymous",
title = "Computer attacks against {WebCom}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "3--4",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83491-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897834915",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:GWS,
author = "Anonymous",
title = "{Government}'s {Web} site attacked by hackers",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "4--4",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83493-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897834939",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:TER,
author = "Anonymous",
title = "Tightening of encryption regulations in {Japan}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "4--4",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83492-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897834927",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:ECR,
author = "Anonymous",
title = "Encryption compromise on rocky ground",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "4--5",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83494-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897834940",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:EPS,
author = "Anonymous",
title = "{Eagle} provides security for {Internet} product",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "5--5",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83497-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897834976",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:PUB,
author = "Anonymous",
title = "Panel urges better protection",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "5--5",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83496-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897834964",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:SVHa,
author = "Anonymous",
title = "The season for virus hoaxes",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "5--5",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83495-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897834952",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:AAA,
author = "Anonymous",
title = "{Axent} acquires {AssureNet} pathways",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "5--6",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83498-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897834988",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:WSP,
author = "Anonymous",
title = "Worldwide single-point security",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "6--6",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83501-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897835015",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:ERA,
author = "Anonymous",
title = "Enhanced remote access security",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "6--6",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83500-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897835003",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:PKS,
author = "Anonymous",
title = "Public key smartcard available",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "6--6",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83499-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589783499X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:DEU,
author = "Anonymous",
title = "Desktop encryption utility",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "7--7",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83504-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897835040",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:SVHb,
author = "Anonymous",
title = "Security for vulnerable high speed networks",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "7--7",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83503-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897835039",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Huynh:1997:PCW,
author = "Danthanh Huynh",
title = "{Professor} criticizes {Web} security",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "7--7",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83502-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897835027",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
keywords = "Professor Edward Felton",
}
@Article{Cohen:1997:MNSa,
author = "Fred Cohen",
title = "Managing network security --- {Part 2}: Where should
we concentrate protection?",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "8--11",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83505-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897835052",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Gordon:1997:RWA,
author = "Sarah Gordon and Richard Ford",
title = "Real world anti-virus product reviews and evaluations
--- {Part 2}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "11--18",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83506-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897835064",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:Ea,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "1",
pages = "20--20",
month = jan,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90035-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:01 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900350",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:VRT,
author = "Anonymous",
title = "Vulnerability in {{\tt rlogin\slash Term}}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "2--2",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)86634-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897866342",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:MCB,
author = "Anonymous",
title = "{MIME} conversion buffer overflow",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "2--3",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)86635-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897866354",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:RBE,
author = "Anonymous",
title = "{RSA}'s $ 40$-bit encryption algorithm cracked",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "3--3",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)86638-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589786638X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:TV,
author = "Anonymous",
title = "{\tt talkd} vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "3--3",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)86637-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897866378",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:HOS,
author = "Anonymous",
title = "The holes in online security",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "3--3",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)86636-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897866366",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:ECH,
author = "Anonymous",
title = "Electronic commerce hindered by fear of crime",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "3--4",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)86639-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897866391",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:UDC,
author = "Anonymous",
title = "{US DoD COTS} snafu",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "4--4",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)86640-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897866408",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:CFG,
author = "Anonymous",
title = "Companies form group to support cross-platform
encryption",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "4--4",
month = feb,
year = "1997",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485897900593",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:EIC,
author = "Anonymous",
title = "Exploit intranets without compromising security",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "4--5",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)86641-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589786641X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:PCI,
author = "Anonymous",
title = "Power-cached {Internet}\slash intranet gateway",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "5--5",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)86644-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897866445",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:SEI,
author = "Anonymous",
title = "Security for enterprise {Internet} applications",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "5--5",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)86643-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897866433",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:AVP,
author = "Anonymous",
title = "Anti-virus protection for {Office 97}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "5--5",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)86642-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897866421",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:VFL,
author = "Anonymous",
title = "Virus found on {Linux} system",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "5--6",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)86645-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897866457",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Bee:1997:LE,
author = "Adrianne Bee",
title = "The latest on encryption",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "6--7",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)86646-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897866469",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1997:IFS,
author = "Atoosa Savarnejad",
title = "{Intranet} firewalls susceptible to internal attacks",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "7--7",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)86648-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897866482",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1997:WIF,
author = "Atoosa Savarnejad",
title = "Warning issued, flaw in {Unix} software",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "7--7",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)86647-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897866470",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Schultz:1997:WFF,
author = "E. Eugene Schultz",
title = "When firewalls fail: Lessons learned from firewall
testing",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "8--11",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)86649-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897866494",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1997:MNSb,
author = "Fred Cohen",
title = "Managing Network Security --- {Part 3}: Network
security as a control issue",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "12--15",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)86650-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897866500",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Aubrey-Jones:1997:IV,
author = "David Aubrey-Jones",
title = "{Internet} --- Virusnet?",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "15--19",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)86651-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897866512",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:Eb,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "2",
pages = "20--20",
month = feb,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90060-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:03 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589790060X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:BFJ,
author = "Anonymous",
title = "Bug found in {Java Virtual Machine}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "3",
pages = "2--2",
month = mar,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83033-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:04 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib;
http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897830334",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:FFI,
author = "Anonymous",
title = "Flaw found in {Internet Explorer}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "3",
pages = "2--2",
month = mar,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83032-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:04 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897830322",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:HNT,
author = "Anonymous",
title = "{\tt httpd} {\tt nph-test-cgi} script vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "3",
pages = "2--2",
month = mar,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83030-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:04 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897830309",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:EKB,
author = "Anonymous",
title = "Encryption key of 48 bits cracked",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "3",
pages = "2--2",
month = mar,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83031-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:04 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897830310",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:FCR,
author = "Anonymous",
title = "{French} companies restricted from using high-end
encryption",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "3",
pages = "3--3",
month = mar,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83036-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:04 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589783036X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:PEH,
author = "Anonymous",
title = "{PGP} encryption heavily criticized",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "3",
pages = "3--3",
month = mar,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83035-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:04 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897830358",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:VIS,
author = "Anonymous",
title = "Vulnerability in {InterNetNews} server",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "3",
pages = "3--3",
month = mar,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83034-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:04 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897830346",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Szweda:1997:FIA,
author = "Roy Szweda",
title = "{Finjan} introduces {ActiveX Security Manager}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "3",
pages = "3--4",
month = mar,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83037-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:04 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897830371",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:ASA,
author = "Anonymous",
title = "{ACE\slash Server} Access Manager launched",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "3",
pages = "4--4",
month = mar,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90033-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:04 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900337",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Szweda:1997:NSN,
author = "Roy Szweda",
title = "{NCSA} supports new {TIS ForceField}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "3",
pages = "4--5",
month = mar,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83038-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:04 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897830383",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1997:ILS,
author = "Atoosa Savarnejad",
title = "{IBM} launches {SecureWay}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "3",
pages = "5--5",
month = mar,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83039-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:04 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897830395",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1997:ERS,
author = "Atoosa Savarnejad",
title = "{eTrust} to roll out in second quarter",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "3",
pages = "5--6",
month = mar,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83040-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:04 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897830401",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hancock:1997:UCE,
author = "Bill Hancock",
title = "The {US} cryptographic export debate --- Round five?",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "3",
pages = "6--7",
month = mar,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83041-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:04 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897830413",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1997:MNSc,
author = "Fred Cohen",
title = "Managing network security --- {Part 4}: Integrity
first, usually",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "3",
pages = "8--10",
month = mar,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83042-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:04 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897830425",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Osen:1997:MMM,
author = "Janet Osen",
title = "The medium is the message: a media specific analysis
of the {Communications Decency Act}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "3",
pages = "10--16",
month = mar,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83043-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:04 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897830437",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Osen:1997:WMT,
author = "Janet Osen",
title = "For whom the modem tolls: The travails of {America
Online}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "3",
pages = "17--19",
month = mar,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83044-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:04 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897830449",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:Ec,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "3",
pages = "20--20",
month = mar,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90034-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:04 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900349",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:ESS,
author = "Anonymous",
title = "{Explorer} security still patchy",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "2--2",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89992-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897899928",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:VIP,
author = "Anonymous",
title = "Vulnerability in {IMAP} and {POP}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "2--2",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89991-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897899916",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:CAN,
author = "Anonymous",
title = "Current attacks on news servers",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "2--3",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89993-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589789993X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:VKI,
author = "Anonymous",
title = "{VirusPatrol} keeps {Internet} users virus free",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "3--3",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89995-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897899953",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Szweda:1997:RSN,
author = "Roy Szweda",
title = "{Rainbow} supports {Netscape}'s open multi-platform
security",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "3--3",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89994-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897899941",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:SEA,
author = "Anonymous",
title = "Strong encryption available worldwide",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "3--4",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89996-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897899965",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:MSJ,
author = "Anonymous",
title = "{MicroLan} Systems joins {CSAPP}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "4--4",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89997-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897899977",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Szweda:1997:AMD,
author = "Roy Szweda",
title = "{AT\&T\slash Mondex} deal enables {Web}
`micropayments'",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "4--4",
month = apr,
year = "1997",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485897900313",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:FSU,
author = "Anonymous",
title = "File security uses smartcard and {RSA} encryption",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "5--5",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89999-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897899990",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:ESF,
author = "Anonymous",
title = "Enhanced security features for {Netscape} web
servers",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "5--5",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89998-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897899989",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:SVP,
author = "Anonymous",
title = "Secure virtual private networking over the
{Internet}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "5--6",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)80000-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897800001",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:MRW,
author = "Anonymous",
title = "{MIMEsweeper} redefines Web\slash E-mail security",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "6--6",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)80003-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897800037",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:LDA,
author = "Anonymous",
title = "{Lotus Domino} anti-virus solution",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "6--6",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)80002-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897800025",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:EAS,
author = "Anonymous",
title = "Easy authentication and signature verification",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "6--6",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)80001-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897800013",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1997:HYC,
author = "Atoosa Savarnejad",
title = "Having your cookies and eating them too",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "6--7",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)80004-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897800049",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1997:ITS,
author = "Atoosa Savarnejad",
title = "{IBM} and {TIS} strike an agreement",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "7--8",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)80005-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897800050",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1997:CAI,
author = "Atoosa Savarnejad",
title = "{Cisco} allies with industry leaders for security
initiative",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "8--8",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)80006-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897800062",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Moyer:1997:EFI,
author = "Philip R. Moyer",
title = "Enhanced firewall infrastructure testing methodology",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "9--15",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)80007-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897800074",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1997:MNSd,
author = "Fred Cohen",
title = "Managing network security --- {Part 5}: Risk
management or risk analysis",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "15--19",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)80008-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897800086",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:Ed,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "4",
pages = "20--20",
month = apr,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90032-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:06 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900325",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:VLa,
author = "Anonymous",
title = "Vulnerability in {{\tt libXt}}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "2--2",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)85687-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897856875",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:NLS,
author = "Anonymous",
title = "Natural language service libraries vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "2--3",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)85688-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897856887",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:JAS,
author = "Anonymous",
title = "{Java} applets that steal computer cycles",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "3--3",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)85690-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897856905",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:VPA,
author = "Anonymous",
title = "Vulnerabilities in pluggable authentication module",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "3--3",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)85689-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897856899",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:HPW,
author = "Anonymous",
title = "High profile {Web} sites warrant high security",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "3--4",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)85691-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897856917",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:NSS,
author = "Anonymous",
title = "{NT} systems shut down by {Telnet} hack",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "4--4",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)85693-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897856930",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:SCI,
author = "Anonymous",
title = "Secure E-commerce for insurers",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "4--4",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)85692-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897856929",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:MCM,
author = "Anonymous",
title = "{Microsoft} closes E-mail service",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "4--4",
month = may,
year = "1997",
CODEN = "NTSCF5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/1353485897900362",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:CPF,
author = "Anonymous",
title = "Cellular phone fraud prevention working?",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "4--5",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)85694-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897856942",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:IUT,
author = "Anonymous",
title = "{Internet} used as {Trojan} horse",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "5--5",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90037-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900374",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:PDI,
author = "Anonymous",
title = "Providers divided over {Internet} proposal",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "5--5",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90038-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900386",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:IFN,
author = "Anonymous",
title = "Intranets to far out-number {Internet}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "5--6",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90039-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900398",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:NFM,
author = "Anonymous",
title = "Networks flooded with E-mail messages",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "6--6",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90040-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900404",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:GAV,
author = "Anonymous",
title = "Global anti-virus research programme launched",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "6--6",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90041-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900416",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:INSa,
author = "Anonymous",
title = "Integrated network security products",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "6--6",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90042-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900428",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:MTU,
author = "Anonymous",
title = "Multi-tier {Unix} security product offered",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "7--7",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90043-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589790043X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:NDS,
author = "Anonymous",
title = "New detection system takes on multi-million phone
fraud",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "7--8",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90044-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900441",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:DRN,
author = "Anonymous",
title = "Detection and repair for new online virus",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "8--8",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90045-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900453",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:RAS,
author = "Anonymous",
title = "Remote access solution to encrypt data",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "8--8",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90046-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900465",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Sechrist:1997:IPC,
author = "Douglas Sechrist",
title = "{Internet} phone calls breaking through corporate
firewalls",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "8--9",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90047-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900477",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1997:SFN,
author = "Atoosa Savarnejad",
title = "Sparks fly over {NT} security",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "9--10",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90049-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900490",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Breitrose:1997:HHI,
author = "Charlie Breitrose",
title = "Hackers hit {ISPs} by the dozens",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "9--9",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90048-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900489",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1997:ANS,
author = "Atoosa Savarnejad",
title = "Another {NT} security hole discovered",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "10--11",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90050-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900507",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Capen:1997:CPA,
author = "Ian Capen",
title = "{Check Point} announces security software alliance",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "11--11",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90051-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900519",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:CTL,
author = "Anonymous",
title = "To catch a thief \ldots{} unmasking the telecoms
fraudster",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "12--13",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90052-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900520",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1997:MNSe,
author = "Fred Cohen",
title = "Managing network security --- {Part 6}: Computer games
and network security management",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "14--18",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90053-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900532",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Lindup:1997:WLM,
author = "Ken Lindup",
title = "Would {Lenin} make a good security officer?",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "19--19",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90054-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900544",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:Ee,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "5",
pages = "20--20",
month = may,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90055-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:07 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900556",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:MV,
author = "Anonymous",
title = "{Metamail} vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "2--2",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89514-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897895141",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:IRP,
author = "Anonymous",
title = "{IRIX} {\tt runpriv} program vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "2--3",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89515-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897895153",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:VSX,
author = "Anonymous",
title = "Vulnerability with {Solaris 2.x PC} buffer overflow",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "3--3",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89516-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897895165",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1997:ISC,
author = "Atoosa Savarnejad",
title = "{ISP} security consortium formed",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "4--4",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89518-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897895189",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:IO,
author = "Anonymous",
title = "{Internet} is on its own",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "4--4",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89517-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897895177",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:NSA,
author = "Anonymous",
title = "{NSA} sued for algorithm",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "4--4",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90007-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900076",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:ECD,
author = "Anonymous",
title = "Experts claim {DTI}'s scheme has catastrophic flaws",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "4--5",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89519-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897895190",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:WDS,
author = "Anonymous",
title = "Worldwide debut for {SKIP}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "5--5",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89522-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897895220",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:BUF,
author = "Anonymous",
title = "Breakthrough for {UK} firm with {US} encryption
restrictions",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "5--5",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89521-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897895219",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:LDR,
author = "Anonymous",
title = "Low data rate communications security improved",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "5--5",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89520-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897895207",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:DPM,
author = "Anonymous",
title = "Data protected at most finite level",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "5--6",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89523-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897895232",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:EAJ,
author = "Anonymous",
title = "Encryption and authentication for {Java}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "6--6",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89525-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/java.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897895256",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:NBF,
author = "Anonymous",
title = "{NT}-based firewall for mixed {TCP\slash IP} and {IPX}
networks",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "6--6",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89524-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897895244",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1997:PTU,
author = "Atoosa Savarnejad",
title = "{Princeton} team uncovers flaw in {Java}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "6--7",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89526-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897895268",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1997:AMS,
author = "Atoosa Savarnejad",
title = "{AOL4FREE} makes second round as {Trojan} horse
infection",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "7--7",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89528-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897895281",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Breitrose:1997:TMO,
author = "Charlie Breitrose",
title = "Trend Micro offers free virus protection from the
{Web}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "7--7",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89527-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589789527X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Hansen:1997:NIS,
author = "Lesley Hansen",
title = "Network infrastructure security",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "8--12",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89529-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897895293",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1997:MNSf,
author = "Fred Cohen",
title = "Managing network security --- {Part 7}: Prevent,
detect and respond",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "13--16",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89530-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589789530X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Saxby:1997:PCI,
author = "Stephen Saxby",
title = "Policies for cyberspace --- Illegal content on the
{Internet}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "16--19",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89531-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897895311",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:Ef,
author = "Anonymous",
title = "Events",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "6",
pages = "20--20",
month = jun,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)90008-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:09 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897900088",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Breitrose:1997:CHG,
author = "Charlie Breitrose",
title = "Computer hacking glitch for {Ramsey} murder
investigators",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "2--2",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89862-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898625",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:NNS,
author = "Anonymous",
title = "{Netscape Navigator} security problem",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "2--2",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89861-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898613",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:SSA,
author = "Anonymous",
title = "{Solaris solstice AdminSuite} vulnerabilities",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "3--3",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89863-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898637",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:VP,
author = "Anonymous",
title = "Vulnerability in the {\tt at}(1) program",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "3--4",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89864-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898649",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Szweda:1997:EYL,
author = "Roy Szweda",
title = "{Ernst \& Young LLP} --- {WheelGroup Corp.} alliance",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "4--4",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89866-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898662",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:SCVa,
author = "Anonymous",
title = "{SunOS} {\tt chkey} vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "4--4",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89865-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898650",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:API,
author = "Anonymous",
title = "Alliance provides {Internet} security to large
enterprises",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "4--5",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89867-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898674",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1997:MOE,
author = "Atoosa Savarnejad",
title = "{Microsoft} to offer enhanced firewall features in new
server",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "5--5",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89869-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898698",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:LTR,
author = "Anonymous",
title = "{Lucent Technologies} to resell {Raptor}'s firewalls",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "5--5",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89868-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898686",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:AUH,
author = "Anonymous",
title = "{AOL} users hit further problems with hackers",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "6--6",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89871-6",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898716",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Szweda:1997:STF,
author = "Roy Szweda",
title = "{Sun} takes on {Feds} over {US} encryption
regulations",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "6--6",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89870-4",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898704",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Breitrose:1997:MJW,
author = "Charlie Breitrose",
title = "{Microsoft} joins {Web} security consortium",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "6--7",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89872-8",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898728",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Szweda:1997:HFS,
author = "Roy Szweda",
title = "Holographic fingerprint security device",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "7--7",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89874-1",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898741",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:UEL,
author = "Anonymous",
title = "{US} export licence for $ 128$-bit encryption for
{Microsoft}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "7--7",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89873-X",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S135348589789873X",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Szweda:1997:ESW,
author = "Roy Szweda",
title = "Encryption software for {Windows}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "8--8",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89877-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898777",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:SPO,
author = "Anonymous",
title = "{SessionWall-3} protects organizations from abuse",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "8--8",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89876-5",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898765",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:EIM,
author = "Anonymous",
title = "Enhancements to improve model for signing {Internet}
Code",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "8--8",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89875-3",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898753",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Savarnejad:1997:GAD,
author = "Atoosa Savarnejad",
title = "Group asks for disclosure of travel records of crypto
czar",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "8--9",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89878-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898789",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Breitrose:1997:ALD,
author = "Charlie Breitrose",
title = "{American} legislators debate encryption laws",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "9--10",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89879-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898790",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Breitrose:1997:WSG,
author = "Charlie Breitrose",
title = "{Web} security group unveils certification programme",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "10--10",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89880-7",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898807",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Madsen:1997:KEE,
author = "Wayne Madsen",
title = "{Key Escrow Encryption Bill} hits {Congress}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "11--12",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89881-9",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898819",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Cohen:1997:MNSg,
author = "Fred Cohen",
title = "Managing network security --- {Part 8}: Relativistic
risk assessment",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "13--14",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89882-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898820",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Schultz:1997:BRIa,
author = "Eugene Schultz",
title = "Book Review: {{\booktitle{Internet security: Risk
analysis, strategies, and firewalls}}: Othmar Kyas,
International Thomson Computer Press, 1997}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "7",
pages = "15--15",
month = jul,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)89883-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:10 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897898832",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:WNN,
author = "Anonymous",
title = "{Windows NT NtOpenProcessToken} vulnerability",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "8",
pages = "2--2",
month = aug,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83224-2",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:12 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897832242",
acknowledgement = ack-nhfb,
fjournal = "Network Security",
journal-URL = "https://www.sciencedirect.com/journal/network-security",
}
@Article{Anonymous:1997:VLb,
author = "Anonymous",
title = "Vulnerability in {\tt ld.so}",
journal = j-NETWORK-SECURITY,
volume = "1997",
number = "8",
pages = "2--2",
month = aug,
year = "1997",
CODEN = "NTSCF5",
DOI = "https://doi.org/10.1016/S1353-4858(97)83223-0",
ISSN = "1353-4858 (print), 1872-9371 (electronic)",
ISSN-L = "1353-4858",
bibdate = "Mon Dec 4 16:57:12 MST 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/network-security.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S1353485897832230",
acknowledgement =