Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.01",
%%%     date            = "26 December 2021",
%%%     time            = "08:30:09 MST",
%%%     filename        = "computsecur2000.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "42337 25217 87880 961292",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; Computers and
%%%                        Security",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        journal Computers and Security (CODEN CPSEDU,
%%%                        ISSN 0167-4048 (print), 1872-6208
%%%                        (electronic)) for the decade 2000--2009.
%%%
%%%                        The journal is published by Elsevier, and
%%%                        publication began with volume 1, number 1, in
%%%                        January 1982.  The issue count per annual
%%%                        volume rose from 3 (volumes 1--2) to 4
%%%                        (volumes 3--5) to 6 (volumes 6--7) to 8
%%%                        (volumes 9--31).  From volume 32 in 2013,
%%%                        issues are no longer assigned, and there are
%%%                        multiple volumes per year.
%%%
%%%                        The journal has Web sites at
%%%
%%%                            https://www.sciencedirect.com/journal/computers-and-security
%%%                            http://www.sciencedirect.com/science/journal/01674048
%%%
%%%                        At version 1.01, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             2000 ( 175)    2004 (  94)    2008 ( 120)
%%%                             2001 ( 152)    2005 (  90)    2009 ( 102)
%%%                             2002 ( 122)    2006 ( 102)
%%%                             2003 ( 131)    2007 ( 113)
%%%
%%%                             Article:       1201
%%%
%%%                             Total entries: 1201
%%%
%%%                        Entries for this bibliography have been
%%%                        derived primarily from data at the publisher
%%%                        Web site, but have been augmented by data
%%%                        from the BibNet Project and TeX User Group
%%%                        bibliography archives.
%%%
%%%                        Spelling has been verified with the UNIX
%%%                        spell and GNU ispell programs using the
%%%                        exception dictionary stored in the companion
%%%                        file with extension .sok.  BibTeX citation
%%%                        tags are uniformly chosen as
%%%                        name:year:abbrev, where name is the family
%%%                        name of the first author or editor, year is a
%%%                        4-digit number, and abbrev is a 3-letter
%%%                        condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.  In this bibliography,
%%%                        entries are sorted in publication order using
%%%                        bibsort -byvolume.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}} \fi" #
    "\ifx \undefined \circled   \def \circled   #1{(#1)}\fi" #
    "\ifx \undefined \reg       \def \reg         {\circled{R}}\fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-COMPUT-SECUR          = "Computers \& Security"}

%%% ====================================================================
%%% Bibliography entries, sorted in publication order with ``bibsort
%%% --byvolume'':
@Article{Hancock:2000:Ea,
  author =       "Bill Hancock",
  title =        "From The {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "2--5",
  day =          "1",
  month =        jan,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800863555",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:SVa,
  author =       "Bill Hancock",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "6--17",
  day =          "1",
  month =        jan,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800863567",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Williams:2000:KRA,
  author =       "Chuck Williams and Nevenko Zunic and Stephen M. Matyas
                 and Sarbari Gupta and Michael Willett",
  title =        "Key Recovery Alliance {(KRA)} Technology Papers,
                 Special Issue --- Introduction",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "18--20",
  day =          "1",
  month =        jan,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800863579",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Smith:2000:CIR,
  author =       "Michael Smith and Paul {Van Oorschot} and Michael
                 Willett",
  title =        "Cryptographic Information Recovery Using Key
                 Recovery",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "21--27",
  day =          "1",
  month =        jan,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800863580",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Willett:2000:FAC,
  author =       "Michael Willett",
  title =        "Features, Attributes, Characteristics, and Traits
                 {(FACTs)} of Key Recovery Schemes\slash Products",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "28--30",
  day =          "1",
  month =        jan,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800863592",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kennedy:2000:KRF,
  author =       "John Kennedy and Stephen M. Matyas and Nevenko Zunic",
  title =        "Key Recovery Functional Model",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "31--36",
  day =          "1",
  month =        jan,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800863609",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Matyas:2000:AKR,
  author =       "Stephen M. Matyas and Nevenko Zunic",
  title =        "Additional Key Recovery Functions",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "37--40",
  day =          "1",
  month =        jan,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800863610",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gupta:2000:CKR,
  author =       "Sarbari Gupta",
  title =        "A Common Key Recovery Block Format: Promoting
                 Interoperability Between Dissimilar Key Recovery
                 Mechanisms",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "41--47",
  day =          "1",
  month =        jan,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800863622",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Williams:2000:GIK,
  author =       "Chuck Williams and Nevenko Zunic",
  title =        "Global Interoperability for Key Recovery",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "48--55",
  day =          "1",
  month =        jan,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800863634",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gupta:2000:PKI,
  author =       "Sarbari Gupta and Stephen M. Matyas",
  title =        "Public Key Infrastructure: Analysis of Existing and
                 Needed Protocols and Object Formats for Key Recovery",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "56--68",
  day =          "1",
  month =        jan,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800863646",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Maclean:2000:OIG,
  author =       "Abby Maclean and Stephen M. Matyas and Nevenko Zunic",
  title =        "Organization Implementation Guidelines for Recovery of
                 Encrypted Information",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "69--81",
  day =          "1",
  month =        jan,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800863658",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zunic:2000:OCR,
  author =       "Nevenko Zunic",
  title =        "Organization Considerations for Retrieval of Stored
                 Data via Key Recovery Methods",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "82--85",
  day =          "1",
  month =        jan,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480086366X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Markham:2000:KRH,
  author =       "Tom Markham and Chuck Williams",
  title =        "Key Recovery Header for {IPSEC}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "86--90",
  day =          "1",
  month =        jan,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800863671",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Balenson:2000:IKR,
  author =       "David Balenson and Tom Markham",
  title =        "{ISAKMP} Key Recovery Extensions",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "91--99",
  day =          "1",
  month =        jan,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800863683",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shoriak:2000:STP,
  author =       "Timothy G. Shoriak",
  title =        "{SSL\slash TLS} Protocol Enablement for Key Recovery",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "100--104",
  day =          "1",
  month =        jan,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800863695",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2000:PJa,
  author =       "Anonymous",
  title =        "Pages 2--104 ({1 January 2000})",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "??--??",
  day =          "1",
  month =        jan,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:Eb,
  author =       "Bill Hancock",
  title =        "From The {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "106--107",
  day =          "1",
  month =        feb,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800878190",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:SVb,
  author =       "Bill Hancock",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "108--118",
  day =          "1",
  month =        feb,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800878207",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2000:NMO,
  author =       "Stephen Hinde",
  title =        "New {Millennium}, Old Failures",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "119--127",
  day =          "1",
  month =        feb,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800878219",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Webb:2000:CMH,
  author =       "Steve Webb",
  title =        "Crimes And Misdemeanours: How to Protect Corporate
                 Information in the {Internet} Age",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "128--132",
  day =          "1",
  month =        feb,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800878220",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:2000:IT,
  author =       "Gerald L. Kovacich and William C. Boni",
  title =        "{Internet} Targets",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "133--140",
  day =          "1",
  month =        feb,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800878232",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collins:2000:TCP,
  author =       "Michael Collins",
  title =        "Telecommunications Crime --- {Part 3}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "141--148",
  day =          "1",
  month =        feb,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800878244",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hoogenboom:2000:SRA,
  author =       "Mark Hoogenboom and Patrick Steemers",
  title =        "Security For Remote Access And Mobile Applications",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "149--163",
  day =          "1",
  month =        feb,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800878256",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:2000:ARAa,
  author =       "Sandy Nichol",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "164--172",
  day =          "1",
  month =        feb,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800878268",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2000:AIV,
  author =       "Anonymous",
  title =        "Author Index for Volume 18",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "175--175",
  day =          "1",
  month =        feb,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480087827X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2000:SIV,
  author =       "Anonymous",
  title =        "Subject Index for Volume 18",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "176--176",
  day =          "1",
  month =        feb,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800878281",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Barnard:2000:FAE,
  author =       "Lynette Barnard and Rossouw von Solms",
  title =        "A Formalized Approach to the Effective Selection and
                 Evaluation of Information Security Controls",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "185--194",
  day =          "1",
  month =        feb,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800878293",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2000:PF,
  author =       "Anonymous",
  title =        "Pages 106--194 ({1 February 2000})",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "??--??",
  day =          "1",
  month =        feb,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:Ec,
  author =       "Bill Hancock",
  title =        "From The {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "200--201",
  day =          "1",
  month =        mar,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800886083",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:SVc,
  author =       "Bill Hancock",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "202--221",
  day =          "1",
  month =        mar,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800886095",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2000:LWS,
  author =       "Stephen Hinde",
  title =        "Life Was Simple Then",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "222--229",
  day =          "1",
  month =        mar,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800886101",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Barber:2000:IPK,
  author =       "Richard Barber",
  title =        "Implementing Public Key Infrastructures in a Dynamic
                 Business Environment",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "230--233",
  day =          "1",
  month =        mar,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800886113",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Finne:2000:ISR,
  author =       "Thomas Finne",
  title =        "Information Systems Risk Management: Key Concepts and
                 Business Processes",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "234--242",
  day =          "1",
  month =        mar,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800886125",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Eloff:2000:ISMa,
  author =       "M. M. Eloff and S. H. von Solms",
  title =        "Information Security Management: a Hierarchical
                 Framework for Various Approaches",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "243--256",
  day =          "1",
  month =        mar,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800886137",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:2000:ARAb,
  author =       "Sandy Nichol",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "257--262",
  day =          "1",
  month =        mar,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800886149",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kokolakis:2000:AIM,
  author =       "S. A. Kokolakis and E. A. Kiountouzis",
  title =        "Achieving Interoperability in a
                 Multiple-Security-Policies Environment",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "267--281",
  day =          "1",
  month =        mar,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800886150",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Peyravian:2000:GRK,
  author =       "Mohammad Peyravian and Stephen M. Matyas and Allen
                 Roginsky and Nevenko Zunic",
  title =        "Generation of {RSA} Keys That Are Guaranteed to be
                 Unique for Each User",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "282--288",
  day =          "1",
  month =        mar,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800886162",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2000:PM,
  author =       "Anonymous",
  title =        "Pages 200--288 ({1 March 2000})",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "??--??",
  day =          "1",
  month =        mar,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:Ed,
  author =       "Bill Hancock",
  title =        "From The {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "294--295",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040013",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:SHA,
  author =       "Bill Hancock",
  title =        "Suspected Hackers Arrested in {Russian} Credit-Card
                 Fraud",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "296--296",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040025",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:IEI,
  author =       "Bill Hancock",
  title =        "{Intel} Eliminates {ID} from New Chips",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "296--297",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040037",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:EPD,
  author =       "Bill Hancock",
  title =        "{European Parliament} Doesn't Like Anonymity Online",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "297--297",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040049",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:DFP,
  author =       "Bill Hancock",
  title =        "{DOD} Finds Plans Online --- Reserve Unit Assesses
                 Risk",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "297--298",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040050",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:AOW,
  author =       "Bill Hancock",
  title =        "Agencies Are {``Own} Worst {Enemy''}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "298--298",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040062",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:UDE,
  author =       "Bill Hancock",
  title =        "{US} Department of Energy Security Criticized ---
                 Again",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "298--300",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040074",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:WHW,
  author =       "Bill Hancock",
  title =        "This is What Happens When You Lose Your Computer With
                 Classified Data On It \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "300--301",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040086",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:EWP,
  author =       "Bill Hancock",
  title =        "Not Everyone Wants {PKI} --- {NSF} Opts for Digital
                 Signature Alternative",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "301--302",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040098",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:JDC,
  author =       "Bill Hancock",
  title =        "{Justice Department} Conducting Criminal Probe in
                 Former {CIA Director} Activities",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "302--303",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040104",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:ASD,
  author =       "Bill Hancock",
  title =        "{Apache} Site Defaced",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "303--305",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040116",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:UEC,
  author =       "Bill Hancock",
  title =        "{US} and {Europe} Cybercrime Agreement Problems",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "306--307",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040128",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:CR,
  author =       "Bill Hancock",
  title =        "Cyberstalking on the Rise",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "307--308",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480004013X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:LCP,
  author =       "Bill Hancock",
  title =        "Large Child Pornography Ring Busted in {Texas}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "308--309",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040141",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:NDS,
  author =       "Bill Hancock",
  title =        "New Denial of Service Attack on {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "309--310",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040153",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:USC,
  author =       "Bill Hancock",
  title =        "{US} Supreme Court Confirms {ISPs} Not Liable in
                 E-mail Messages",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "310--310",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040165",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:SSI,
  author =       "Bill Hancock",
  title =        "Software Scam --- 17 Indicted",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "310--311",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040177",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2000:SSS,
  author =       "Stephen Hinde",
  title =        "Smurfing, Swamping, Spamming, Spoofing, Squatting,
                 Slandering, Surfing, Scamming and Other Mischiefs of
                 the World Wide {Web}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "312--320",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040189",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Barber:2000:SMW,
  author =       "Richard Barber",
  title =        "Security in a Mobile World --- Is {Bluetooth} the
                 Answer?",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "321--325",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040190",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:2000:NGTa,
  author =       "Gerald L. Kovacich",
  title =        "Netspionage --- The Global Threat to Information, Part
                 I: What is it and Why {$I$} Should Care?",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "326--336",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040207",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nosworthy:2000:IIS,
  author =       "Julie D. Nosworthy",
  title =        "Implementing Information Security In The {21-st
                 Century} --- Do You Have the Balancing Factors?",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "337--347",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040219",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vanKrugten:2000:BSJ,
  author =       "Petra van Krugten and Mark Hoogenboom",
  title =        "{B2C} Security --- Be Just Secure Enough",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "348--356",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040220",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carroll:2000:LE,
  author =       "John Carroll",
  title =        "Letter To The {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "357--358",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040232",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:2000:ARAc,
  author =       "Sandy Nichol",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "359--363",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040244",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Peyravian:2000:MBB,
  author =       "Mohammad Peyravian and Stephen M. Matyas and Allen
                 Roginsky and Nevenko Zunic",
  title =        "Multiparty Biometric-Based Authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "369--374",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800040256",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2000:PA,
  author =       "Anonymous",
  title =        "Pages 294--374 ({1 April 2000})",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "??--??",
  day =          "1",
  month =        apr,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:Ee,
  author =       "Bill Hancock",
  title =        "From The {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "380--381",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480005001X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:SVd,
  author =       "Bill Hancock",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "382--383",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050021",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:ALA,
  author =       "Bill Hancock",
  title =        "{``I Agree''} Legal Agreements Get Legislated",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "383--384",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050033",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:UGT,
  author =       "Bill Hancock",
  title =        "The {US Government} Tells Its Users to Clean Up Their
                 E-mail",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "385--387",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050045",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:HPT,
  author =       "Bill Hancock",
  title =        "Home {PC}'s Targeted by Hackers (Duh!)",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "387--388",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050057",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:CGS,
  author =       "Bill Hancock",
  title =        "{CIO}'s Get Serious About Best Security Practices",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "388--388",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050069",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:YFI,
  author =       "Bill Hancock",
  title =        "{Yahoo} Faces Identity Crisis",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "389--389",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050070",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:MPV,
  author =       "Bill Hancock",
  title =        "{Microsoft} a Popular Virus Target Due to Ubiquity",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "389--391",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050082",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:URB,
  author =       "Bill Hancock",
  title =        "{UK}'s {RIP} Bill Creates Official Snooping",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "391--392",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050094",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:EGO,
  author =       "Bill Hancock",
  title =        "Extortion Going Online",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "392--393",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050100",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:OPR,
  author =       "Bill Hancock",
  title =        "{Office} 2000 Patch Recommended by {CERT}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "393--393",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050112",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:SRP,
  author =       "Bill Hancock",
  title =        "Self-Regulation for Privacy Doesn't Work Says {FTC}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "393--394",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050124",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:LIW,
  author =       "Bill Hancock",
  title =        "\ldots{} {But} the Industry Wants Self-Regulation",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "394--395",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050136",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:USW,
  author =       "Bill Hancock",
  title =        "{US Senate} Wakes Up to Need for Cybertools for Law
                 Enforcers",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "395--396",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050148",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:PVK,
  author =       "Bill Hancock",
  title =        "{PGP} V5.0 Keys Potentially Insecure",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "396--397",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480005015X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:CCC,
  author =       "Bill Hancock",
  title =        "{Canadian} Credit Card Conundrum Caused by a Cracker",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "397--398",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050161",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:SCL,
  author =       "Bill Hancock",
  title =        "Suspect Charged in `Love Bug' Worm has Charges
                 Dropped",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "398--398",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050173",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:NSR,
  author =       "Bill Hancock",
  title =        "Network Solutions {Re}-evaluates Security",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "398--400",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050185",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:CSS,
  author =       "Bill Hancock",
  title =        "{CMU} Sets Up a Sister to {CERT}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "400--401",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050197",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:SRY,
  author =       "Bill Hancock",
  title =        "Speedy Response Yields Success at {DOE}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "401--401",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050203",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:AGB,
  author =       "Bill Hancock",
  title =        "{AOL} Gets Busted --- Again",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "402--402",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050215",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:WB,
  author =       "Bill Hancock",
  title =        "{Who}'s to Blame?",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "402--403",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050227",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:WUB,
  author =       "Bill Hancock",
  title =        "Wireless Ubiquity for E-Biz",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "403--403",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050239",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:NBY,
  author =       "Bill Hancock",
  title =        "And Now, the Bug-in-Your-Site Award Goes To \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "404--404",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050240",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:III,
  author =       "Bill Hancock",
  title =        "Isn't It Interesting What You Can Buy At An Auction
                 Site? {TV}'s, Computers, Drugs \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "404--405",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050252",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:GTA,
  author =       "Bill Hancock",
  title =        "{G8} Thinks About Cybercrime (It's About Time, Too)",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "405--407",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050264",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2000:LCA,
  author =       "Stephen Hinde",
  title =        "Love Conquers All?",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "408--420",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050276",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:2000:NGTb,
  author =       "Gerald L. Kovacich",
  title =        "Netspionage --- The Global Threat to Information, Part
                 {II}: Information Collection in the {Gray} Zone",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "421--427",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050288",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Matyas:2000:BSI,
  author =       "Stephen M. Matyas and Jeff Stapleton",
  title =        "A Biometric Standard for Information Management and
                 Security",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "428--441",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480005029X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:2000:ARAd,
  author =       "Sandy Nichol",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "443--448",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050306",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Huang:2000:GEP,
  author =       "Yu-Lun Huang and Shiuh-Pyng Shieh and Fu-Shen Ho",
  title =        "A Generic Electronic Payment Model Supporting Multiple
                 Merchant Transactions",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "453--465",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800050318",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Peyravian:2000:MPP,
  author =       "Mohammad Peyravian and Nevenko Zunic",
  title =        "Methods for Protecting Password Transmission",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "466--469",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480005032X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2000:PJb,
  author =       "Anonymous",
  title =        "Pages 380--469 ({1 July 2000})",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "??--??",
  day =          "1",
  month =        jul,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:Ef,
  author =       "Bill Hancock",
  title =        "From The {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "474--475",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060016",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:NNS,
  author =       "Bill Hancock",
  title =        "A Need for a Network Security Czar",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "476--477",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060028",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:UGF,
  author =       "Bill Hancock",
  title =        "{US Government} Fighting for Expanded Wiretap Laws",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "477--477",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480006003X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:CPF,
  author =       "Bill Hancock",
  title =        "E-Commerce Paranoia: Flaws in Code",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "477--479",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060041",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:TCS,
  author =       "Bill Hancock",
  title =        "Truly Certified: Security Certifications Update",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "479--480",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060053",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:DCG,
  author =       "Bill Hancock",
  title =        "Digital Certificates Get Creative",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "480--487",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060065",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:HCS,
  author =       "Bill Hancock",
  title =        "Health Care Security: a Hard Look at a Growing
                 Problem",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "482--482",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060077",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:PGC,
  author =       "Bill Hancock",
  title =        "{Philippine} Government Creates Incident Response
                 Team",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "483--483",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060090",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:SUW,
  author =       "Bill Hancock",
  title =        "Safeway {UK}'s {Website} Shut Down",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "483--483",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060089",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:DDG,
  author =       "Bill Hancock",
  title =        "{DDoS} Defence Gets Regulatory",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "483--485",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060107",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:VTC,
  author =       "Bill Hancock",
  title =        "{Visa}'s Ten Commandments for E-Security Online",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "485--486",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060119",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:P,
  author =       "Bill Hancock",
  title =        "`{Porngate}'?",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "486--487",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060120",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:WYS,
  author =       "Bill Hancock",
  title =        "What You Sell Online in {France} Could Be Restricted
                 \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "487--487",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060132",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:HSL,
  author =       "Bill Hancock",
  title =        "Hackers Still Love to Attack the {Pentagon}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "488--488",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060144",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:SHN,
  author =       "Bill Hancock",
  title =        "Spying At Home: a New Pastime to Detect Online
                 Romance",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "488--491",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060156",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:CHR,
  author =       "Bill Hancock",
  title =        "Is a Convicted Hacker Really Reformed and Should You
                 Hire Them?",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "491--493",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060168",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:DRJ,
  author =       "Bill Hancock",
  title =        "{DefCon} Recruiting {JamFest}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "493--494",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480006017X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:HTM,
  author =       "Bill Hancock",
  title =        "Hacker Target: Mobile Phones",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "494--495",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060181",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:MPI,
  author =       "Bill Hancock",
  title =        "E-{Mail} Privacy Issues Escalate",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "495--495",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060193",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:GOR,
  author =       "Bill Hancock",
  title =        "{GeoCities} Ordered to Report on Information Poster",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "495--496",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480006020X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:MHN,
  author =       "Bill Hancock",
  title =        "`{Mafiaboy}' Hit With 64 New Charges",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "496--496",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060211",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:HBF,
  author =       "Bill Hancock",
  title =        "Hackers Breach Firewall-1",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "496--497",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060223",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:LDH,
  author =       "Bill Hancock",
  title =        "{Lotus} Domino Holes Up",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "497--498",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060235",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2000:FBO,
  author =       "Stephen Hinde",
  title =        "Fireworks, Beer and Old Halfpennies --- The Risks of
                 Assumption",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "499--504",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060247",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:2000:NPI,
  author =       "Gerald L. Kovacich",
  title =        "Netspionage --- Part {III}: the Black Zone, Who Uses
                 Netspionage, How and Why",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "505--519",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060259",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:2000:MSS,
  author =       "Fred Cohen",
  title =        "A Mathematical Structure of Simple Defensive Network
                 Deceptions",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "520--528",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060260",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Furnell:2000:ASS,
  author =       "S. M. Furnell and P. S. Dowland and H. M. Illingworth
                 and P. L. Reynolds",
  title =        "Authentication and Supervision: a Survey of User
                 Attitudes",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "529--539",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060272",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palmer:2000:ARAa,
  author =       "Chlo{\"e} Palmer",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "540--546",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060284",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Peyravian:2000:TCB,
  author =       "Mohammad Peyravian and Stephen M. Matyas and Allen
                 Roginsky and Nevenko Zunic",
  title =        "Ticket and Challenge-Based Protocols for
                 Timestamping",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "551--558",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060296",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Torrubia:2000:ISM,
  author =       "Andres Torrubia and Francisco J. Mora",
  title =        "Information Security in Multiprocessor Systems Based
                 on the X86 Architecture",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "559--563",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800060302",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2000:PO,
  author =       "Anonymous",
  title =        "Pages 474--563 ({1 October 2000})",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "6",
  pages =        "??--??",
  day =          "1",
  month =        oct,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:Eg,
  author =       "Bill Hancock",
  title =        "From The {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "568--569",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070012",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:NCU,
  author =       "Bill Hancock",
  title =        "New Classes of {Unix\slash Linux} Attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "570--571",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/linux.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070024",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:AEC,
  author =       "Bill Hancock",
  title =        "{American} Express Creates Disposable Credit Card
                 Numbers",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "571--572",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070036",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:MRN,
  author =       "Bill Hancock",
  title =        "{Microsoft} Releases New {IIS} Security Tool",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "572--572",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070048",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:BRS,
  author =       "Bill Hancock",
  title =        "{Baltimore} Releases Security Developer Freeware",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "572--573",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480007005X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:FSV,
  author =       "Bill Hancock",
  title =        "`Files Streams' Virus Infects in an Old and New Way",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "573--574",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070061",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:TVD,
  author =       "Bill Hancock",
  title =        "{Trinity} v3, a {DDoS} Tool, Hits the Streets",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "574--574",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070073",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:HIN,
  author =       "Bill Hancock",
  title =        "Hacker Insurance Now Part of the Business Risk
                 Management Kit",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "574--575",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070085",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:WCN,
  author =       "Bill Hancock",
  title =        "Wireless Crazed? {No} Security For You!",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "575--577",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070097",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:WHSa,
  author =       "Bill Hancock",
  title =        "{White House} Supporting Open Source Code",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "577--578",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/gnu.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070103",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:WHSb,
  author =       "Bill Hancock",
  title =        "{White House Security Summit} Builds Towards a {B2B}
                 Security Standard",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "578--579",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070115",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:CSH,
  author =       "Bill Hancock",
  title =        "Cellular Security Hazards",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "579--579",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070127",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:UFT,
  author =       "Bill Hancock",
  title =        "{UK} Fuel Taxes Protestor Accused of Mass Hacking",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "580--580",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070139",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:UGB,
  author =       "Bill Hancock",
  title =        "{US Government} Board Setting Up Security Metrics",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "580--580",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070140",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:PGW,
  author =       "Bill Hancock",
  title =        "Privacy Group Wants `Web Bugs' Disclosures",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "581--581",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070152",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:SSB,
  author =       "Bill Hancock",
  title =        "Site Spoofing Becomes More Popular",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "581--583",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070164",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:FPV,
  author =       "Bill Hancock",
  title =        "First {PDA} Virus Hits the Airwaves",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "583--584",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070176",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2000:DYK,
  author =       "Stephen Hinde",
  title =        "Do You Know Your {Organization}'s {Achilles} Heel?",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "585--590",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070188",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bequai:2000:RIM,
  author =       "August Bequai",
  title =        "Romancing The {Internet} And {Management}'s Quagmire",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "591--595",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480007019X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nosworthy:2000:PRA,
  author =       "Julie D. Nosworthy",
  title =        "A Practical Risk Analysis Approach: Managing {BCM}
                 Risk",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "596--614",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070206",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:2000:IST,
  author =       "Basie von Solms",
  title =        "Information Security --- The Third Wave?",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "615--620",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070218",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palmer:2000:ARAb,
  author =       "Chlo{\"e} Palmer",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "621--626",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480007022X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pond:2000:WAC,
  author =       "Rachael Pond and John Podd and Julie Bunnell and Ron
                 Henderson",
  title =        "Word Association Computer Passwords: the Effect of
                 Formulation Techniques on Recall and Guessing Rates",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "645--656",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800070231",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2000:PN,
  author =       "Anonymous",
  title =        "Pages 568--656 ({1 November 2000})",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "7",
  pages =        "??--??",
  day =          "1",
  month =        nov,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:Eh,
  author =       "Bill Hancock",
  title =        "From The {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "662--663",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080019",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:SSC,
  author =       "Bill Hancock",
  title =        "From Stones in the Street to Cyberspace --- {Israeli}
                 and {Palestinians} Continue Their Virtual Battles $ 24
                 \times 7 $",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "664--665",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080020",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:FSM,
  author =       "Bill Hancock",
  title =        "Feeling Sorry for {Microsoft}?",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "665--666",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080032",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:HMC,
  author =       "Bill Hancock",
  title =        "However, {Microsoft} Could Use Some Sympathy ---
                 {Dutch} Hacker Busts {Microsoft} {Web} Site --- Again",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "666--667",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080044",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:WBB,
  author =       "Bill Hancock",
  title =        "Wireless Big Brother",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "667--668",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080056",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:NHP,
  author =       "Bill Hancock",
  title =        "{NASA} Hacker Pleads Guilty",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "668--669",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080068",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:CTM,
  author =       "Bill Hancock",
  title =        "{Canadian} Teen {Mafiaboy} Pleads Guilty",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "669--669",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480008007X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:GLH,
  author =       "Bill Hancock",
  title =        "Getting the Laws to Help Combat Cybercrime (There's a
                 grand idea)",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "669--670",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080081",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:IBG,
  author =       "Bill Hancock",
  title =        "{Internet} Biz Group Calls for Cybercrime Treaty
                 Delay",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "671--671",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080093",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:LTN,
  author =       "Bill Hancock",
  title =        "Laptop Theft Now Targeted Towards Data and Not
                 Necessarily Hardware",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "671--673",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480008010X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:HI,
  author =       "Bill Hancock",
  title =        "Hacktivism Increasing",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "673--674",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080111",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:UDD,
  author =       "Bill Hancock",
  title =        "{US} Department of Defense Prepares Cybercrime
                 Database",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "674--674",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080123",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:CCR,
  author =       "Bill Hancock",
  title =        "{CIA} Chat Room Causes Grief",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "674--676",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080135",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:JCC,
  author =       "Bill Hancock",
  title =        "{Japan} Creates Cyberconditions for {IT} National
                 Revolution",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "676--677",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080147",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2000:UPL,
  author =       "Bill Hancock",
  title =        "{US} Privacy Law Proposals Cause Concerns",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "677--678",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080159",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2000:NNO,
  author =       "Stephen Hinde",
  title =        "New Names For Old --- a Personal Surf Through Compsec
                 2000",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "679--687",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080160",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bequai:2000:AIC,
  author =       "August Bequai",
  title =        "{America}'s {Internet} Commerce and The Threat of
                 Fraud",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "688--691",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080172",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Clarke:2000:SCH,
  author =       "Andy Clarke and Vince Gallo",
  title =        "The Software Colander --- Holes in Messaging",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "692--697",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080184",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Eloff:2000:ISMb,
  author =       "M. M. Eloff and S. H. von Solms",
  title =        "Information Security Management: an Approach to
                 Combine Process Certification And Product Evaluation",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "698--709",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080196",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sherwood:2000:OE,
  author =       "John Sherwood",
  title =        "Opening Up The Enterprise",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "710--719",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080202",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palmer:2000:ARAc,
  author =       "Chlo{\"e} Palmer",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "720--725",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080214",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzalis:2000:SEM,
  author =       "Stefanos Gritzalis and Sokratis K. Katsikas and
                 Dimitrios Lekkas and Konstantinos Moulinos and Eleni
                 Polydorou",
  title =        "Securing The Electronic Market: the {{\em KEYSTONE}}
                 Public Key Infrastructure Architecture",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "731--746",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404800080226",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2000:PD,
  author =       "Anonymous",
  title =        "Pages 662--746 ({1 December 2000})",
  journal =      j-COMPUT-SECUR,
  volume =       "19",
  number =       "8",
  pages =        "??--??",
  day =          "1",
  month =        dec,
  year =         "2000",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:Ea,
  author =       "Bill Hancock",
  title =        "From The {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "2--3",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480101001X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:YSL,
  author =       "Bill Hancock",
  title =        "{Y2K} and Security --- a Low Priority Year",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "4--5",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010021",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:VAW,
  author =       "Bill Hancock",
  title =        "{Voodoo} is Alive and Well on Your Computer",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "5--6",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010033",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:HHV,
  author =       "Bill Hancock",
  title =        "Hand-held Virii On The Way",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "6--7",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010045",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:CPL,
  author =       "Bill Hancock",
  title =        "{China} Passes Law to Promote {Internet} Security ---
                 Supposedly",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "7--7",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010057",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:SM,
  author =       "Bill Hancock",
  title =        "Smarter Marines",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "7--7",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010069",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:TBH,
  author =       "Bill Hancock",
  title =        "E-tailers Batten Down the Hatches",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "8--8",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010070",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:IWH,
  author =       "Bill Hancock",
  title =        "Information Warfare Highlighted as a Concern by {US
                 Government}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "8--9",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010082",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:MSJ,
  author =       "Bill Hancock",
  title =        "E-mail Spammers Jailed",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "9--10",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010094",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:CSO,
  author =       "Bill Hancock",
  title =        "The {Chief} Security {Officer}'s Top Ten List for
                 2001",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "10--14",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010100",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:SHP,
  author =       "Bill Hancock",
  title =        "`Safe Harbor' Provision Adopters Few and Far Between",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "14--15",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010112",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:WGD,
  author =       "Bill Hancock",
  title =        "The Wireless Great Divide --- But Getting Smaller",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "15--17",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010124",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:PT,
  author =       "Bill Hancock",
  title =        "{It}'s a Privacy Thing in 2001",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "17--18",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010136",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:FSE,
  author =       "Bill Hancock",
  title =        "Fighting {SPAM} in {Europe}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "18--19",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010148",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:PAG,
  author =       "Bill Hancock",
  title =        "Privacy Advocates Grow in {Europe}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "19--20",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480101015X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2001:PO,
  author =       "Stephen Hinde",
  title =        "2001: a Privacy Odyssey",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "21--27",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010161",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bequai:2001:SCI,
  author =       "August Bequai",
  title =        "Software Concerns And The {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "28--30",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010173",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Franklin:2001:PWS,
  author =       "Iain Franklin",
  title =        "Protecting The {Web} Server And Applications",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "31--35",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010185",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Graham:2001:NPS,
  author =       "Robert Graham",
  title =        "{NIDS} --- Pattern Search vs. Protocol Decode",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "37--41",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010197",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rathmell:2001:PCI,
  author =       "Andrew Rathmell",
  title =        "Protecting Critical Information Infrastructures",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "43--52",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010203",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Philippsohn:2001:TCO,
  author =       "Steven Philippsohn",
  title =        "Trends In Cybercrime --- an Overview Of Current
                 Financial Crimes On The {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "53--69",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010215",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palmer:2001:ARAa,
  author =       "Chlo{\"e} Palmer and Helen Meyer",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "70--74",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010227",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:Ca,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "75--76",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010239",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:IBRa,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "77--78",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010240",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Golic:2001:HCC,
  author =       "Jovan Dj. Goli{\'c}",
  title =        "How to Construct Cryptographic Primitives from Stream
                 Ciphers",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "79--89",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010252",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:ITCa,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "91--93",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010264",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:GAa,
  author =       "Anonymous",
  title =        "Guide For Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "94--94",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801010276",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:PJa,
  author =       "Anonymous",
  title =        "Pages 2--94 ({31 January 2001})",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "1",
  pages =        "??--??",
  day =          "31",
  month =        jan,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:Eb,
  author =       "Bill Hancock",
  title =        "From The {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "2",
  pages =        "96--97",
  day =          "1",
  month =        apr,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801002012",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:PR,
  author =       "Bill Hancock",
  title =        "A Practical Risk",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "2",
  pages =        "98--126",
  day =          "1",
  month =        apr,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801002024",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2001:SP,
  author =       "Stephen Hinde",
  title =        "The Search For Privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "2",
  pages =        "127--131",
  day =          "1",
  month =        apr,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801002036",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Barber:2001:EID,
  author =       "Richard Barber",
  title =        "The Evolution of Intrusion Detection Systems --- The
                 Next Step",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "2",
  pages =        "132--145",
  day =          "1",
  month =        apr,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801002048",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wright:2001:CRC,
  author =       "Adrian Wright",
  title =        "Controlling Risks of E-commerce Content",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "2",
  pages =        "147--154",
  day =          "1",
  month =        apr,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480100205X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palmer:2001:ARAb,
  author =       "Chlo{\"e} Palmer",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "2",
  pages =        "155--160",
  day =          "1",
  month =        apr,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801002061",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:Cb,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "2",
  pages =        "161--162",
  day =          "1",
  month =        apr,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801002073",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:RP,
  author =       "Anonymous",
  title =        "Refereed Papers",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "2",
  pages =        "163--164",
  day =          "1",
  month =        apr,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801002085",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dhillon:2001:VST,
  author =       "Gurpreet Dhillon",
  title =        "Violation of Safeguards by Trusted Personnel and
                 Understanding Related Information Security Concerns",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "2",
  pages =        "165--172",
  day =          "1",
  month =        apr,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801002097",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Peyravian:2001:AMU,
  author =       "Mohammad Peyravian and Stephen M. Matyas and Allen
                 Roginsky and Nevenko Zunic",
  title =        "Alternative Method for Unique {RSA} Primes
                 Generation",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "2",
  pages =        "173--179",
  day =          "1",
  month =        apr,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801002103",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:ITCb,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "2",
  pages =        "181--183",
  day =          "1",
  month =        apr,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801002115",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:GAb,
  author =       "Anonymous",
  title =        "Guide For Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "2",
  pages =        "184--184",
  day =          "1",
  month =        apr,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801002127",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:PA,
  author =       "Anonymous",
  title =        "Pages 96--184 ({1 April 2001})",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "2",
  pages =        "??--??",
  day =          "1",
  month =        apr,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:Ec,
  author =       "Bill Hancock",
  title =        "From The {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "3",
  pages =        "186--187",
  day =          "1",
  month =        may,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801003017",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:SVa,
  author =       "Bill Hancock",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "3",
  pages =        "188--201",
  day =          "1",
  month =        may,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801003029",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2001:TTC,
  author =       "Stephen Hinde",
  title =        "The Times They Are A-Changin'",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "3",
  pages =        "202--206",
  day =          "1",
  month =        may,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801003030",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:2001:PSC,
  author =       "Gerald L. Kovacich",
  title =        "Protecting {21-st Century} Information --- {It}'s Time
                 for a Change",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "3",
  pages =        "207--213",
  day =          "1",
  month =        may,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801003042",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:2001:CGI,
  author =       "Basie von Solms",
  title =        "Corporate Governance and Information Security",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "3",
  pages =        "215--218",
  day =          "1",
  month =        may,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801003054",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Horrocks:2001:STE,
  author =       "Ivan Horrocks",
  title =        "Security Training: Education For an Emerging
                 Profession?",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "3",
  pages =        "219--226",
  day =          "1",
  month =        may,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801003066",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carter:2001:SYB,
  author =       "Bob Carter",
  title =        "Securing Your Brand In Cyberspace",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "3",
  pages =        "227--238",
  day =          "1",
  month =        may,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801003078",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palmer:2001:ARAc,
  author =       "Chlo{\"e} Palmer",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "3",
  pages =        "239--243",
  day =          "1",
  month =        may,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480100308X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:Cc,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "3",
  pages =        "244--245",
  day =          "1",
  month =        may,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801003091",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:AIV,
  author =       "Anonymous",
  title =        "Author Index for Volume 19",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "3",
  pages =        "246--246",
  day =          "1",
  month =        may,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801003108",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:SIV,
  author =       "Anonymous",
  title =        "Subject Index for Volume 19",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "3",
  pages =        "247--252",
  day =          "1",
  month =        may,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480100311X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:IBRb,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "3",
  pages =        "253--254",
  day =          "1",
  month =        may,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801003121",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Peyravian:2001:MTE,
  author =       "Mohammad Peyravian and Stephen M. Matyas and Allen
                 Roginsky and Nevenko Zunic",
  title =        "Methods for Timestamping Electronic Documents Using
                 Certificates and User-Specified Times",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "3",
  pages =        "255--262",
  day =          "1",
  month =        may,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801003133",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Frantzen:2001:FUV,
  author =       "Mike Frantzen and Florian Kerschbaum and E. Eugene
                 Schultz and Sonia Fahmy",
  title =        "A Framework for Understanding Vulnerabilities in
                 Firewalls Using a Dataflow Model of Firewall
                 Internals",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "3",
  pages =        "263--270",
  day =          "1",
  month =        may,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801003145",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:ITCc,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "3",
  pages =        "271--273",
  day =          "1",
  month =        may,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801003157",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:GAc,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "3",
  pages =        "274--274",
  day =          "1",
  month =        may,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801003169",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:PM,
  author =       "Anonymous",
  title =        "Pages 186--274 ({1 May 2001})",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "3",
  pages =        "??--??",
  day =          "1",
  month =        may,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:E,
  author =       "Anonymous",
  title =        "From The {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "276--276",
  day =          "31",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801004011",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:SVb,
  author =       "Bill Hancock",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "278--294",
  day =          "31",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801004023",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2001:WL,
  author =       "Stephen Hinde",
  title =        "The Weakest Link",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "295--301",
  day =          "31",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801004035",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:2001:CIA,
  author =       "Gerald L. Kovacich",
  title =        "The Corporate Information Assurance Officer {(CIAO)}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "302--307",
  day =          "31",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801004047",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:2001:IIS,
  author =       "Basie von Solms and Rossouw von Solms",
  title =        "Incremental Information Security Certification",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "308--310",
  day =          "31",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801004059",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pounder:2001:CCB,
  author =       "Chris Pounder",
  title =        "Cyber crime: the backdrop to the Council of {Europe}
                 Convention",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "311--315",
  day =          "31",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801004060",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zenkin:2001:FAI,
  author =       "Denis Zenkin",
  title =        "Fighting Against the Invisible Enemy: Methods for
                 detecting an unknown virus",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "316--321",
  day =          "31",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801004072",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palmer:2001:ARAd,
  author =       "Chlo{\"e} Palmer",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "322--326",
  day =          "31",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801004084",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:Cd,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "327--328",
  day =          "31",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801004096",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:IBRc,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "329--330",
  day =          "31",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801004102",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Reid:2001:ERA,
  author =       "Randall C. Reid and Stephen A. Floyd",
  title =        "Extending the Risk Analysis Model to Include
                 Market-Insurance",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "331--339",
  day =          "31",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801004114",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:ITCd,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "341--343",
  day =          "31",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801004126",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:PJb,
  author =       "Anonymous",
  title =        "Pages 276--343 ({31 July 2001})",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "4",
  pages =        "??--??",
  day =          "31",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:Ed,
  author =       "Bill Hancock",
  title =        "From The {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "346--347",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801005016",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:SVc,
  author =       "Bill Hancock",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "348--363",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801005028",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2001:CPR,
  author =       "Stephen Hinde",
  title =        "Cyberthreats: Perceptions, Reality and Protection",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "364--371",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480100503X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bequai:2001:PDE,
  author =       "August Bequai",
  title =        "Proprietary Data: Eldorado in Cyber-Space",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "372--373",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801005041",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Barber:2001:SMW,
  author =       "Richard Barber",
  title =        "Security in a Mobile World --- is {Bluetooth} the
                 Answer?",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "374--379",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801005053",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pounder:2001:CEC,
  author =       "Chris Pounder",
  title =        "The Council of {Europe} Cyber-Crime Convention",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "380--383",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801005065",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Trompeter:2001:FIS,
  author =       "C. M. Trompeter and J. H. P. Eloff",
  title =        "A Framework for the Implementation of Socio-ethical
                 Controls in Information Security",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "384--391",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801005077",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cusick:2001:CLP,
  author =       "Thomas W. Cusick",
  title =        "Computer Licence Plates",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "392--394",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801005089",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Evans:2001:CRG,
  author =       "Paul Evans",
  title =        "Conference Report --- the Global Forum for Law
                 Enforcement and National Security, {Edinburgh}, 2001",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "395--399",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801005090",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palmer:2001:ARAe,
  author =       "Chlo{\"e} Palmer",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "400--403",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801005107",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:Ce,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "405--406",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801005119",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:IBRd,
  author =       "Anonymous",
  title =        "International Board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "407--408",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801005120",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Allinson:2001:ISA,
  author =       "Caroline Allinson",
  title =        "Information Systems Audit Trails in Legal Proceedings
                 as Evidence",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "409--421",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801005132",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Khill:2001:MPF,
  author =       "Insoo Khill and Jiseon Kim and Ingoo Han and Jaecheol
                 Ryou",
  title =        "Multi-party Fair Exchange Protocol Using Ring
                 Architecture Model",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "422--439",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801005144",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:ITCe,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "441--443",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801005156",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:GAd,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "446--446",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801005168",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:PJc,
  author =       "Anonymous",
  title =        "Pages 346--446 ({1 July 2001})",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "5",
  pages =        "??--??",
  day =          "1",
  month =        jul,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:Ee,
  author =       "Bill Hancock",
  title =        "From The {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "448--450",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801006010",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:UDP,
  author =       "Anonymous",
  title =        "{U.S. DoD} Puts Up Blocks to {Code Red}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "451--467",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801006022",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2001:OTA,
  author =       "Stephen Hinde",
  title =        "Omnia te adversum spectantia, nulla retorsum",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "468--474",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801006034",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
  keywords =     "Omnia te adversum spectantia, nulla retorsum (Latin)
                 == All toward you, nothing back (English)",
}

@Article{Bequai:2001:OCG,
  author =       "August Bequai",
  title =        "Organized Crime Goes Cyber",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "475--478",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801006046",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Purser:2001:SGT,
  author =       "Steve Purser",
  title =        "A Simple Graphical Tool For Modelling Trust",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "479--484",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801006058",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Philippsohn:2001:MLI,
  author =       "Steven Philippsohn",
  title =        "Money Laundering on the {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "485--490",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480100606X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schneier:2001:MSM,
  author =       "Bruce Schneier",
  title =        "Managed Security Monitoring:Network Security for the
                 21st Century",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "491--503",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801006071",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:2001:ISM,
  author =       "Basie von Solms",
  title =        "Information Security --- a Multidimensional
                 Discipline",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "504--508",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801006083",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palmer:2001:ARAf,
  author =       "Chlo{\"e} Palmer",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "509--509",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801006095",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:Cf,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "510--511",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801006101",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:CEa,
  author =       "Anonymous",
  title =        "{COMPSEC 2001 Exhibitors 2001}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "512--522",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801006113",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:IBRe,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "523--524",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801006125",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Botha:2001:ACD,
  author =       "Reinhardt A. Botha and Jan H. P. Eloff",
  title =        "Access Control in Document-centric Workflow Systems
                 --- an Agent-based Approach",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "525--532",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801006137",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yeh:2001:HDI,
  author =       "Wen-Hung Yeh and Jing-Jang Hwang",
  title =        "Hiding Digital Information Using a Novel System
                 Scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "533--538",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801006149",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:ITCf,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "539--541",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801006150",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:GAe,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "542--542",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801006162",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:PS,
  author =       "Anonymous",
  title =        "Pages 448--542 ({1 September 2001})",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "6",
  pages =        "??--??",
  day =          "1",
  month =        sep,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:Ef,
  author =       "Bill Hancock",
  title =        "From The {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "7",
  pages =        "544--545",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801007015",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:SVd,
  author =       "Bill Hancock",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "7",
  pages =        "546--560",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801007027",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2001:LL,
  author =       "Stephen Hinde",
  title =        "Lessons Learned",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "7",
  pages =        "561--567",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801007039",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2001:IPD,
  author =       "Stephen Hinde",
  title =        "Incalculable potential for damage by cyber-terrorism",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "7",
  pages =        "568--572",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801007040",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pounder:2001:EUP,
  author =       "Chris Pounder",
  title =        "The {European} Union Proposal for a Policy Towards
                 Network and Information Security",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "7",
  pages =        "573--576",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801007052",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gerber:2001:RAS,
  author =       "Mariana Gerber and Rossouw von Solms",
  title =        "From Risk Analysis to Security Requirements",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "7",
  pages =        "577--584",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801007064",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ecclestone:2001:ARAa,
  author =       "Rachel Ecclestone",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "7",
  pages =        "585--588",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801007076",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:Cg,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "7",
  pages =        "589--589",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801007088",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:IBRf,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "7",
  pages =        "590--591",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480100709X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chadwick:2001:ETP,
  author =       "David W. Chadwick and Andrew Basden",
  title =        "Evaluating Trust in a Public Key Certification
                 Authority",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "7",
  pages =        "592--611",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801007106",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lin:2001:HKA,
  author =       "Chu-Hsing Lin",
  title =        "Hierarchical key assignment without public-key
                 cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "7",
  pages =        "612--619",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801007118",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2001:USA,
  author =       "E. Eugene Schultz and Robert W. Proctor and Mei-Ching
                 Lien and Gavriel Salvendy",
  title =        "Usability and Security An Appraisal of Usability
                 Issues in Information Security Methods",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "7",
  pages =        "620--634",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480100712X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:ITCg,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "7",
  pages =        "635--637",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801007131",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:GAf,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "7",
  pages =        "638--638",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801007143",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:PO,
  author =       "Anonymous",
  title =        "Pages 544--638 ({31 October 2001})",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "7",
  pages =        "??--??",
  day =          "31",
  month =        oct,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:Eg,
  author =       "Bill Hancock",
  title =        "From The {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "8",
  pages =        "640--642",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480100801X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2001:SVe,
  author =       "Bill Hancock",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "8",
  pages =        "643--656",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801008021",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2001:IYC,
  author =       "Stephen Hinde",
  title =        "If you can meet with triumph and disaster and treat
                 those two impostors just the same \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "8",
  pages =        "657--666",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801008033",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:2001:WDR,
  author =       "Charles Cresson Wood",
  title =        "What Do The Recent Terrorist Attacks Mean For The
                 {American} Information Security Profession?",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "8",
  pages =        "667--670",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801008045",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zenkin:2001:GPC,
  author =       "Denis Zenkin",
  title =        "Guidelines for the Protecting the Corporate against
                 Viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "8",
  pages =        "671--675",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801008057",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Biermann:2001:CID,
  author =       "E. Biermann and E. Cloete and L. M. Venter",
  title =        "A comparison of Intrusion Detection systems",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "8",
  pages =        "676--683",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801008069",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ecclestone:2001:ARAb,
  author =       "Rachel Ecclestone",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "8",
  pages =        "684--687",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801008070",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ecclestone:2001:BRa,
  author =       "Rachel Ecclestone",
  title =        "Book Reviews",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "8",
  pages =        "688--688",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801008082",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ecclestone:2001:BRb,
  author =       "Rachel Ecclestone",
  title =        "Book Reviews",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "8",
  pages =        "688--688",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801008094",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:Ch,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "8",
  pages =        "689--690",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801008100",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:IBRg,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "8",
  pages =        "691--692",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801008112",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Aron:2001:BNP,
  author =       "Joan L. Aron and Ronald A. Gove and Shiva Azadegan and
                 M. Christina Schneider",
  title =        "The Benefits of a Notification Process in Addressing
                 the Worsening Computer Virus Problem: Results of a
                 Survey and a Simulation Model",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "8",
  pages =        "693--714",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801008124",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dhillon:2001:CCT,
  author =       "Gurpreet Dhillon and Steve Moores",
  title =        "Computer crimes: theorizing about the enemy within",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "8",
  pages =        "715--723",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801008136",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Torrubia:2001:CRC,
  author =       "Andres Torrubia and Francisco J. Mora and Luis Marti",
  title =        "Cryptography Regulations for E-commerce and Digital
                 Rights Management",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "8",
  pages =        "724--738",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801008148",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:ITCh,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "8",
  pages =        "739--741",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480100815X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:GAg,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "8",
  pages =        "742--742",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404801008161",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:PD,
  author =       "Anonymous",
  title =        "Pages 640--742 ({1 December 2001})",
  journal =      j-COMPUT-SECUR,
  volume =       "20",
  number =       "8",
  pages =        "??--??",
  day =          "1",
  month =        dec,
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2001:EC,
  author =       "E. Eugene Schultz",
  title =        "From the editor-in-chief",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "2--4",
  month =        "First Quarter",
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802001013",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2001:SV,
  author =       "Eugene Schultz",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "5--15",
  month =        "First Quarter",
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802001025",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2001:POR,
  author =       "Stephen Hinde",
  title =        "2001: a Privacy Odyssey Revisited",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "16--34",
  month =        "First Quarter",
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802001037",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:2001:WIP,
  author =       "Gerald L. Kovacich and Andy Jones",
  title =        "What {InfoSec} professionals should know about
                 information warfare tactics by terrorists",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "35--41",
  month =        "First Quarter",
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802001049",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ecclestone:2001:B,
  author =       "Rachel Ecclestone",
  title =        "In brief",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "42--44",
  month =        "First Quarter",
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802001141",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ecclestone:2001:ARAc,
  author =       "Rachel Ecclestone",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "42--45",
  month =        "First Quarter",
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802001050",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:CFC,
  author =       "Anonymous",
  title =        "Calendar of forthcoming conferences and events",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "46--46",
  month =        "First Quarter",
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802001062",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ecclestone:2001:AR,
  author =       "Rachel Ecclestone",
  title =        "{ACSAC} 2001 review",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "47--60",
  month =        "First Quarter",
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802001074",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:GAh,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "61--61",
  month =        "First Quarter",
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480200113X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:IBRh,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "61--61",
  month =        "First Quarter",
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802001086",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Magklaras:2001:ITP,
  author =       "G. B. Magklaras and S. M. Furnell",
  title =        "Insider Threat Prediction Tool: Evaluating the
                 probability of {IT} misuse",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "62--73",
  month =        "First Quarter",
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802001098",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chan:2001:CTB,
  author =       "Chi-Kwong Chan and L. M. Cheng",
  title =        "Cryptanalysis of a Timestamp-Based Password
                 Authentication Scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "74--76",
  month =        "First Quarter",
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802001104",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Viswanathan:2001:HKE,
  author =       "Kapali Viswanathan and Colin Boyd and Ed Dawson",
  title =        "Hybrid Key Escrow: a New Paradigm",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "77--92",
  month =        "First Quarter",
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802001116",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:ITCi,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "93--95",
  month =        "First Quarter",
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802001128",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2001:PQ,
  author =       "Anonymous",
  title =        "Pages 2--95 ({1st Quarter 2001})",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "1",
  pages =        "??--??",
  month =        "First Quarter",
  year =         "2001",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2002:ECa,
  author =       "E. Eugene Schultz",
  title =        "From the {Editor}-in-chief",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "98--100",
  day =          "31",
  month =        mar,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802002018",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2002:SVa,
  author =       "Eugene Schultz",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "101--112",
  day =          "31",
  month =        mar,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480200202X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:2002:WIP,
  author =       "Gerald L. Kovacich and Andy Jones",
  title =        "What {InfoSec} Professionals Should Know About
                 Information Warfare Tactics by Terrorists",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "113--119",
  day =          "31",
  month =        mar,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802002031",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Blakley:2002:SI,
  author =       "Bob Blakley",
  title =        "Security Insights",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "120--125",
  day =          "31",
  month =        mar,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802002043",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hilley:2002:B,
  author =       "Sarah Hilley",
  title =        "In brief",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "126--130",
  day =          "31",
  month =        mar,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802002146",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:ARA,
  author =       "Anonymous",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "126--131",
  day =          "31",
  month =        mar,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802002055",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:Ea,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "132--132",
  day =          "31",
  month =        mar,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802002067",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:AIV,
  author =       "Anonymous",
  title =        "Author Index for Volume 20",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "133--133",
  day =          "31",
  month =        mar,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802002079",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:SIV,
  author =       "Anonymous",
  title =        "Subject Index for Volume 20",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "134--140",
  day =          "31",
  month =        mar,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802002080",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:GAa,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "141--141",
  day =          "31",
  month =        mar,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480200216X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:RPa,
  author =       "Anonymous",
  title =        "Refereed Papers",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "141--141",
  day =          "31",
  month =        mar,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802002092",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Aron:2002:BNP,
  author =       "Joan L. Aron and Michael O'Leary and Ronald A. Gove
                 and Shiva Azadegan and M. Cristina Schneider",
  title =        "The Benefits of a Notification Process in Addressing
                 the Worsening Computer Virus Problem: Results of a
                 Survey and a Simulation Model",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "142--163",
  day =          "31",
  month =        mar,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802002109",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:Eb,
  author =       "Anonymous",
  title =        "Erratum",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "143--143",
  day =          "31",
  month =        mar,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802002158",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shen:2002:NKM,
  author =       "Victor R. L. Shen and Tzer-Shyong Chen",
  title =        "A Novel Key Management Scheme Based on Discrete
                 Logarithms and Polynomial Interpolations",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "164--171",
  day =          "31",
  month =        mar,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802002110",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Janczewski:2002:DIS,
  author =       "Lech Janczewski and Frank Xinli Shi",
  title =        "Development of Information Security Baselines for
                 Healthcare Information Systems in New {Zealand}",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "172--192",
  day =          "31",
  month =        mar,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802002122",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:ITCa,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "193--195",
  day =          "31",
  month =        mar,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802002134",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:PM,
  author =       "Anonymous",
  title =        "Pages 98--195 ({31 March 2002})",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "??--??",
  day =          "31",
  month =        mar,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2002:ECb,
  author =       "E. Eugene Schultz",
  title =        "From the editor-in-chief",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "198--200",
  day =          "1",
  month =        jun,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802003012",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2002:SVb,
  author =       "Eugene Schultz",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "201--211",
  day =          "1",
  month =        jun,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802003024",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2002:IWD,
  author =       "Stephen Hinde",
  title =        "It Was {D{\'e}j{\`a}} vu all Over Again",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "212--219",
  day =          "1",
  month =        jun,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802003036",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Clarke:2002:ASA,
  author =       "N. L. Clarke and S. M. Furnell and P. M. Rodwell and
                 P. L. Reynolds",
  title =        "Acceptance of Subscriber Authentication Methods For
                 Mobile Telephony Devices",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "220--228",
  day =          "1",
  month =        jun,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802003048",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McGraw:2002:BWW,
  author =       "Gary McGraw",
  title =        "On Bricks and Walls: Why Building Secure Software is
                 Hard",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "229--238",
  day =          "1",
  month =        jun,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480200305X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pounder:2002:ATL,
  author =       "Chris Pounder",
  title =        "Anti-Terrorism Legislation: the Impact on The
                 Processing of Data",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "240--245",
  day =          "1",
  month =        jun,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802003073",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Curtis-Raleigh:2002:B,
  author =       "Mark Curtis-Raleigh",
  title =        "In brief",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "246--250",
  day =          "1",
  month =        jun,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802003085",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:2002:ARA,
  author =       "Helen Meyer",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "246--250",
  day =          "1",
  month =        jun,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802003097",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:Ec,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "251--251",
  day =          "1",
  month =        jun,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802003103",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:GAb,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "252--252",
  day =          "1",
  month =        jun,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802003115",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:IBRa,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "252--252",
  day =          "1",
  month =        jun,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802003061",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Claessens:2002:STO,
  author =       "Joris Claessens and Valentin Dem and Danny {De Cock}
                 and Bart Preneel and Joos Vandewalle",
  title =        "On the Security of {Today}'s Online Electronic Banking
                 Systems",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "253--265",
  day =          "1",
  month =        jun,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802003127",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Smith:2002:PAI,
  author =       "E. Smith and J. H. P. Eloff",
  title =        "A Prototype for Assessing Information Technology Risks
                 in Health Care",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "266--284",
  day =          "1",
  month =        jun,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802003139",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:ITCb,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "285--287",
  day =          "1",
  month =        jun,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802003140",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:PJ,
  author =       "Anonymous",
  title =        "Pages 198--287 ({1 June 2002})",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "??--??",
  day =          "1",
  month =        jun,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2002:SSL,
  author =       "E. Eugene Schultz",
  title =        "The Sorry State of Law Enforcement",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "290--292",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802004017",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2002:SVc,
  author =       "Eugene Schultz",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "293--302",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802004029",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Purser:2002:WAC,
  author =       "Steve Purser",
  title =        "Why access control is difficult",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "303--309",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802004030",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2002:SSS,
  author =       "Stephen Hinde",
  title =        "Security surveys spring crop",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "310--321",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802004042",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nikishin:2002:KHW,
  author =       "Andy Nikishin",
  title =        "The Klez.H worm dissected",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "322--327",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802004054",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pounder:2002:ECO,
  author =       "Chris Pounder",
  title =        "The emergence of a comprehensive obligation towards
                 computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "328--332",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802004066",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bequai:2002:SCI,
  author =       "August Bequai",
  title =        "Syndicated crime and international terrorism: the
                 lessons of `9-11'",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "333--337",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802004078",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:Ba,
  author =       "Anonymous",
  title =        "In Brief",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "338--341",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802004091",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McKenna:2002:DRIa,
  author =       "Brian McKenna and Sarah Hilley",
  title =        "Digest of recent {IT} security press coverage",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "338--342",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480200408X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:CFC,
  author =       "Anonymous",
  title =        "Calendar of forthcoming conferences and events",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "343--343",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802004108",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:GAc,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "344--344",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480200411X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:IBRb,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "344--344",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802004121",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lee:2002:ISL,
  author =       "Younghwa Lee and Jintae Lee and Zoonky Lee",
  title =        "Integrating Software Lifecycle Process Standards with
                 Security Engineering",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "345--355",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802004133",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ward:2002:DAC,
  author =       "Peter Ward and Clifton L. Smith",
  title =        "The Development of Access Control Policies for
                 Information Technology Systems",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "356--371",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802004145",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chien:2002:EPS,
  author =       "Hung-Yu Chien and Jinn-Ke Jan and Yuh-Min Tseng",
  title =        "An Efficient and Practical Solution to Remote
                 Authentication: Smart Card",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "372--375",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802004157",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:ITCc,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "377--379",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802004169",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:PA,
  author =       "Anonymous",
  title =        "Pages 290--379 ({1 August 2002})",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "4",
  pages =        "??--??",
  day =          "1",
  month =        aug,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2002:TSH,
  author =       "E. Eugene Schultz",
  title =        "Taking a stand on hackers",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "382--384",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802005011",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2002:SVd,
  author =       "Eugene Schultz",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "385--396",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802005023",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:2002:SCM,
  author =       "Bill Hancock",
  title =        "Security crisis management --- the basics",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "397--401",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802005035",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hone:2002:ISP,
  author =       "Karin H{\"o}ne and J. H. P. Eloff",
  title =        "Information security policy --- what do international
                 information security standards say?",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "402--409",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802005047",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nikishin:2002:MAA,
  author =       "Andy Nikishin",
  title =        "Much Ado About Nothing: Win32.Perrun",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "410--412",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802005059",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Caelli:2002:TLL,
  author =       "William J. Caelli",
  title =        "Trusted \ldots{} or \ldots{} trustworthy: the search
                 for a new paradigm for computer and network security",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "413--420",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802005060",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McKenna:2002:EFN,
  author =       "Brian McKenna",
  title =        "Enterprise in focus at {NetSec} 2002",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "421--423",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802005072",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2002:PP,
  author =       "Stephen Hinde",
  title =        "The perils of privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "424--432",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802005084",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McKenna:2002:B,
  author =       "Brian McKenna and Sarah Hilley",
  title =        "In brief",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "433--436",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802005102",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McKenna:2002:DRIb,
  author =       "Brian McKenna and Sarah Hilley",
  title =        "Digest of recent {IT} security press coverage",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "433--436",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802005096",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:Ed,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "437--437",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802005114",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:GAd,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "438--438",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802005126",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:IBRc,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "438--438",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802005138",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liao:2002:UNN,
  author =       "Yihua Liao and V. Rao Vemuri",
  title =        "Use of {$K$}-Nearest Neighbor classifier for intrusion
                 detection",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "439--448",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480200514X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lou:2002:SMS,
  author =       "Der-Chyuan Lou and Jiang-Lung Liu",
  title =        "Steganographic Method for Secure Communications",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "449--460",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802005151",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hansen:2002:OSA,
  author =       "Marit Hansen and Kristian K{\"o}hntopp and Andreas
                 Pfitzmann",
  title =        "The Open Source approach --- opportunities and
                 limitations with respect to security and privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "461--471",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/gnu.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802005163",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:ITCd,
  author =       "Anonymous",
  title =        "{IFIP} Technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "473--475",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802005175",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:POa,
  author =       "Anonymous",
  title =        "Pages 382--475 ({1 October 2002})",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "??--??",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:ECR,
  author =       "Anonymous",
  title =        "From the editor-in-chief: the {Revenger}'s Tragedy",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "478--480",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802010015",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2002:SVe,
  author =       "Eugene Schultz",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "481--490",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802010027",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2002:BSD,
  author =       "Stephen Hinde",
  title =        "The Blue Screen of Death and other deadly bugs",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "491--496",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802010039",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nikishin:2002:WLA,
  author =       "Andy Nikishin",
  title =        "{I-Worm.Lentin} (aka {Yaha})",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "497--502",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802010040",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pounder:2002:UNS,
  author =       "Chris Pounder",
  title =        "The {US}'s National Strategy for Homeland Security",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "503--505",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802010052",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{David:2002:PEW,
  author =       "Jon David",
  title =        "Policy enforcement in the workplace",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "506--513",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802010064",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bequai:2002:WCC,
  author =       "August Bequai",
  title =        "White collar crime: a handmaiden of international tech
                 terrorism",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "514--519",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802010076",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hilley:2002:PFS,
  author =       "Sarah Hilley",
  title =        "{Palladium}, fraud, and surviving terrorism ---
                 Compsec 2002: Preview of {Compsec 2002, 30 Oct--1 Nov,
                 Queen Elizabeth II Conference Centre, Westminster,
                 London, UK}",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "520--521",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802010088",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2002:FUP,
  author =       "E. Eugene Schultz",
  title =        "A framework for understanding and predicting insider
                 attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "526--531",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480201009X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:Bb,
  author =       "Anonymous",
  title =        "in brief",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "532--536",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802010118",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:DRIa,
  author =       "Anonymous",
  title =        "Digest of recent {IT} security press coverage",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "532--536",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802010106",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:Ee,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "537--537",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480201012X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:RPb,
  author =       "Anonymous",
  title =        "Refereed papers",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "538--538",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802010131",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzalis:2002:PRS,
  author =       "Dimitris A. Gritzalis",
  title =        "Principles and requirements for a secure e-voting
                 system",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "539--556",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802010143",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rezmierski:2002:USS,
  author =       "Virginia E. Rezmierski and Marshall R. Seese and
                 Nathaniel {St. Clair}",
  title =        "{University} systems security logging: who is doing it
                 and how far can they go?",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "557--564",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802010155",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chen:2002:HAC,
  author =       "Tzer-Shyong Chen and Yu-Fang Chung",
  title =        "Hierarchical access control based on {Chinese}
                 Remainder Theorem and symmetric algorithm",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "565--570",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802010167",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:ITCe,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "573--575",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802010179",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:POb,
  author =       "Anonymous",
  title =        "Pages 478--575 ({1 October 2002})",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "??--??",
  day =          "1",
  month =        oct,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2002:UGB,
  author =       "E. Eugene Schultz",
  title =        "The {US Government}- bigger and better information
                 security?",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "578--580",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480201101X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2002:SVf,
  author =       "Eugene Schultz",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "581--590",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802011021",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McKenna:2002:NP,
  author =       "Brian McKenna",
  title =        "Note from the Publishers",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "591--591",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802011033",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2002:SSC,
  author =       "Stephen Hinde",
  title =        "Spam, scams, chains, hoaxes and other junk mail",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "592--606",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802011045",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Armstrong:2002:B,
  author =       "Andrew Armstrong",
  title =        "Bugbear",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "607--608",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802011057",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bishop:2002:TAR,
  author =       "Matt Bishop",
  title =        "Trends in academic research: vulnerabilities analysis
                 and intrusion detection",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "609--612",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802011069",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McKenna:2002:MSS,
  author =       "Brian McKenna",
  title =        "Managed Security Services --- new economy relic or
                 wave of the future?",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "613--616",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802011070",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Venter:2002:VCI,
  author =       "H. S. Venter and J. H. P. Eloff",
  title =        "Vulnerabilities categories for intrusion detection
                 systems",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "617--619",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802011082",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pounder:2002:SPU,
  author =       "Chris Pounder",
  title =        "Security policy update",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "620--623",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802011094",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jayeju-akinsiku:2002:TEC,
  author =       "Babatunde Jayeju-akinsiku",
  title =        "{Technology and Electronic Communications Act 2000}",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "624--628",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802011100",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:Bc,
  author =       "Anonymous",
  title =        "In brief",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "629--633",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802011124",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:DRIb,
  author =       "Anonymous",
  title =        "Digest of recent {IT} security press coverage",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "629--633",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802011112",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:Ef,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "634--634",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802011136",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:GAe,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "635--635",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480201115X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:IBRd,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "635--635",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802011148",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gordon:2002:C,
  author =       "Sarah Gordon and Richard Ford",
  title =        "Cyberterrorism?",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "636--647",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802011161",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kenny:2002:ADR,
  author =       "Steve Kenny and Larry Korba",
  title =        "Applying digital rights management systems to privacy
                 rights management",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "648--664",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802011173",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fan:2002:ETB,
  author =       "Lei Fan and Jian-Hua Li and Hong-Wen Zhu",
  title =        "An enhancement of timestamp-based password
                 authentication scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "665--667",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802011185",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:ITCf,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "669--671",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802011197",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:PNa,
  author =       "Anonymous",
  title =        "Pages 578--671 ({November 2002})",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "7",
  pages =        "??--??",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2002:GBC,
  author =       "E. Eugene Schultz",
  title =        "The gap between cryptography and information
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "674--676",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802008015",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2002:SVg,
  author =       "Eugene Schultz",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "677--688",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802008027",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2002:CCS,
  author =       "Stephen Hinde",
  title =        "Compsec 2002: the complete security circle",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "689--693",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802008039",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Armstrong:2002:K,
  author =       "Andrew Armstrong",
  title =        "{KLEZ $H$}",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "694--695",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802008040",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{David:2002:GS,
  author =       "Jon David",
  title =        "Giga Security",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "696--700",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802008052",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{DeMaio:2002:GTC,
  author =       "Harry DeMaio",
  title =        "Global Trust, Certification and {(ISC)}",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "701--704",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802008064",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hunker:2002:PCB,
  author =       "Jeffrey Hunker",
  title =        "Policy challenges in building dependability in global
                 infrastructures",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "705--711",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802008076",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:BCB,
  author =       "Anonymous",
  title =        "In brief: Compiled by {Bill McKenna}",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "712--716",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480200809X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:DRIc,
  author =       "Anonymous",
  title =        "Digest of recent {IT} security press coverage:
                 Compiled by {Bill McKenna}",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "712--716",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802008088",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:Eg,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "717--717",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802008106",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:GAf,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "718--718",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802008118",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:IBRe,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "718--718",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480200812X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bergadano:2002:IAM,
  author =       "F. Bergadano and D. Cavagnino and B. Crispo",
  title =        "Individual Authentication in Multiparty
                 Communications",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "719--735",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802008131",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Holeman:2002:DSM,
  author =       "S. Holeman and G. Manimaran and J. Davis and A.
                 Chakrabarti",
  title =        "Differentially secure multicasting and its
                 implementation methods",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "736--749",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802008143",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhong:2002:PKM,
  author =       "Sheng Zhong",
  title =        "A practical key management scheme for access control
                 in a user hierarchy",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "750--759",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802008155",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:ITCg,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "761--763",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404802008167",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2002:PNb,
  author =       "Anonymous",
  title =        "Pages 674--763 ({November 2002})",
  journal =      j-COMPUT-SECUR,
  volume =       "21",
  number =       "8",
  pages =        "??--??",
  month =        nov,
  year =         "2002",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:EC,
  author =       "Anonymous",
  title =        "From the editor-in-chief",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "2--3",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803001019",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2003:SVa,
  author =       "Eugene Schultz",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "4--13",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803001020",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2003:TCM,
  author =       "Stephen Hinde",
  title =        "Time cost\$ money",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "14--21",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803001032",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Piper:2003:RCS,
  author =       "Fred Piper",
  title =        "Reseacrh in cryptography and security mechanisms",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "22--25",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803001044",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolfe:2003:CF,
  author =       "Dr. Henry B. Wolfe",
  title =        "Computer forensics",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "26--28",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803001056",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{David:2003:SF,
  author =       "Jon David",
  title =        "Security in a Flash",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "29--33",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803001068",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pounder:2003:TWL,
  author =       "Dr Chris Pounder",
  title =        "A tangled {Web} of libel lies?",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "34--37",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480300107X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McKenna:2003:UPP,
  author =       "Brian McKenna",
  title =        "{UK} police promise charter to guard good names",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "38--40",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803001081",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fisher:2003:LV,
  author =       "Mark Fisher",
  title =        "{LIRVA} virus",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "41--42",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803001093",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:Ea,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "43--43",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480300110X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:GAa,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "44--44",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803001111",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:IBRa,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "44--44",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803001160",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cho:2003:EAD,
  author =       "Sung-Bae Cho and Hyuk-Jang Park",
  title =        "Efficient anomaly detection by modeling privilege
                 flows using hidden {Markov} model",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "45--55",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803001123",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bruschi:2003:QSP,
  author =       "D. Bruschi and A. Curti and E. Rosti",
  title =        "A quantitative study of Public Key Infrastructures",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "56--67",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803001135",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lin:2003:PAS,
  author =       "Chun-Li Lin and Tzonelih Hwang",
  title =        "A password authentication scheme with secure password
                 updating",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "68--72",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803001147",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:ITCa,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "73--75",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803001159",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:PJa,
  author =       "Anonymous",
  title =        "Pages 2--75 ({January 2003})",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "??--??",
  month =        jan,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2003:ISW,
  author =       "E. Eugene Schultz",
  title =        "{Internet} security: what's in the future?",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "78--79",
  month =        feb,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803002013",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2003:SVb,
  author =       "Eugene Schultz",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "80--89",
  month =        feb,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803002025",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2003:LCR,
  author =       "Stephen Hinde",
  title =        "The law, cybercrime, risk assessment and cyber
                 protection",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "90--95",
  month =        feb,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803002037",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolfe:2003:CS,
  author =       "Henry B. Wolfe",
  title =        "The circumstances of seizure",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "96--98",
  month =        feb,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803002049",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Doughty:2003:IES,
  author =       "Ken Doughty",
  title =        "Implementing enterprise security: a case study",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "99--114",
  month =        feb,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803002050",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pounder:2003:SUS,
  author =       "Chris Pounder",
  title =        "Security with unfortunate side effects",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "115--118",
  month =        feb,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803002062",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Matai:2003:EIW,
  author =       "D. K. Matai",
  title =        "The economic impact of war with {Iraq} --- asymmetric
                 risks",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "119--123",
  month =        feb,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803002074",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bequai:2003:SIM,
  author =       "August Bequai",
  title =        "Safeguards for {IT} managers and staff under the
                 {Sarbanes--Oxley} Act",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "124--127",
  month =        feb,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803002086",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:Eb,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "128--128",
  month =        feb,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803002098",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:CSVa,
  author =       "Anonymous",
  title =        "Computers and Security Volume 21 --- Author Index",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "129--129",
  month =        feb,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803002104",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:CSVb,
  author =       "Anonymous",
  title =        "Computers and Security Volume 21 --- Subject Index",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "130--134",
  month =        feb,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803002165",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:GAb,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "135--135",
  month =        feb,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803002116",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:IBRb,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "135--135",
  month =        feb,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803002177",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Aljifri:2003:ITU,
  author =       "Hassan Aljifri and Marcel Smets and Alexander Pons",
  title =        "{IP} Traceback using header compression",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "136--151",
  month =        feb,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803002128",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Johansson:2003:DCV,
  author =       "Jesper M. Johansson and E. Eugene Schultz",
  title =        "Dealing with contextual vulnerabilities in code:
                 distinguishing between solutions and pseudosolutions",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "152--159",
  month =        feb,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480300213X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chang:2003:FDA,
  author =       "Chin-Chen Chang and Yeu-Pong Lai",
  title =        "A flexible date-attachment scheme on e-cash",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "160--166",
  month =        feb,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803002141",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:ITCb,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "167--169",
  month =        feb,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803002153",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:PF,
  author =       "Anonymous",
  title =        "Pages 78--169 ({February 2003})",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "2",
  pages =        "??--??",
  month =        feb,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:ECV,
  author =       "Anonymous",
  title =        "From the editor-in-chief: Virus and worm trends",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "174--175",
  month =        apr,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803003018",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2003:SVc,
  author =       "Eugene Schultz",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "176--187",
  month =        apr,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480300302X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2003:CTC,
  author =       "Stephen Hinde",
  title =        "Cyber-terrorism in context",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "188--192",
  month =        apr,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803003031",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolfe:2003:EAa,
  author =       "Hank Wolfe",
  title =        "Evidence acquisition",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "193--195",
  month =        apr,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803003043",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Aljifri:2003:ILA,
  author =       "Hassan Aljifri and Diego S{\'a}nchez Navarro",
  title =        "International legal aspects of cryptography:
                 Understanding cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "196--203",
  month =        apr,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803003055",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Moulton:2003:CEI,
  author =       "Rolf Moulton and Robert S. Coles",
  title =        "A contest to evaluate {IT} security services
                 management",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "204--206",
  month =        apr,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803003067",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pounder:2003:GAI,
  author =       "Dr Chris Pounder",
  title =        "Governments act to improve security",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "207--211",
  month =        apr,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803003079",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:Ed,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "212--212",
  month =        apr,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803003080",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:GAc,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "213--213",
  month =        apr,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803003158",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:IBRc,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "213--213",
  month =        apr,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803003092",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kamara:2003:AVI,
  author =       "Seny Kamara and Sonia Fahmy and Eugene Schultz and
                 Florian Kerschbaum and Michael Frantzen",
  title =        "Analysis of vulnerabilities in {Internet} firewalls",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "214--232",
  month =        apr,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803003109",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vanderHaar:2003:MDI,
  author =       "Helen van der Haar and Rossouw von Solms",
  title =        "A model for deriving information security control
                 attribute profiles",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "233--244",
  month =        apr,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803003110",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2003:GPS,
  author =       "Li-Hua Li and Shiang-Feng Tzeng and Min-Shiang Hwang",
  title =        "Generalization of proxy signature-based on discrete
                 logarithms",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "245--255",
  month =        apr,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803003122",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Brooke:2003:FTS,
  author =       "Phillip J. Brooke and Richard F. Paige",
  title =        "Fault trees for security system design and analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "256--264",
  month =        apr,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803003134",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:ITCc,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "265--267",
  month =        apr,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803003146",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:PA,
  author =       "Anonymous",
  title =        "Pages 174--267 ({April 2003})",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "??--??",
  month =        apr,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2003:WCM,
  author =       "E. Eugene Schultz",
  title =        "Why can't {Microsoft} stay out of the {InfoSec}
                 headlines?",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "270--272",
  month =        may,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803004012",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2003:AHW,
  author =       "Eugene Schultz",
  title =        "Attackers hit {Web} hosting servers",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "273--283",
  month =        may,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803004024",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2003:CAP,
  author =       "Stephen Hinde",
  title =        "Careless about privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "284--288",
  month =        may,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803004036",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolfe:2003:EAb,
  author =       "Hank Wolfe",
  title =        "Evidence analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "289--291",
  month =        may,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803004048",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rogers:2003:RCP,
  author =       "Marc Rogers",
  title =        "The role of criminal profiling in the computer
                 forensics process",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "292--298",
  month =        may,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480300405X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Venter:2003:TIS,
  author =       "H. S. Venter and J. H. P. Eloff",
  title =        "A taxonomy for information security technologies",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "299--307",
  month =        may,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803004061",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anderson:2003:WWN,
  author =       "James M. Anderson",
  title =        "Why we need a new definition of information security",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "308--313",
  month =        may,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803004073",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:Ee,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "314--314",
  month =        may,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803004085",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:GAd,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "315--315",
  month =        may,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803004103",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:IBRd,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "315--315",
  month =        may,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803004097",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Peyravian:2003:MPU,
  author =       "Mohammad Peyravian and Allen Roginsky and Nevenko
                 Zunic",
  title =        "Methods for preventing unauthorized software
                 distribution",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "316--321",
  month =        may,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803004115",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bhalla:2003:MCM,
  author =       "Neelam Bhalla",
  title =        "Is the mouse click mighty enough to bring society to
                 its knees?",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "322--336",
  month =        may,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803004127",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Treek:2003:IFI,
  author =       "Denis Tr{\`e}ek",
  title =        "An integral framework for information systems security
                 management",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "337--360",
  month =        may,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803004139",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:ITCd,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "361--363",
  month =        may,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803004140",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:PM,
  author =       "Anonymous",
  title =        "Pages 270--363 ({May 2003})",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "4",
  pages =        "??--??",
  month =        may,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2003:PBS,
  author =       "E. Eugene Schultz",
  title =        "{Pandora}'s {Box}: spyware, adware, autoexecution, and
                 {NGSCB}",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "366--367",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803005017",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2003:SVd,
  author =       "Eugene Schultz",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "368--377",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803005029",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2003:PLC,
  author =       "Stephen Hinde",
  title =        "Privacy legislation: a comparison of the {US} and
                 {European} approaches",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "378--387",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803005030",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolfe:2003:EE,
  author =       "Hank Wolfe",
  title =        "Encountering encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "388--391",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803005042",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Edelson:2003:SIW,
  author =       "Eve Edelson",
  title =        "The 419 scam: information warfare on the spam front
                 and a proposal for local filtering",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "392--401",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803005054",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:2003:LAT,
  author =       "Fred Cohen and Deanna Koike",
  title =        "Leading attackers through attack graphs with
                 deceptions",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "402--411",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803005066",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Vanstone:2003:NGS,
  author =       "S. A. Vanstone",
  title =        "Next generation security for wireless: elliptic curve
                 cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "412--415",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803005078",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Harding:2003:SVP,
  author =       "Andrew Harding",
  title =        "{SSL} Virtual Private Networks",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "416--420",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480300508X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:Ef,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "421--421",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803005091",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:IBRe,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "422--422",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803005108",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Botha:2003:UFL,
  author =       "Martin Botha and Rossouw von Solms",
  title =        "Utilising fuzzy logic and trend analysis for effective
                 intrusion detection",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "423--434",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480300511X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alvarez:2003:NTW,
  author =       "Gonzalo {\'A}lvarez and Slobodan Petrovi{\'c}",
  title =        "A new taxonomy of {Web} attacks suitable for efficient
                 encoding",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "435--449",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803005121",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhong:2003:CCC,
  author =       "Sheng Zhong and Tianwen Lin",
  title =        "A comment on the {Chen-Chung} scheme for hierarchical
                 access control",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "450--452",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803005133",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hsu:2003:CIT,
  author =       "Chien-Lung Hsu and Tzong-Sun Wu",
  title =        "Cryptanalyses and improvements of two cryptographic
                 key assignment schemes for dynamic access control in a
                 user hierarchy",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "453--456",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803005145",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:ITCe,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "457--459",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803005157",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:RPG,
  author =       "Anonymous",
  title =        "Refereed papers --- Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "459--459",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803005169",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:PJb,
  author =       "Anonymous",
  title =        "Pages 366--459 ({July 2003})",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "??--??",
  month =        jul,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:ECG,
  author =       "Anonymous",
  title =        "From the editor-in-chief: Gartner 's prediction
                 concerning intrusion detection systems: sense or
                 nonsense?",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "462--463",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803006011",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2003:SVO,
  author =       "Eugene Schultz",
  title =        "Security views: Online piracy battle heats up in
                 {US}",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "464--473",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803006023",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2003:SEN,
  author =       "Stephen Hinde",
  title =        "Spam: the evolution of a nuisance",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "474--478",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803006035",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:PER,
  author =       "Anonymous",
  title =        "Presenting the Evidence Report: Introduction",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "479--481",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803006047",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Leach:2003:SES,
  author =       "Dr John Leach",
  title =        "Security engineering and security {RoI}",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "482--486",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803006059",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Coles:2003:OIR,
  author =       "Robert S. Coles and Rolf Moulton",
  title =        "Operationalizing {IT} Risk Management",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "487--493",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803006060",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Blyth:2003:SAX,
  author =       "Dr. Andrew Blyth and Dr. Daniel Cunliffe and Dr. Iain
                 Sutherland",
  title =        "Security analysis of {XML} usage and {XML} parsing",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "494--505",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803006072",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kelly:2003:RCD,
  author =       "Christopher Kelly and Chris Nelms",
  title =        "Roadmap to checking data migration",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "506--510",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803006084",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bertino:2003:RMC,
  author =       "Elisa Bertino",
  title =        "{RBAC} models --- concepts and trends",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "511--514",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803006096",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McKenna:2003:WSS,
  author =       "Brian McKenna",
  title =        "{Web} services set to provoke new sthreats: Preview of
                 {Compsec 2003, 30 Oct-1 Nov, Queen Elizabeth II
                 Conference Centre, Westminster, London, UK}",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "515--516",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803006102",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:Eg,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "521--521",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803006114",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:RP,
  author =       "Anonymous",
  title =        "Refereed papers",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "522--522",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803006126",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chien:2003:NHA,
  author =       "Hung-Yu Chien and Jinn-Ke Jan",
  title =        "New hierarchical assignment without Public Key
                 cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "523--526",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803006138",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chen:2003:EPM,
  author =       "Tzer-Shyong Chen and Yu-Fang Chung and Gwo-Shiuan
                 Huang",
  title =        "Efficient proxy multisignature schemes based on the
                 elliptic curve cryptosystem",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "527--534",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480300614X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lam:2003:SME,
  author =       "Kwok-Yan Lam and Siu-Leung Chung and Ming Gu and
                 Jia-Guang Sun",
  title =        "Security middleware for enhancing interoperability of
                 Public Key Infrastructure",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "535--546",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803006151",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wu:2003:UFR,
  author =       "Shyi-Tsong Wu and Bin-Chang Chieu",
  title =        "A user friendly remote authentication scheme with
                 smart cards",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "547--550",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803006163",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:ITCf,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "551--553",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803006175",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:PS,
  author =       "Anonymous",
  title =        "Pages 462--553 ({September 2003})",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "??--??",
  month =        sep,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2003:PP,
  author =       "E. Eugene Schultz",
  title =        "Patching Pandemonium",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "556--558",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803007016",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:SV,
  author =       "Anonymous",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "559--569",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803007028",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2003:NDC,
  author =       "Stephen Hinde",
  title =        "Nimbyism, dominoes and creaking infrastructure",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "570--576",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480300703X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolfe:2003:FET,
  author =       "Hank Wolfe",
  title =        "Forensic evidence testimony --- some thoughts",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "577--579",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803007041",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Moulton:2003:AIS,
  author =       "Rolf Moulton and Robert S. Coles",
  title =        "Applying information security governance",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "580--584",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803007053",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sklavos:2003:DDR,
  author =       "N. Sklavos and O. Koufopavlou",
  title =        "Data dependent rotations, a trustworthy approach for
                 future encryption systems\slash ciphers: low cost and
                 high performance",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "585--588",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803007065",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:Eh,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "589--589",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803007077",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:IBRf,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "590--590",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803007089",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shen:2003:SET,
  author =       "Jau-Ji Shen and Chih-Wei Lin and Min-Shiang Hwang",
  title =        "Security enhancement for the timestamp-based password
                 authentication scheme using smart cards",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "591--595",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803007090",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Oh:2003:AID,
  author =       "Sang Hyun Oh and Won Suk Lee",
  title =        "An anomaly intrusion detection method by clustering
                 normal user behavior",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "596--612",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803007107",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Han:2003:DIR,
  author =       "Sang-Jun Han and Sung-Bae Cho",
  title =        "Detecting intrusion with rule-based integration of
                 multiple models",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "613--623",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803007119",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Thimbleby:2003:RE,
  author =       "Harold Thimbleby",
  title =        "The reduced {Enigma}",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "624--642",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803007120",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2003:CET,
  author =       "Bin Wang and Jian-Hua Li and Zhi-Peng Tong",
  title =        "Cryptanalysis of an enhanced timestamp-based password
                 authentication scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "643--645",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803007132",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:ITCg,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "647--649",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803007144",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:PO,
  author =       "Anonymous",
  title =        "Pages 555--650 ({October 2003})",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "7",
  pages =        "??--??",
  month =        oct,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2003:ISM,
  author =       "E. Eugene Schultz",
  title =        "Information security and the media",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "8",
  pages =        "652--653",
  month =        dec,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803000014",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2003:SVe,
  author =       "Eugene Schultz",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "8",
  pages =        "654--663",
  month =        dec,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803000026",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:2003:CSM,
  author =       "Stephen Hinde",
  title =        "Computer security: Mapping the future",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "8",
  pages =        "664--669",
  month =        dec,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803000038",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolfe:2003:SEE,
  author =       "Hank Wolfe",
  title =        "Setting up an electronic evidence forensics
                 laboratory",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "8",
  pages =        "670--672",
  month =        dec,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480300004X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Heiser:2003:BCB,
  author =       "Jay G. Heiser",
  title =        "Beyond cryptography: Bruce {Schneier}'s Beyond Fear:
                 thinking sensibly about security in an uncertain
                 world",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "8",
  pages =        "673--674",
  month =        dec,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803000051",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Johnston:2003:SHC,
  author =       "J. Johnston and J. H. P. Eloff and L. Labuschagne",
  title =        "Security and human computer interfaces",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "8",
  pages =        "675--684",
  month =        dec,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803000063",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Leach:2003:IUS,
  author =       "John Leach",
  title =        "Improving user security behaviour",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "8",
  pages =        "685--692",
  month =        dec,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803000075",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:CFC,
  author =       "Anonymous",
  title =        "Calendar of forthcoming conferences and events",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "8",
  pages =        "693--693",
  month =        dec,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803000087",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:IBRg,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "8",
  pages =        "694--694",
  month =        dec,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803000099",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guven:2003:UUK,
  author =       "Aykut Guven and Ibrahim Sogukpinar",
  title =        "Understanding users' keystroke patterns for computer
                 access security",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "8",
  pages =        "695--706",
  month =        dec,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803000105",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Reinke:2003:ASC,
  author =       "John Reinke and Hossein Saiedian",
  title =        "The availability of source code in relation to timely
                 response to security vulnerabilities",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "8",
  pages =        "707--724",
  month =        dec,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803000117",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chen:2003:AEY,
  author =       "Ke-Fei Chen and Sheng Zhong",
  title =        "Attacks on the (enhanced) {Yang--Shieh}
                 authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "8",
  pages =        "725--727",
  month =        dec,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See erratum \cite{McKenna:2004:EAE}.",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803000129",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chang:2003:EAA,
  author =       "Chin-Chen Chang and Ya-Fen Chang",
  title =        "Efficient anonymous auction protocols with
                 freewheeling bids",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "8",
  pages =        "728--734",
  month =        dec,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803000130",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:ITCh,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "8",
  pages =        "735--737",
  month =        dec,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404803000142",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2003:PD,
  author =       "Anonymous",
  title =        "Pages 652--737 ({December 2003})",
  journal =      j-COMPUT-SECUR,
  volume =       "22",
  number =       "8",
  pages =        "??--??",
  month =        dec,
  year =         "2003",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2004:STA,
  author =       "Eugene Schultz",
  title =        "Security training and awareness-fitting a square peg
                 in a round hole",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "1--2",
  month =        feb,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000094",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:SVa,
  author =       "Anonymous",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "3--11",
  month =        feb,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000112",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rogers:2004:FCF,
  author =       "Marcus K. Rogers and Kate Seigfried",
  title =        "The future of computer forensics: a needs analysis
                 survey",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "12--16",
  month =        feb,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000100",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{King:2004:AAS,
  author =       "Stuart King",
  title =        "Applying application security standards --- a case
                 study",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "17--21",
  month =        feb,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000124",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Leach:2004:TEA,
  author =       "John Leach",
  title =        "{TBSE} --- an engineering approach to the design of
                 accurate and reliable security systems",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "22--28",
  month =        feb,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000690",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:ECa,
  author =       "Anonymous",
  title =        "Events calender",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "29--29",
  month =        feb,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000513",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{DeMara:2004:MNT,
  author =       "Ronald F. DeMara and Adam J. Rocke",
  title =        "Mitigation of network tampering using dynamic dispatch
                 of mobile agents",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "31--42",
  month =        feb,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000689",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Moitra:2004:EIN,
  author =       "Soumyo D. Moitra and Suresh L. Konda",
  title =        "An empirical investigation of network attacks on
                 computer systems",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "43--51",
  month =        feb,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000677",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Serafim:2004:RRF,
  author =       "Vin{\'\i}cius da Silveira Serafim and Raul Fernando
                 Weber",
  title =        "Restraining and repairing file system damage through
                 file integrity control",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "52--62",
  month =        feb,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000665",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zuccato:2004:HSR,
  author =       "Albin Zuccato",
  title =        "Holistic security requirement engineering for
                 electronic commerce",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "63--76",
  month =        feb,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000653",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Szczepanski:2004:BRN,
  author =       "J. Szczepanski and E. Wajnryb and J. M. Amig{\'o} and
                 Maria V. Sanchez-Vives and M. Slater",
  title =        "Biometric random number generators",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "77--84",
  month =        feb,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000641",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McKenna:2004:EAE,
  author =       "Brian McKenna",
  title =        "Erratum to {``Attacks on the (enhanced) Yang--Shieh
                 authentication'' [Comput Secur {\bf 22}(8) (2003)
                 725--727]}",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "85--85",
  month =        feb,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  note =         "See \cite{Chen:2003:AEY}.",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000082",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:PF,
  author =       "Anonymous",
  title =        "Pages 1--86 ({February 2004})",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "1",
  pages =        "??--??",
  month =        feb,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2004:IRT,
  author =       "Dr Eugene Schultz",
  title =        "Incident response teams need to change",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "87--88",
  month =        mar,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480400029X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:SVb,
  author =       "Anonymous",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "89--96",
  month =        mar,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000306",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Peyravian:2004:NPM,
  author =       "Mohammad Peyravian and Allen Roginsky and Nevenko
                 Zunic",
  title =        "{Non-PKI} methods for public key distribution",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "97--103",
  month =        mar,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000318",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:ECb,
  author =       "Anonymous",
  title =        "Events calender",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "105--105",
  month =        mar,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000781",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liaw:2004:SEV,
  author =       "Horng-Twu Liaw",
  title =        "A secure electronic voting protocol for general
                 elections",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "107--119",
  month =        mar,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000276",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wu:2004:EUI,
  author =       "Tzong-Sun Wu and Chien-Lung Hsu",
  title =        "Efficient user identification scheme with key
                 distribution preserving anonymity for distributed
                 computer networks",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "120--125",
  month =        mar,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000197",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Moon:2004:SRM,
  author =       "Chang-Joo Moon and Dae-Ha Park and Soung-Jin Park and
                 Doo-Kwon Baik",
  title =        "Symmetric {RBAC} model that takes the separation of
                 duty and role hierarchies into consideration",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "126--136",
  month =        mar,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000185",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stergiou:2004:AAF,
  author =       "T. Stergiou and M. S. Leeson and R. J. Green",
  title =        "An alternative architectural framework to the {OSI}
                 security model",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "137--153",
  month =        mar,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480400015X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cournane:2004:ATU,
  author =       "Allister Cournane and Ray Hunt",
  title =        "An analysis of the tools used for the generation and
                 prevention of spam",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "154--166",
  month =        mar,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000148",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Juang:2004:EPA,
  author =       "Wen-Shenq Juang",
  title =        "Efficient password authenticated key agreement using
                 smart cards",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "167--173",
  month =        mar,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000252",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tzeng:2004:INT,
  author =       "Shiang-Feng Tzeng and Min-Shiang Hwang and Cheng-Ying
                 Yang",
  title =        "An improvement of nonrepudiable threshold proxy
                 signature scheme with known signers",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "174--178",
  month =        mar,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000239",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:PMa,
  author =       "Anonymous",
  title =        "Pages 87--178 ({March 2004})",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "2",
  pages =        "??--??",
  month =        mar,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2004:WVW,
  author =       "Eugene Schultz",
  title =        "Worms and viruses: are we losing control?",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "179--180",
  month =        may,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000987",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2004:SVa,
  author =       "Eugene Schultz",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "181--190",
  month =        may,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000999",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Vroom:2004:TIS,
  author =       "Cheryl Vroom and Rossouw von Solms",
  title =        "Towards information security behavioural compliance",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "191--198",
  month =        may,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480400032X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lin:2004:FSM,
  author =       "Min-Hui Lin and Chin-Chen Chang and Yan-Ren Chen",
  title =        "A fair and secure mobile agent environment based on
                 blind signature and proxy host",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "199--212",
  month =        may,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000288",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Iheagwara:2004:EID,
  author =       "Charles Iheagwara",
  title =        "The effect of intrusion detection management methods
                 on the return on investment",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "213--228",
  month =        may,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000203",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhu:2004:DSM,
  author =       "Lie Huang Zhu and Yuan Da Cao and Dong Wang",
  title =        "Digital signature of multicast streams secure against
                 adaptive chosen message attack",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "229--240",
  month =        may,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000707",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Feng:2004:PII,
  author =       "Li Feng and Xiaohong Guan and Sangang Guo and Yan Gao
                 and Peini Liu",
  title =        "Predicting the intrusion intentions by observing
                 system call sequences",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "241--252",
  month =        may,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000732",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Besnard:2004:CSI,
  author =       "Denis Besnard and Budi Arief",
  title =        "Computer security impaired by legitimate users",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "253--264",
  month =        may,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000161",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:ECc,
  author =       "Anonymous",
  title =        "Events calender",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "EX1",
  month =        may,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001087",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:PMb,
  author =       "Anonymous",
  title =        "Pages 179--264 ({May 2004})",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "??--??",
  month =        may,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2004:IP,
  author =       "Eugene Schultz",
  title =        "Intrusion prevention",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "265--266",
  month =        jun,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001208",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2004:SVb,
  author =       "E. Schultz",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "267--274",
  month =        jun,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480400121X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:2004:PC,
  author =       "Rossouw von Solms and Basie von Solms",
  title =        "From policies to culture",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "275--279",
  month =        jun,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000331",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:ECd,
  author =       "Anonymous",
  title =        "Events calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "280--280",
  month =        jun,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001294",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hu:2004:TLI,
  author =       "Ji Hu and Christoph Meinel",
  title =        "{Tele}-Lab {``IT}-Security'' on {CD}: portable,
                 reliable and safe {IT} security training",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "282--289",
  month =        jun,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000975",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Aslan:2004:LAA,
  author =       "Heba K. Aslan",
  title =        "Logical analysis of {AUTHMAC\_DH}: a new protocol for
                 authentication and key distribution",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "290--299",
  month =        jun,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000215",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ungureanu:2004:FSC,
  author =       "Victoria Ungureanu",
  title =        "Formal support for certificate management policies",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "300--311",
  month =        jun,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000719",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cho:2004:SWS,
  author =       "Sanghyun Cho and Sungdeok Cha",
  title =        "{SAD}: web session anomaly detection based on
                 parameter estimation",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "312--319",
  month =        jun,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000264",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Aslan:2004:SDM,
  author =       "Heba K. Aslan",
  title =        "A scalable and distributed multicast security protocol
                 using a subgroup-key hierarchy",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "320--329",
  month =        jun,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000227",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chen:2004:DSA,
  author =       "Yu-Yi Chen and Jinn-Ke Jan and Chin-Ling Chen",
  title =        "The design of a secure anonymous {Internet} voting
                 system",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "330--337",
  month =        jun,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000720",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Song:2004:RSP,
  author =       "Yougang Song and Brett D. Fleisch",
  title =        "{Rico}: a security proxy for mobile code",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "338--351",
  month =        jun,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000173",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:PJa,
  author =       "Anonymous",
  title =        "Pages 265--351 ({June 2004})",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "??--??",
  month =        jun,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2004:SOH,
  author =       "E. Eugene Schultz",
  title =        "{Sarbanes--Oxley} --- a huge boon to information
                 security in the {US}",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "353--354",
  month =        jul,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480400152X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2004:SVc,
  author =       "E. Schultz",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "355--361",
  month =        jul,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001531",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stewart:2004:RPD,
  author =       "Andrew Stewart",
  title =        "On risk: perception and direction",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "362--370",
  month =        jul,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001233",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:2004:DSI,
  author =       "Basie von Solms and Rossouw von Solms",
  title =        "The 10 deadly sins of information security
                 management",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "371--376",
  month =        jul,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001221",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:ECe,
  author =       "Anonymous",
  title =        "Events calender",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "377--377",
  month =        jul,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001592",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Aljifri:2004:SEP,
  author =       "Hassan Aljifri and Diego S{\'a}nchez Navarro",
  title =        "Search engines and privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "379--388",
  month =        jul,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000240",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chen:2004:EAS,
  author =       "Tzer-Shyong Chen",
  title =        "An {English} auction scheme in the online transaction
                 environment",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "389--399",
  month =        jul,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480400094X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Baumer:2004:IPL,
  author =       "David L. Baumer and Julia B. Earp and J. C.
                 Poindexter",
  title =        "{Internet} privacy law: a comparison between the
                 {United States} and the {European Union}",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "400--412",
  month =        jul,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000136",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lekkas:2004:CNL,
  author =       "Dimitris Lekkas and Dimitris Gritzalis",
  title =        "Cumulative notarization for long-term preservation of
                 digital signatures",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "413--424",
  month =        jul,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001014",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2004:CUF,
  author =       "Chou-Chen Yang and Ren-Chiun Wang",
  title =        "Cryptanalysis of a user friendly remote authentication
                 scheme with smart cards",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "425--427",
  month =        jul,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001002",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yu:2004:KDI,
  author =       "Enzhe Yu and Sungzoon Cho",
  title =        "Keystroke dynamics identity verification-its problems
                 and practical solutions",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "428--440",
  month =        jul,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000963",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:PJb,
  author =       "Anonymous",
  title =        "Pages 353--440 ({July 2004})",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "??--??",
  month =        jul,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2004:COT,
  author =       "E. Eugene Schultz",
  title =        "The case for one-time credentials",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "441--442",
  month =        sep,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001853",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:SVc,
  author =       "Anonymous",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "443--452",
  month =        sep,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001889",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hofmeyr:2004:IIS,
  author =       "S. Hofmeyr",
  title =        "The implications of immunology for secure systems
                 design",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "453--455",
  month =        sep,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480400166X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:ECf,
  author =       "Anonymous",
  title =        "Events Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "457--457",
  month =        sep,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001993",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wool:2004:UUD,
  author =       "Avishai Wool",
  title =        "The use and usability of direction-based filtering in
                 firewalls",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "459--468",
  month =        sep,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804000951",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jiang:2004:FAP,
  author =       "Rui Jiang and Li Pan and Jian-Hua Li",
  title =        "Further analysis of password authentication schemes
                 based on authentication tests",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "469--477",
  month =        sep,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001038",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Artail:2004:PAC,
  author =       "Hassan A. Artail",
  title =        "Peer-assisted carrying authentication {(PACA)}",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "478--488",
  month =        sep,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001191",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Venter:2004:VFC,
  author =       "H. S. Venter and J. H. P. Eloff",
  title =        "Vulnerability forecasting --- a conceptual model",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "489--497",
  month =        sep,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001750",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hwang:2004:OML,
  author =       "Gwan-Hwan Hwang and Tao-Ku Chang",
  title =        "An operational model and language support for securing
                 {XML} documents",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "498--529",
  month =        sep,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001026",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:PS,
  author =       "Anonymous",
  title =        "Pages 441--530 ({September 2004})",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "??--??",
  month =        sep,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2004:GBC,
  author =       "E. Eugene Schultz",
  title =        "The gap between cryptography and information security:
                 has it narrowed?",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "7",
  pages =        "531--532",
  month =        oct,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002287",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2004:SVd,
  author =       "Eugene Schultz",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "7",
  pages =        "533--541",
  month =        oct,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002305",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Purser:2004:IRS,
  author =       "Steve A. Purser",
  title =        "Improving the {ROI} of the security management
                 process",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "7",
  pages =        "542--546",
  month =        oct,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002329",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:ECg,
  author =       "Anonymous",
  title =        "Events Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "7",
  pages =        "547--547",
  month =        oct,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002470",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2004:ARI,
  author =       "Ming Li",
  title =        "An approach to reliably identifying signs of {DDOS}
                 flood attacks based on {LRD} traffic pattern
                 recognition",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "7",
  pages =        "549--558",
  month =        oct,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001245",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Coetzee:2004:TWS,
  author =       "M. Coetzee and J. H. P. Eloff",
  title =        "Towards {Web} Service access control",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "7",
  pages =        "559--570",
  month =        oct,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001695",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lee:2004:ETP,
  author =       "Tian-Fu Lee and Tzonelih Hwang and Chun-Li Lin",
  title =        "Enhanced three-party encrypted key exchange without
                 server public keys",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "7",
  pages =        "571--577",
  month =        oct,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001762",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lopez:2004:AAI,
  author =       "Javier Lopez and Rolf Oppliger and G{\"u}nther
                 Pernul",
  title =        "Authentication and authorization infrastructures
                 {(AAIs)}: a comparative survey",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "7",
  pages =        "578--590",
  month =        oct,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001828",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jeon:2004:FXE,
  author =       "Jae-Myeong Jeon and Yon Dohn Chung and Myoung Ho Kim
                 and Yoon Joon Lee",
  title =        "Filtering {XPath} expressions for {XML} access
                 control",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "7",
  pages =        "591--605",
  month =        oct,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001786",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Teoh:2004:PCK,
  author =       "Andrew B. J. Teoh and David C. L. Ngo and Alwyn Goh",
  title =        "Personalised cryptographic key generation based on
                 {FaceHashing}",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "7",
  pages =        "606--614",
  month =        oct,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001701",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hwang:2004:ILA,
  author =       "Shin-Jia Hwang and Ching-Chung Chan",
  title =        "Improvement on {Li et al.}'s generalization of proxy
                 signature schemes",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "7",
  pages =        "615--619",
  month =        oct,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001713",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:PO,
  author =       "Anonymous",
  title =        "Pages 531--620 ({October 2004})",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "7",
  pages =        "??--??",
  month =        oct,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2004:UGR,
  author =       "Eugene Schultz",
  title =        "Is the {U.S. Government} really getting serious about
                 information security?",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "8",
  pages =        "621--622",
  month =        dec,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002664",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:SVd,
  author =       "Anonymous",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "8",
  pages =        "623--632",
  month =        dec,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002652",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:2004:SWN,
  author =       "Basie von Solms and Emil Marais",
  title =        "From secure wired networks to secure wireless networks
                 --- what are the extra risks?",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "8",
  pages =        "633--637",
  month =        dec,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002330",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Posthumus:2004:FGI,
  author =       "Shaun Posthumus and Rossouw von Solms",
  title =        "A framework for the governance of information
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "8",
  pages =        "638--646",
  month =        dec,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002639",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:ECh,
  author =       "Anonymous",
  title =        "Events Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "8",
  pages =        "647--647",
  month =        dec,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002718",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Apvrille:2004:XDS,
  author =       "A. Apvrille and M. Pourzandi",
  title =        "{XML} distributed security policy for clusters",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "8",
  pages =        "649--658",
  month =        dec,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002342",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2004:ACH,
  author =       "Cungang Yang and Celia Li",
  title =        "Access control in a hierarchy using one-way hash
                 functions",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "8",
  pages =        "659--664",
  month =        dec,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001919",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chen:2004:CDM,
  author =       "Li-Chiou Chen and Thomas A. Longstaff and Kathleen M.
                 Carley",
  title =        "Characterization of defense mechanisms against
                 distributed denial of service attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "8",
  pages =        "665--678",
  month =        dec,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001774",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Noore:2004:EBI,
  author =       "Afzel Noore and Nikhil Tungala and Max M. Houck",
  title =        "Embedding biometric identifiers in {$2$D} barcodes for
                 improved security",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "8",
  pages =        "679--686",
  month =        dec,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002366",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Beghdad:2004:MSI,
  author =       "Rachid Beghdad",
  title =        "Modelling and solving the intrusion detection problem
                 in computer networks",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "8",
  pages =        "687--696",
  month =        dec,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001725",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2004:NEU,
  author =       "Yanjiang Yang and Shuhong Wang and Feng Bao and Jie
                 Wang and Robert H. Deng",
  title =        "New efficient user identification and key distribution
                 scheme providing enhanced security",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "8",
  pages =        "697--704",
  month =        dec,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001920",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Aslan:2004:HSM,
  author =       "Heba K. Aslan",
  title =        "A hybrid scheme for multicast authentication over
                 lossy networks",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "8",
  pages =        "705--713",
  month =        dec,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001798",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2004:PD,
  author =       "Anonymous",
  title =        "Pages 621--714 ({December 2004})",
  journal =      j-COMPUT-SECUR,
  volume =       "23",
  number =       "8",
  pages =        "??--??",
  month =        dec,
  year =         "2004",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2005:SVMa,
  author =       "Anonymous",
  title =        "Security views: Malware update",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "1--9",
  month =        feb,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002809",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tsiakis:2005:CST,
  author =       "Theodosios Tsiakis and George Sthephanides",
  title =        "The concept of security and trust in electronic
                 payments",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "10--15",
  month =        feb,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002792",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gerber:2005:MRI,
  author =       "Mariana Gerber and Rossouw von Solms",
  title =        "Management of risk in the information age",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "16--30",
  month =        feb,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002780",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hansman:2005:TNC,
  author =       "Simon Hansman and Ray Hunt",
  title =        "A taxonomy of network and computer attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "31--43",
  month =        feb,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001804",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cao:2005:RRB,
  author =       "Tianjie Cao and Dongdai Lin and Rui Xue",
  title =        "A randomized {RSA}-based partially blind signature
                 scheme for electronic cash",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "44--49",
  month =        feb,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001737",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yoon:2005:IHL,
  author =       "Eun-Jun Yoon and Eun-Kyung Ryu and Kee-Young Yoo",
  title =        "An improvement of {Hwang--Lee--Tang}'s simple remote
                 user authentication scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "50--56",
  month =        feb,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001749",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Challal:2005:HHC,
  author =       "Yacine Challal and Abdelmadjid Bouabdallah and Hatem
                 Bettahar",
  title =        "{$ H_2 A $}: Hybrid Hash-chaining scheme for Adaptive
                 multicast source authentication of media-streaming",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "57--68",
  month =        feb,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001816",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Thomson:2005:ISO,
  author =       "Kerry-Lynn Thomson and Rossouw von Solms",
  title =        "Information security obedience: a definition",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "69--75",
  month =        feb,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002627",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2005:IWP,
  author =       "Ruishan Zhang and Kefei Chen",
  title =        "Improvements on the {WTLS} protocol to avoid denial of
                 service attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "76--82",
  month =        feb,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002597",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chiou:2005:MBD,
  author =       "Che Wun Chiou and Chiou-Yng Lee",
  title =        "Multiplexer-based double-exponentiation for normal
                 basis of {$ {\rm GF}(2^m) $}",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "83--86",
  month =        feb,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002421",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2005:EC,
  author =       "Anonymous",
  title =        "Events Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "EX1",
  month =        feb,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000064",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2005:PF,
  author =       "Anonymous",
  title =        "Pages 1--86 ({February 2005})",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "1",
  pages =        "??--??",
  month =        feb,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2005:SEG,
  author =       "Dr Eugene Schultz",
  title =        "Search engines: a growing contributor to security
                 risk",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "87--88",
  month =        mar,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000167",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2005:LCL,
  author =       "Dr Eugene Schultz",
  title =        "{Lycos} crosses the line",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "89--90",
  month =        mar,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002810",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2005:SVMb,
  author =       "Anonymous",
  title =        "Security views: Malware Update",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "91--98",
  month =        mar,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000155",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:2005:ISGa,
  author =       "Basie von Solms",
  title =        "Information Security governance: {COBIT} or {ISO}
                 17799 or both?",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "99--104",
  month =        mar,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000210",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tsiakis:2005:EAI,
  author =       "Theodosios Tsiakis and George Stephanides",
  title =        "The economic approach of information security",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "105--108",
  month =        mar,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000209",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Marchesini:2005:KSI,
  author =       "John Marchesini and S. W. Smith and Meiyuan Zhao",
  title =        "Keyjacking: the surprising insecurity of client-side
                 {SSL}",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "109--123",
  month =        mar,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480400183X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stanton:2005:AEU,
  author =       "Jeffrey M. Stanton and Kathryn R. Stam and Paul
                 Mastrangelo and Jeffrey Jolton",
  title =        "Analysis of end user security behaviors",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "124--133",
  month =        mar,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001841",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2005:CTK,
  author =       "Shyh-Yih Wang and Chi Sung Laih",
  title =        "Cryptanalyses of two key assignment schemes based on
                 polynomial interpolations",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "134--138",
  month =        mar,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001865",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bergadano:2005:DPL,
  author =       "Francesco Bergadano and Davide Cavagnino",
  title =        "Dealing with packet loss in the Interactive Chained
                 Stream Authentication protocol",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "139--146",
  month =        mar,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001877",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Karabacak:2005:IIS,
  author =       "Bilge Karabacak and Ibrahim Sogukpinar",
  title =        "{ISRAM}: information security risk analysis method",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "147--159",
  month =        mar,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001890",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kim:2005:EES,
  author =       "Han-Sung Kim and Sung-Deok Cha",
  title =        "Empirical evaluation of {SVM}-based masquerade
                 detection using {UNIX} commands",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "160--168",
  month =        mar,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001944",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jiang:2005:IEA,
  author =       "Rui Jiang and Li Pan and Jian-Hua Li",
  title =        "An improvement on efficient anonymous auction
                 protocols",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "169--174",
  month =        mar,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002408",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2005:PMa,
  author =       "Anonymous",
  title =        "Pages 87--174 ({March 2005})",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "2",
  pages =        "??--??",
  month =        mar,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2005:SDM,
  author =       "Eugene Schultz",
  title =        "Security dilemmas with {Microsoft}'s {Internet}
                 Explorer",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "3",
  pages =        "175--176",
  month =        may,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000428",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2005:SVMc,
  author =       "Anonymous",
  title =        "Security views --- Malware update",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "3",
  pages =        "177--187",
  month =        may,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000441",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2005:SCB,
  author =       "Anonymous",
  title =        "Smart card based authentication --- any future?",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "3",
  pages =        "188--191",
  month =        may,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480500043X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Herzog:2005:PJS,
  author =       "Almut Herzog and Nahid Shahmehri",
  title =        "Performance of the {Java} security manager",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "3",
  pages =        "192--207",
  month =        may,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/java2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804001932",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nabi:2005:SBA,
  author =       "Faisal Nabi",
  title =        "Secure business application logic for e-commerce
                 systems",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "3",
  pages =        "208--217",
  month =        may,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002123",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chen:2005:MBI,
  author =       "Xiu-Zhen Chen and Qing-Hua Zheng and Xiao-Hong Guan
                 and Chen-Guang Lin and Jie Sun",
  title =        "Multiple behavior information fusion based
                 quantitative threat evaluation",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "3",
  pages =        "218--231",
  month =        may,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002135",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rantos:2005:MKR,
  author =       "Konstantinos Rantos and Chris J. Mitchell",
  title =        "Matching key recovery mechanisms to business
                 requirements",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "3",
  pages =        "232--245",
  month =        may,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002317",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Karyda:2005:ISS,
  author =       "Maria Karyda and Evangelos Kiountouzis and Spyros
                 Kokolakis",
  title =        "Information systems security policies: a contextual
                 perspective",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "3",
  pages =        "246--260",
  month =        may,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002378",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2005:PMb,
  author =       "Anonymous",
  title =        "Pages 175--260 ({May 2005})",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "3",
  pages =        "??--??",
  month =        may,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2005:PIC,
  author =       "Dr Eugene Schultz",
  title =        "Personal information compromises: It is time for the
                 {U.S. Government} to wake up",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "261--262",
  month =        jun,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000519",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2005:SV,
  author =       "Anonymous",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "263--270",
  month =        jun,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000520",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:2005:ISL,
  author =       "Basie von Solms and Rossouw von Solms",
  title =        "From information security to \ldots{} business
                 security?",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "271--273",
  month =        jun,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000544",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Furnell:2005:WUC,
  author =       "Steven Furnell",
  title =        "Why users cannot use security",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "274--279",
  month =        jun,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000532",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chang:2005:IDI,
  author =       "David B. Chang and Carl S. Young",
  title =        "Infection dynamics on the {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "280--286",
  month =        jun,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000453",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jiang:2005:RTI,
  author =       "Wenbao Jiang and Hua Song and Yiqi Dai",
  title =        "Real-time intrusion detection for high-speed
                 networks",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "287--294",
  month =        jun,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002354",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chebrolu:2005:FDE,
  author =       "Srilatha Chebrolu and Ajith Abraham and Johnson P.
                 Thomas",
  title =        "Feature deduction and ensemble design of intrusion
                 detection systems",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "295--307",
  month =        jun,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480400238X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Villarroel:2005:SIS,
  author =       "Rodolfo Villarroel and Eduardo Fern{\'a}ndez-Medina
                 and Mario Piattini",
  title =        "Secure information systems development --- a survey
                 and comparison",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "308--321",
  month =        jun,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480400241X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bella:2005:IAS,
  author =       "Giampaolo Bella and Stefano Bistarelli",
  title =        "Information Assurance for security protocols",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "322--333",
  month =        jun,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002615",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Qing:2005:STI,
  author =       "Sihan Qing and Weiping Wen",
  title =        "A survey and trends on {Internet} worms",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "334--346",
  month =        jun,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002585",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2005:PJ,
  author =       "Anonymous",
  title =        "Pages 261--346 ({June 2005})",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "4",
  pages =        "??--??",
  month =        jun,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2005:NIP,
  author =       "Eugene Schultz",
  title =        "Non-infosec professionals in infosec?",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "347--348",
  month =        aug,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000969",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2005:SVa,
  author =       "E. Schultz",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "349--358",
  month =        aug,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000970",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{LeVine:2005:TED,
  author =       "Richard LeVine",
  title =        "Technology evolution drives need for greater
                 information technology security",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "359--361",
  month =        aug,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000982",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Andrew:2005:FPP,
  author =       "C. Andrew",
  title =        "The five Ps of patch management: Is there a simple way
                 for businesses to develop and deploy an advanced
                 security patch management strategy?",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "362--363",
  month =        aug,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000994",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Biryukov:2005:RAA,
  author =       "Alex Biryukov and Joseph Lano and Bart Preneel",
  title =        "Recent attacks on alleged {SecurID} and their
                 practical implications",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "364--370",
  month =        aug,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000660",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Magklaras:2005:PME,
  author =       "G. B. Magklaras and S. M. Furnell",
  title =        "A preliminary model of end user sophistication for
                 insider threat prediction in {IT} systems",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "371--380",
  month =        aug,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002603",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2005:SAS,
  author =       "Chou-Chen Yang and Ren-Chiun Wang and Wei-Ting Liu",
  title =        "Secure authentication scheme for session initiation
                 protocol",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "381--386",
  month =        aug,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002640",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dasgupta:2005:CAB,
  author =       "D. Dasgupta and F. Gonzalez and K. Yallapu and J.
                 Gomez and R. Yarramsettii",
  title =        "{CIDS}: an agent-based intrusion detection system",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "387--398",
  month =        aug,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000179",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Aslan:2005:TLC,
  author =       "Heba K. Aslan",
  title =        "Two-level controllers hierarchy for a scalable and
                 distributed multicast security protocol",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "399--408",
  month =        aug,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000180",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hovav:2005:CMR,
  author =       "Anat Hovav and John D'Arcy",
  title =        "Capital market reaction to defective {IT} products:
                 the case of computer viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "409--424",
  month =        aug,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000374",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2005:PA,
  author =       "Anonymous",
  title =        "Pages 347--424 ({August 2005})",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "5",
  pages =        "??--??",
  month =        aug,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2005:HFS,
  author =       "Eugene Schultz",
  title =        "The human factor in security",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "425--426",
  month =        sep,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001045",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2005:SVb,
  author =       "E. Schultz",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "427--436",
  month =        sep,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001094",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pollard:2005:TFC,
  author =       "C. Pollard",
  title =        "Telecom fraud: the cost of doing nothing just went
                 up",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "437--439",
  month =        sep,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001082",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hofmeyr:2005:HIP,
  author =       "S. Hofmeyr",
  title =        "Host intrusion prevention: Part of the operating
                 system or on top of the operating system?",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "440--442",
  month =        sep,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001069",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:2005:ISGb,
  author =       "S. H. (Basie) von Solms",
  title =        "Information Security Governance --- Compliance
                 management vs operational management",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "443--447",
  month =        sep,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001057",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wiant:2005:ISP,
  author =       "Terry L. Wiant",
  title =        "Information security policy's impact on reporting
                 security incidents",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "448--459",
  month =        sep,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000490",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wu:2005:NDI,
  author =       "Hsien-Chu Wu and Chin-Chen Chang",
  title =        "A novel digital image watermarking scheme based on the
                 vector quantization technique",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "460--471",
  month =        sep,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000672",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Theoharidou:2005:ITI,
  author =       "Marianthi Theoharidou and Spyros Kokolakis and Maria
                 Karyda and Evangelos Kiountouzis",
  title =        "The insider threat to information systems and the
                 effectiveness of {ISO17799}",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "472--484",
  month =        sep,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000684",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fischer:2005:CCI,
  author =       "W. Fischer and N. Lepperhoff",
  title =        "Can critical infrastructures rely on the {Internet}?",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "485--491",
  month =        sep,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000507",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Machanick:2005:DSA,
  author =       "Philip Machanick",
  title =        "A distributed systems approach to secure {Internet}
                 mail",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "492--499",
  month =        sep,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000489",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hwang:2005:IFT,
  author =       "Min-Shiang Hwang and Jung-Wen Lo and Chia-Hsin Liu",
  title =        "Improvement on the flexible tree-based key management
                 framework",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "500--504",
  month =        sep,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404804002391",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2005:PS,
  author =       "Anonymous",
  title =        "Pages 425--504 ({September 2005})",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "6",
  pages =        "??--??",
  month =        sep,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2005:ADR,
  author =       "E. Eugene Schultz",
  title =        "Aligning disaster recovery and security incident
                 response",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "7",
  pages =        "505--506",
  month =        oct,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001513",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2005:SVMd,
  author =       "Anonymous",
  title =        "Security views --- Malware update",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "7",
  pages =        "507--515",
  month =        oct,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001434",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Foote:2005:BSO,
  author =       "P. Foote and T. Neudenberger",
  title =        "Beyond {Sarbanes--Oxley} compliance",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "7",
  pages =        "516--518",
  month =        oct,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001070",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Clarke:2005:AUM,
  author =       "N. L. Clarke and S. M. Furnell",
  title =        "Authentication of users on mobile telephones --- a
                 survey of attitudes and practices",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "7",
  pages =        "519--527",
  month =        oct,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001446",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gowadia:2005:PPA,
  author =       "Vaibhav Gowadia and Csilla Farkas and Marco Valtorta",
  title =        "{PAID}: a Probabilistic Agent-Based Intrusion
                 Detection system",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "7",
  pages =        "529--545",
  month =        oct,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001033",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{OGorman:2005:QDP,
  author =       "Lawrence O'Gorman and Amit Bagga and Jon Bentley",
  title =        "Query-directed passwords",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "7",
  pages =        "546--560",
  month =        oct,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001008",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tseng:2005:SIM,
  author =       "H. Chris Tseng and B. Jack Culpepper",
  title =        "Sinkhole intrusion in mobile ad hoc networks: the
                 problem and some detection indicators",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "7",
  pages =        "561--570",
  month =        oct,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001021",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lee:2005:DAS,
  author =       "Fu-Yuan Lee and Shiuhpyng Shieh",
  title =        "Defending against spoofed {DDoS} attacks with path
                 fingerprint",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "7",
  pages =        "571--586",
  month =        oct,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000465",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2005:ECP,
  author =       "Anonymous",
  title =        "Events calendar, please update, see marked copy",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "7",
  pages =        "EX1",
  month =        oct,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001689",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2005:PO,
  author =       "Anonymous",
  title =        "Pages 505--586 ({October 2005})",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "7",
  pages =        "??--??",
  month =        oct,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2005:ICW,
  author =       "Eugene Schultz",
  title =        "{Infosec} certification: Which way do we turn from
                 here?",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "8",
  pages =        "587--588",
  month =        nov,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001756",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2005:SVc,
  author =       "E. Schultz",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "8",
  pages =        "589--598",
  month =        nov,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001744",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Friess:2005:TE,
  author =       "Nathan Friess and Ryan Vogt and John Aycock",
  title =        "Timing is everything",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "8",
  pages =        "599--603",
  month =        nov,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001707",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Flowerday:2005:RTI,
  author =       "Stephen Flowerday and Rossouw von Solms",
  title =        "Real-time information integrity = system integrity +
                 data integrity + continuous assurances",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "8",
  pages =        "604--613",
  month =        nov,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001458",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mouratidis:2005:SSM,
  author =       "Haralambos Mouratidis",
  title =        "Safety and Security in Multiagent Systems: Report on
                 the 2nd {SASEMAS} workshop {(SASEMAS'05)}",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "8",
  pages =        "614--617",
  month =        nov,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001422",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fan:2005:RRA,
  author =       "Chun-I Fan and Yung-Cheng Chan and Zhi-Kai Zhang",
  title =        "Robust remote authentication scheme with smart cards",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "8",
  pages =        "619--628",
  month =        nov,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000477",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jiang:2005:NMB,
  author =       "Jun Jiang and Chen He and Ling-ge Jiang",
  title =        "A novel mix-based location privacy mechanism in Mobile
                 {IPv6}",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "8",
  pages =        "629--641",
  month =        nov,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000957",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Baiardi:2005:SSV,
  author =       "Fabrizio Baiardi and Alessandro Falleni and Riccardo
                 Granchi and Fabio Martinelli and Marinella Petrocchi
                 and Anna Vaccarelli",
  title =        "{SEAS}, a secure e-voting protocol: Design and
                 implementation",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "8",
  pages =        "642--652",
  month =        nov,
  year =         "2005",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2005.07.008",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001100",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wu:2005:HC,
  author =       "Chuan-Kun Wu",
  title =        "Hash channels",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "8",
  pages =        "653--661",
  month =        nov,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000696",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2005:MLR,
  author =       "Yun Wang",
  title =        "A multinomial logistic regression modeling approach
                 for anomaly intrusion detection",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "8",
  pages =        "662--674",
  month =        nov,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805000751",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2005:CE,
  author =       "Anonymous",
  title =        "Calendar of Events",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "8",
  pages =        "EX1",
  month =        nov,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001896",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2005:PN,
  author =       "Anonymous",
  title =        "Pages 587--674 ({November 2005})",
  journal =      j-COMPUT-SECUR,
  volume =       "24",
  number =       "8",
  pages =        "??--??",
  month =        nov,
  year =         "2005",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2006:DBD,
  author =       "E. Eugene Schultz",
  title =        "Dilemmas and boundaries of digital rights management",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "1--2",
  month =        feb,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805002026",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:SVMa,
  author =       "Anonymous",
  title =        "Security views --- Malware update",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "3--12",
  month =        feb,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805002075",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Booker:2006:REE,
  author =       "Robert Booker",
  title =        "{Re}-engineering enterprise security",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "13--17",
  month =        feb,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805002051",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Roberts:2006:RFI,
  author =       "C. M. Roberts",
  title =        "Radio frequency identification {(RFID)}",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "18--26",
  month =        feb,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480500204X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Furnell:2006:CUU,
  author =       "S. M. Furnell and A. Jusoh and D. Katsabas",
  title =        "The challenges of understanding and using security: a
                 survey of end-users",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "27--35",
  month =        feb,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805002038",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ray:2006:TLB,
  author =       "Indrakshi Ray and Mahendra Kumar",
  title =        "Towards a location-based mandatory access control
                 model",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "36--44",
  month =        feb,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480500101X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dimitriadis:2006:IMP,
  author =       "Christos K. Dimitriadis and Despina Polemi",
  title =        "An identity management protocol for {Internet}
                 applications over {3G} mobile networks",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "45--51",
  month =        feb,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001768",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Phan:2006:CTP,
  author =       "Raphael C.-W. Phan",
  title =        "Cryptanalysis of two password-based authentication
                 schemes using smart cards",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "52--54",
  month =        feb,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001938",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Doherty:2006:AIS,
  author =       "Neil F. Doherty and Heather Fulford",
  title =        "Aligning the information security policy with the
                 strategic information systems plan",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "55--63",
  month =        feb,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001720",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hernandez-Castro:2006:SGG,
  author =       "Julio C. Hernandez-Castro and Ignacio Blasco-Lopez and
                 Juan M. Estevez-Tapiador and Arturo
                 Ribagorda-Garnacho",
  title =        "Steganography in games: a general methodology and its
                 application to the game of Go",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "64--71",
  month =        feb,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805002002",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shieh:2006:ERM,
  author =       "Wen-Gong Shieh and Jian-Min Wang",
  title =        "Efficient remote mutual authentication and key
                 agreement",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "72--77",
  month =        feb,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001719",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:E,
  author =       "Anonymous",
  title =        "Events",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "EX1",
  month =        feb,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000162",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:PF,
  author =       "Anonymous",
  title =        "Pages 1--78 ({February 2006})",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "1",
  pages =        "??--??",
  month =        feb,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2006:AUP,
  author =       "E. Eugene Schultz",
  title =        "About ``Unofficial patches''",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "79--80",
  month =        mar,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000174",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:SVMb,
  author =       "Anonymous",
  title =        "Security Views --- Malware Update",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "81--88",
  month =        mar,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000204",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bradbury:2006:MMW,
  author =       "Danny Bradbury",
  title =        "The metamorphosis of malware writers",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "89--90",
  month =        mar,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000198",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Luoma:2006:CFE,
  author =       "Vicki Miller Luoma",
  title =        "Computer forensics and electronic discovery: the new
                 management challenge",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "91--96",
  month =        mar,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000186",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Izadinia:2006:UIS,
  author =       "Vafa D. Izadinia and D. G. Kourie and J. H. P. Eloff",
  title =        "Uncovering identities: a study into {VPN} tunnel
                 fingerprinting",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "97--105",
  month =        mar,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805002014",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wen:2006:PSA,
  author =       "Hsiang-An Wen and Chun-Li Lin and Tzonelih Hwang",
  title =        "Provably secure authenticated key exchange protocols
                 for low power computing clients",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "106--113",
  month =        mar,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001732",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Goyal:2006:NPC,
  author =       "Vipul Goyal and Virendra Kumar and Mayank Singh and
                 Ajith Abraham and Sugata Sanyal",
  title =        "A new protocol to counter online dictionary attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "114--120",
  month =        mar,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001537",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Komninos:2006:LSD,
  author =       "Nikos Komninos and Dimitris Vergados and Christos
                 Douligeris",
  title =        "Layered security design for mobile ad hoc networks",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "121--130",
  month =        mar,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001562",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Phan:2006:SCI,
  author =       "Raphael C.-W. Phan and David Wagner",
  title =        "Security considerations for incremental hash functions
                 based on pair block chaining",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "131--136",
  month =        mar,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805002063",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sampigethaya:2006:FTC,
  author =       "Krishna Sampigethaya and Radha Poovendran",
  title =        "A framework and taxonomy for comparison of electronic
                 voting schemes",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "137--153",
  month =        mar,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001914",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:CEa,
  author =       "Anonymous",
  title =        "Calendar of Events",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "EX1",
  month =        mar,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000459",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:PMa,
  author =       "Anonymous",
  title =        "Pages 79--154 ({March 2006})",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "2",
  pages =        "??--??",
  month =        mar,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2006:SSO,
  author =       "E. Eugene Schultz",
  title =        "Special systems: Overlooked sources of security
                 risk?",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "155--155",
  month =        may,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000538",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:SVMc,
  author =       "Anonymous",
  title =        "Security Views --- Malware Update",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "156--162",
  month =        may,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000599",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bradbury:2006:MNS,
  author =       "Danny Bradbury",
  title =        "Modeling network security",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "163--164",
  month =        may,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000551",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:2006:ISF,
  author =       "Basie von Solms",
  title =        "Information Security --- The Fourth Wave",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "165--168",
  month =        may,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480600054X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lee:2006:RTA,
  author =       "Soojin Lee and Byungchun Chung and Heeyoul Kim and
                 Yunho Lee and Chanil Park and Hyunsoo Yoon",
  title =        "Real-time analysis of intrusion detection alerts via
                 correlation",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "169--183",
  month =        may,
  year =         "2006",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2005.09.004",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001549",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Das:2006:NRU,
  author =       "Manik Lal Das and Ashutosh Saxena and Ved P. Gulati
                 and Deepak B. Phatak",
  title =        "A novel remote user authentication scheme using
                 bilinear pairings",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "184--189",
  month =        may,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001525",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Du:2006:NAC,
  author =       "Wenliang Du and Mingdong Shang and Haizhi Xu",
  title =        "A novel approach for computer security education using
                 {Minix} instructional operating system",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "190--200",
  month =        may,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/minix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001550",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shao:2006:TTS,
  author =       "Jun Shao and Zhenfu Cao",
  title =        "A traceable threshold signature scheme with multiple
                 signing policies",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "201--206",
  month =        may,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480500194X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ayoade:2006:SIR,
  author =       "John Ayoade",
  title =        "Security implications in {RFID} and authentication
                 processing framework",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "207--212",
  month =        may,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001951",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2006:CTA,
  author =       "Ming Li",
  title =        "Change trend of averaged {Hurst} parameter of traffic
                 under {DDOS} flood attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "213--220",
  month =        may,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001963",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sutherland:2006:EER,
  author =       "Iain Sutherland and George E. Kalb and Andrew Blyth
                 and Gaius Mulley",
  title =        "An empirical examination of the reverse engineering
                 process for binary files",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "221--228",
  month =        may,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480500177X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gonzalez-Talavan:2006:SCS,
  author =       "Guillermo Gonz{\'a}lez-Talav{\'a}n",
  title =        "A simple, configurable {SMTP} anti-spam filter:
                 Greylists",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "229--236",
  month =        may,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000332",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:CEU,
  author =       "Anonymous",
  title =        "Calendar of events --- update",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "EX1",
  month =        may,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480600068X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:PMb,
  author =       "Anonymous",
  title =        "Pages 155--236 ({May 2006})",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "3",
  pages =        "??--??",
  month =        may,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2006:RIS,
  author =       "E. Eugene Schultz",
  title =        "Representing information security fairly and
                 accurately",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "4",
  pages =        "237--237",
  month =        jun,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000630",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:MU,
  author =       "Anonymous",
  title =        "Malware Update",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "4",
  pages =        "238--246",
  month =        jun,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000629",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Botha:2006:RSC,
  author =       "Reinhardt A. Botha and Tshepo G. Gaadingwe",
  title =        "Reflecting on 20 {SEC} conferences",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "4",
  pages =        "247--256",
  month =        jun,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000617",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ford:2006:PCR,
  author =       "Richard Ford and Mark Bush and Alexander Bulatov",
  title =        "Predation and the cost of replication: New approaches
                 to malware prevention?",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "4",
  pages =        "257--264",
  month =        jun,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000289",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ng:2006:SBB,
  author =       "Wee Hock Desmond Ng and Haitham Cruickshank and Zhili
                 Sun",
  title =        "Scalable balanced batch rekeying for secure group
                 communication",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "4",
  pages =        "265--273",
  month =        jun,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000496",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Artail:2006:HHF,
  author =       "Hassan Artail and Haidar Safa and Malek Sraj and Iyad
                 Kuwatly and Zaid Al-Masri",
  title =        "A hybrid honeypot framework for improving intrusion
                 detection systems in protecting organizational
                 networks",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "4",
  pages =        "274--288",
  month =        jun,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000587",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kruger:2006:PAI,
  author =       "H. A. Kruger and W. D. Kearney",
  title =        "A prototype for assessing information security
                 awareness",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "4",
  pages =        "289--296",
  month =        jun,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000563",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Elgohary:2006:DES,
  author =       "Ashraf Elgohary and Tarek S. Sobh and M. Zaki",
  title =        "Design of an enhancement for {SSL\slash TLS}
                 protocols",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "4",
  pages =        "297--306",
  month =        jun,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000319",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chang:2006:AVM,
  author =       "Chin-Chen Chang and Jung-San Lee",
  title =        "An anonymous voting mechanism based on the key
                 exchange protocol",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "4",
  pages =        "307--314",
  month =        jun,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000320",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:CEb,
  author =       "Anonymous",
  title =        "Calendar of events",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "4",
  pages =        "EX1",
  month =        jun,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000836",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:PJa,
  author =       "Anonymous",
  title =        "Pages 237--314 ({June 2006})",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "4",
  pages =        "??--??",
  month =        jun,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2006:CWI,
  author =       "E. Eugene Schultz",
  title =        "The changing winds of information security",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "5",
  pages =        "315--316",
  month =        jul,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000940",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:SVMd,
  author =       "Anonymous",
  title =        "Security Views --- Malware Update",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "5",
  pages =        "317--324",
  month =        jul,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000952",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Flowerday:2006:CAT,
  author =       "S. Flowerday and A. W. Blundell and R. {Von Solms}",
  title =        "Continuous auditing technologies and models: a
                 discussion",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "5",
  pages =        "325--331",
  month =        jul,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000964",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kumar:2006:PAH,
  author =       "Sanjeev Kumar",
  title =        "{PING} attack --- How bad is it?",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "5",
  pages =        "332--337",
  month =        jul,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001926",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Paul:2006:CJN,
  author =       "Nathanael Paul and David Evans",
  title =        "Comparing {Java} and {.NET} security: Lessons learned
                 and missed",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "5",
  pages =        "338--350",
  month =        jul,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/java2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000290",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mitropoulos:2006:IHR,
  author =       "Sarandis Mitropoulos and Dimitrios Patsos and Christos
                 Douligeris",
  title =        "On Incident Handling and Response: a state-of-the-art
                 approach",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "5",
  pages =        "351--370",
  month =        jul,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404805001574",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ma:2006:ADS,
  author =       "Mingchao Ma and Steve Woodhead",
  title =        "Authentication delegation for subscription-based
                 remote network services",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "5",
  pages =        "371--378",
  month =        jul,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000575",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Halkidis:2006:QAS,
  author =       "Spyros T. Halkidis and Alexander Chatzigeorgiou and
                 George Stephanides",
  title =        "A qualitative analysis of software security patterns",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "5",
  pages =        "379--392",
  month =        jul,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000526",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:CEc,
  author =       "Anonymous",
  title =        "Calender of Events",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "5",
  pages =        "EX1",
  month =        jul,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001052",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:PJb,
  author =       "Anonymous",
  title =        "Pages 315--392 ({July 2006})",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "5",
  pages =        "??--??",
  month =        jul,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:ICa,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "iii--iii",
  month =        sep,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001301",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:GAa,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "iv--iv",
  month =        sep,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001337",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2006:MBH,
  author =       "E. Eugene Schultz",
  title =        "{Microsoft} is back in the hot seat",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "393--394",
  month =        sep,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001131",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:SVMe,
  author =       "Anonymous",
  title =        "Security Views --- Malware Update",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "395--404",
  month =        sep,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001143",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bradbury:2006:MNW,
  author =       "Danny Bradbury",
  title =        "{Microsoft}'s new window on security",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "405--407",
  month =        sep,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001155",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:2006:ISGa,
  author =       "Rossouw von Solms and S. H. (Basie) von Solms",
  title =        "Information Security Governance: a model based on the
                 Direct-Control Cycle",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "408--412",
  month =        sep,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001167",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Karabacak:2006:QMI,
  author =       "Bilge Karabacak and Ibrahim Sogukpinar",
  title =        "A quantitative method for {ISO} 17799 gap analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "413--419",
  month =        sep,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000757",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mangipudi:2006:SIK,
  author =       "Kumar Mangipudi and Rajendra Katti",
  title =        "A Secure Identification and Key agreement protocol
                 with user Anonymity {(SIKA)}",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "420--425",
  month =        sep,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000769",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Seba:2006:FFT,
  author =       "H. Seba",
  title =        "{FTKM}: a fault-tolerant key management protocol for
                 multicast communications",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "426--434",
  month =        sep,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000976",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kwak:2006:SEK,
  author =       "DongJin Kwak and SangJae Moon and Guilin Wang and
                 Robert H. Deng",
  title =        "A secure extension of the {Kwak--Moon} group
                 signcryption scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "435--444",
  month =        sep,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000915",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Abimbola:2006:NSI,
  author =       "A. A. Abimbola and J. M. Munoz and W. J. Buchanan",
  title =        "{NetHost-Sensor}: Investigating the capture of
                 end-to-end encrypted intrusive data",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "445--451",
  month =        sep,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000605",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tomur:2006:ATS,
  author =       "Emrah Tomur and Y. M. Erten",
  title =        "Application of temporal and spatial role based access
                 control in 802.11 wireless networks",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "452--458",
  month =        sep,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000927",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Amini:2006:RUP,
  author =       "Morteza Amini and Rasool Jalili and Hamid Reza
                 Shahriari",
  title =        "{RT}-{UNNID}: a practical solution to real-time
                 network-based intrusion detection using unsupervised
                 neural networks",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "459--468",
  month =        sep,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000782",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zuo:2006:IIH,
  author =       "Zhi-hong Zuo and Qing-xin Zhu and Ming-tian Zhou",
  title =        "Infection, imitation and a hierarchy of computer
                 viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "469--473",
  month =        sep,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000307",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:ICEa,
  author =       "Anonymous",
  title =        "{IBC} --- Calendar of Events",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "CO3",
  month =        sep,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001349",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:IEBa,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "CO2",
  month =        sep,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001271",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:PS,
  author =       "Anonymous",
  title =        "Pages 393--474 ({September 2006})",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "??--??",
  month =        sep,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:ICb,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "7",
  pages =        "iii--iii",
  month =        oct,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001647",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:GAb,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "7",
  pages =        "iv--v",
  month =        oct,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001660",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2006:ICD,
  author =       "E. Eugene Schultz",
  title =        "Issues concerning the distribution of vulnerability
                 information",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "7",
  pages =        "475--476",
  month =        oct,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001453",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:SVMf,
  author =       "Anonymous",
  title =        "Security Views --- Malware Update",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "7",
  pages =        "477--485",
  month =        oct,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001465",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lacohee:2006:RRA,
  author =       "H. Lacohee and A. D. Phippen and S. M. Furnell",
  title =        "Risk and restitution: Assessing how users establish
                 online trust",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "7",
  pages =        "486--493",
  month =        oct,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001489",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:2006:ISGb,
  author =       "Rossouw von Solms and S. H. (Basie) von Solms",
  title =        "Information security governance: Due care",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "7",
  pages =        "494--497",
  month =        oct,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001441",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Igure:2006:SIS,
  author =       "Vinay M. Igure and Sean A. Laughter and Ronald D.
                 Williams",
  title =        "Security issues in {SCADA} networks",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "7",
  pages =        "498--506",
  month =        oct,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000514",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kapsalis:2006:DCA,
  author =       "Vassilis Kapsalis and Loukas Hadellis and Dimitris
                 Karelis and Stavros Koubias",
  title =        "A dynamic context-aware access control architecture
                 for e-services",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "7",
  pages =        "507--521",
  month =        oct,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000770",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kjaerland:2006:TCC,
  author =       "Maria Kjaerland",
  title =        "A taxonomy and comparison of computer security
                 incidents from the commercial and government sectors",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "7",
  pages =        "522--538",
  month =        oct,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001234",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2006:PPB,
  author =       "Wei Wang and Xiaohong Guan and Xiangliang Zhang and
                 Liwei Yang",
  title =        "Profiling program behavior for anomaly intrusion
                 detection based on the transition and frequency
                 property of computer audit data",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "7",
  pages =        "539--550",
  month =        oct,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000903",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:CPI,
  author =       "Anonymous",
  title =        "Call for {papers-IFIPSEC} 2007",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "7",
  pages =        "551--551",
  month =        oct,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001477",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:ICEb,
  author =       "Anonymous",
  title =        "{IBC} --- Calendar of Events",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "7",
  pages =        "CO3",
  month =        oct,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001817",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:IEBb,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "7",
  pages =        "CO2",
  month =        oct,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001611",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:PO,
  author =       "Anonymous",
  title =        "Pages 475--552 ({October 2006})",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "7",
  pages =        "??--??",
  month =        oct,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:ICc,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "8",
  pages =        "iii--iii",
  month =        nov,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001933",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:GAc,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "8",
  pages =        "iv--v",
  month =        nov,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001969",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2006:PFI,
  author =       "E. Eugene Schultz",
  title =        "Predicting the future of {InfoSec}",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "8",
  pages =        "553--554",
  month =        nov,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001830",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:SVMg,
  author =       "Anonymous",
  title =        "Security Views --- Malware update",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "8",
  pages =        "555--565",
  month =        nov,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001842",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carpinter:2006:TNR,
  author =       "James Carpinter and Ray Hunt",
  title =        "Tightening the net: a review of current and next
                 generation spam filtering tools",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "8",
  pages =        "566--578",
  month =        nov,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806000939",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ryan:2006:EBI,
  author =       "Julie J. C. H. Ryan and Daniel J. Ryan",
  title =        "Expected benefits of information security
                 investments",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "8",
  pages =        "579--588",
  month =        nov,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001192",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liang:2006:VDE,
  author =       "Jinqian Liang and Xiaohong Guan",
  title =        "A virtual disk environment for providing file system
                 recovery",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "8",
  pages =        "589--599",
  month =        nov,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001209",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carl:2006:WBD,
  author =       "Glenn Carl and Richard R. Brooks and Suresh Rai",
  title =        "Wavelet based Denial-of-Service detection",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "8",
  pages =        "600--615",
  month =        nov,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001210",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:ICEc,
  author =       "Anonymous",
  title =        "{IBC} --- Calendar of Events",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "8",
  pages =        "CO3",
  month =        nov,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001970",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:IEBc,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "8",
  pages =        "CO2",
  month =        nov,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001908",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2006:PN,
  author =       "Anonymous",
  title =        "Pages 553--616 ({November 2006})",
  journal =      j-COMPUT-SECUR,
  volume =       "25",
  number =       "8",
  pages =        "??--??",
  month =        nov,
  year =         "2006",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:ICa,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "iii--iii",
  month =        feb,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000119",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:GAa,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "V--VI",
  month =        feb,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000144",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2007:WIC,
  author =       "E. Eugene Schultz",
  title =        "What infosec changes are likely to result from the
                 recent {US} election?",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "1--2",
  month =        feb,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806002148",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:SVMa,
  author =       "Anonymous",
  title =        "Security Views --- Malware Update",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "3--13",
  month =        feb,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806002112",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Roberts:2007:BAV,
  author =       "Chris Roberts",
  title =        "Biometric attack vectors and defences",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "14--25",
  month =        feb,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480600215X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bernard:2007:ILS,
  author =       "Ray Bernard",
  title =        "Information Lifecycle Security Risk Assessment: a tool
                 for closing security gaps",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "26--30",
  month =        feb,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806002124",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bradbury:2007:DDR,
  author =       "Danny Bradbury",
  title =        "Decoding digital rights management",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "31--33",
  month =        feb,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806002136",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Furnell:2007:IWI,
  author =       "Steven Furnell",
  title =        "{IFIP} workshop --- Information security culture",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "35--35",
  month =        feb,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001854",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Drevin:2007:VFA,
  author =       "L. Drevin and H. A. Kruger and T. Steyn",
  title =        "Value-focused assessment of {ICT} security awareness
                 in an academic environment",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "36--43",
  month =        feb,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001544",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bakari:2007:BGB,
  author =       "Jabiri Kuwe Bakari and Charles N. Tarimo and Louise
                 Yngstr{\"o}m and Christer Magnusson and Stewart
                 Kowalski",
  title =        "Bridging the gap between general management and
                 technicians --- a case study on {ICT} security in a
                 developing country",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "44--55",
  month =        feb,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001568",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ruighaver:2007:OSC,
  author =       "A. B. Ruighaver and S. B. Maynard and S. Chang",
  title =        "Organisational security culture: Extending the
                 end-user perspective",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "56--62",
  month =        feb,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480600157X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cone:2007:VGC,
  author =       "Benjamin D. Cone and Cynthia E. Irvine and Michael F.
                 Thompson and Thuy D. Nguyen",
  title =        "A video game for cyber security training and
                 awareness",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "63--72",
  month =        feb,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001556",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dodge:2007:PUS,
  author =       "Ronald C. Dodge and Curtis Carver and Aaron J.
                 Ferguson",
  title =        "Phishing for user security awareness",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "73--80",
  month =        feb,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001581",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Oliveira:2007:PPC,
  author =       "Stanley R. M. Oliveira and Osmar R. Za{\"\i}ane",
  title =        "A privacy-preserving clustering approach toward secure
                 and effective data analysis for business
                 collaboration",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "81--93",
  month =        feb,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001222",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lu:2007:STP,
  author =       "Rongxing Lu and Zhenfu Cao",
  title =        "Simple three-party key exchange protocol",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "94--97",
  month =        feb,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001246",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:ICE,
  author =       "Anonymous",
  title =        "{IBC} --- Calendar of Events",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "CO3",
  month =        feb,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000156",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:IEBa,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "CO2",
  month =        feb,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000089",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:PF,
  author =       "Anonymous",
  title =        "Pages 1--98 ({February 2007})",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "??--??",
  month =        feb,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:ICb,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "iii--iii",
  month =        mar,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000296",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:GAb,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "iv--v",
  month =        mar,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000338",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2007:WVM,
  author =       "E. Eugene Schultz",
  title =        "{Windows} Vista: {Microsoft}'s brave new world",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "99--99",
  month =        mar,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000247",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:MUa,
  author =       "Anonymous",
  title =        "Malware Update",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "100--108",
  month =        mar,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000223",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Clarke:2007:AUA,
  author =       "N. L. Clarke and S. M. Furnell",
  title =        "Advanced user authentication for mobile devices",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "109--119",
  month =        mar,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001428",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stoupa:2007:CSC,
  author =       "K. Stoupa and A. Vakali",
  title =        "Clustering subjects in a credential-based access
                 control framework",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "120--129",
  month =        mar,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001258",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gaiman:2007:PPP,
  author =       "Michael Gaiman and Rahul Simha and Bhagirath
                 Narahari",
  title =        "Privacy-preserving programming using sython",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "130--136",
  month =        mar,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001386",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2007:PAA,
  author =       "Jianhua Yang and Shou-Hsuan Stephen Huang",
  title =        "Probabilistic analysis of an algorithm to compute
                 {TCP} packet round-trip time for intrusion detection",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "137--144",
  month =        mar,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001398",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kim:2007:SDC,
  author =       "Sangkyun Kim and Hong Joo Lee",
  title =        "A study on decision consolidation methods using
                 analytic models for security systems",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "145--153",
  month =        mar,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001404",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mazhelis:2007:FBB,
  author =       "Oleksiy Mazhelis and Seppo Puuronen",
  title =        "A framework for behavior-based detection of user
                 substitution in a mobile context",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "154--176",
  month =        mar,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001416",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Oshri:2007:ISN,
  author =       "Ilan Oshri and Julia Kotlarsky and Corey Hirsch",
  title =        "Information security in networkable {Windows}-based
                 operating system devices: Challenges and solutions",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "177--182",
  month =        mar,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001490",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Novak:2007:IRA,
  author =       "Christopher J. Novak",
  title =        "Investigative response: After the breach",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "183--185",
  month =        mar,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480600143X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:IEBb,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "ifc--ifc",
  month =        mar,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000260",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:PMa,
  author =       "Anonymous",
  title =        "Pages 99--186 ({March 2007})",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "??--??",
  month =        mar,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:ICc,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "3",
  pages =        "iii--iii",
  month =        may,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000454",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:GAc,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "3",
  pages =        "iv--v",
  month =        may,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000491",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2007:MCN,
  author =       "E. Eugene Schultz",
  title =        "Mobile computing: the next {Pandora}'s {Box}",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "3",
  pages =        "187--187",
  month =        may,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000399",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:MUb,
  author =       "Anonymous",
  title =        "Malware update",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "3",
  pages =        "188--200",
  month =        may,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000387",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Onut:2007:SNV,
  author =       "Iosif-Viorel Onut and Ali A. Ghorbani",
  title =        "{SVision}: a novel visual network-anomaly
                 identification technique",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "3",
  pages =        "201--212",
  month =        may,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001507",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2007:MAS,
  author =       "Tao Li and Zhihong Guan and Xianyong Wu",
  title =        "Modeling and analyzing the spread of active worms
                 based on {P2P} systems",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "3",
  pages =        "213--218",
  month =        may,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001519",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alhazmi:2007:MAP,
  author =       "O. H. Alhazmi and Y. K. Malaiya and I. Ray",
  title =        "Measuring, analyzing and predicting security
                 vulnerabilities in software systems",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "3",
  pages =        "219--228",
  month =        may,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001520",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Post:2007:EIS,
  author =       "Gerald V. Post and Albert Kagan",
  title =        "Evaluating information security tradeoffs: Restricting
                 access can interfere with user tasks",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "3",
  pages =        "229--237",
  month =        may,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001532",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chen:2007:MCM,
  author =       "Xiaoyan Chen and Bobby N. W. Ma and Cungang Yang",
  title =        "{M-CLIQUES}: Modified {CLIQUES} key agreement for
                 secure multicast",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "3",
  pages =        "238--245",
  month =        may,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001866",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ksiezopolski:2007:ASM,
  author =       "Bogdan Ksiezopolski and Zbigniew Kotulski",
  title =        "Adaptable security mechanism for dynamic
                 environments",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "3",
  pages =        "246--255",
  month =        may,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806001878",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zuccato:2007:HSM,
  author =       "Albin Zuccato",
  title =        "Holistic security management framework applied in
                 electronic commerce",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "3",
  pages =        "256--265",
  month =        may,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480600188X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:IEBc,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "3",
  pages =        "ifc--ifc",
  month =        may,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000429",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:PMb,
  author =       "Anonymous",
  title =        "Pages 187--266 ({May 2007})",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "3",
  pages =        "??--??",
  month =        may,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:ICd,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "iii--iii",
  month =        jun,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000612",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:GAd,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "iv--v",
  month =        jun,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480700065X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:2007:SAS,
  author =       "E. Eugene Schultz",
  title =        "Struggles in the academic side of infosec",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "267--268",
  month =        jun,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000545",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:SVMb,
  author =       "Anonymous",
  title =        "Security Views --- Malware",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "269--275",
  month =        jun,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000557",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Albrechtsen:2007:QSU,
  author =       "Eirik Albrechtsen",
  title =        "A qualitative study of users' view on information
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "276--289",
  month =        jun,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806002033",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sharma:2007:TIS,
  author =       "Sushil K. Sharma and Joshua Sefchek",
  title =        "Teaching information systems security courses: a
                 hands-on approach",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "290--299",
  month =        jun,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806002045",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lee:2007:RKD,
  author =       "Hyoung-joo Lee and Sungzoon Cho",
  title =        "Retraining a keystroke dynamics-based authenticator
                 with impostor patterns",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "300--310",
  month =        jun,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806002057",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jian:2007:MDB,
  author =       "Zhou Jian and Haruhiko Shirai and Isamu Takahashi and
                 Jousuke Kuroiwa and Tomohiro Odaka and Hisakazu Ogura",
  title =        "Masquerade detection by boosting decision stumps using
                 {UNIX} commands",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "311--318",
  month =        jun,
  year =         "2007",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2006.11.008",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806002069",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hu:2007:DWD,
  author =       "Ming-Chiang Hu and Der-Chyuan Lou and Ming-Chang
                 Chang",
  title =        "Dual-wrapped digital watermarking scheme for image
                 copyright protection",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "319--330",
  month =        jun,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806002070",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tseng:2007:RCG,
  author =       "Yuh-Min Tseng",
  title =        "A resource-constrained group key agreement protocol
                 for imbalanced wireless networks",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "331--337",
  month =        jun,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806002082",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2007:FSB,
  author =       "Jun Li and Paul Knickerbocker",
  title =        "Functional similarities between computer worms and
                 biological pathogens",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "338--347",
  month =        jun,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806002094",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:IEBd,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "ifc--ifc",
  month =        jun,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000582",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:PJ,
  author =       "Anonymous",
  title =        "Pages 267--348 ({June 2007})",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "??--??",
  month =        jun,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:ICf,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "5",
  pages =        "iii--iii",
  month =        aug,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000831",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:GAe,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "5",
  pages =        "iv--v",
  month =        aug,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000879",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shahriari:2007:VTG,
  author =       "Hamid Reza Shahriari and Rasool Jalili",
  title =        "{Vulnerability Take Grant (VTG)}: an efficient
                 approach to analyze network vulnerabilities",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "5",
  pages =        "349--360",
  month =        aug,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000375",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schryen:2007:IPE,
  author =       "Guido Schryen",
  title =        "The impact that placing email addresses on the
                 {Internet} has on the receipt of spam: an empirical
                 analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "5",
  pages =        "361--372",
  month =        aug,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000028",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Komninos:2007:ALS,
  author =       "Nikos Komninos and Dimitrios D. Vergados and Christos
                 Douligeris",
  title =        "Authentication in a layered security approach for
                 mobile ad hoc networks",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "5",
  pages =        "373--380",
  month =        aug,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000041",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2007:UHS,
  author =       "Chih-Chien Wang and Sheng-Yi Chen",
  title =        "Using header session messages to anti-spamming",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "5",
  pages =        "381--390",
  month =        aug,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000065",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Vila:2007:SMA,
  author =       "X. Vila and A. Schuster and A. Riera",
  title =        "Security for a Multi-Agent System based on {JADE}",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "5",
  pages =        "391--400",
  month =        aug,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404806002100",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lei:2007:CSA,
  author =       "Jun Lei and Xiaoming Fu and Dieter Hogrefe and
                 Jianrong Tan",
  title =        "Comparative studies on authentication and key exchange
                 methods for 802.11 wireless {LAN}",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "5",
  pages =        "401--409",
  month =        aug,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000053",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Furnell:2007:ASP,
  author =       "S. M. Furnell and P. Bryant and A. D. Phippen",
  title =        "Assessing the security perceptions of personal
                 {Internet} users",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "5",
  pages =        "410--417",
  month =        aug,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000363",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:IEBe,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "5",
  pages =        "ifc--ifc",
  month =        aug,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000806",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:PA,
  author =       "Anonymous",
  title =        "Pages 349--418 ({August 2007})",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "5",
  pages =        "??--??",
  month =        aug,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:ICg,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "6",
  pages =        "iii--iii",
  month =        sep,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000995",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:GAf,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "6",
  pages =        "iv--v",
  month =        sep,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001022",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:P,
  author =       "Anonymous",
  title =        "From the Publisher",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "6",
  pages =        "419--419",
  month =        sep,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000776",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Goring:2007:AKM,
  author =       "Stuart P. Goring and Joseph R. Rabaiotti and Antonia
                 J. Jones",
  title =        "Anti-keylogging measures for secure {Internet} login:
                 an example of the law of unintended consequences",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "6",
  pages =        "421--426",
  month =        sep,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000569",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yu:2007:AMA,
  author =       "Ming Yu and Xi-Yuan Zhou",
  title =        "An adaptive method for anomaly detection in symmetric
                 network traffic",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "6",
  pages =        "427--433",
  month =        sep,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000764",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Furnell:2007:MSU,
  author =       "Steven Furnell",
  title =        "Making security usable: Are things improving?",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "6",
  pages =        "434--443",
  month =        sep,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000788",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:IEBf,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "6",
  pages =        "ifc--ifc",
  month =        sep,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480700096X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:PS,
  author =       "Anonymous",
  title =        "Pages 419--444 ({September 2007})",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "6",
  pages =        "??--??",
  month =        sep,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:ICh,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "iii--iii",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001174",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:GAg,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "iv--v",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001216",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Furnell:2007:AWPa,
  author =       "Steven Furnell",
  title =        "An assessment of website password practices",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "445--451",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001083",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jeong:2007:KAKa,
  author =       "Ik Rae Jeong and Dong Hoon Lee",
  title =        "Key agreement for {\em key hypergraph}",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "452--458",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000946",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2007:ALBa,
  author =       "Yang Li and Li Guo",
  title =        "An active learning based {TCM}-{KNN} algorithm for
                 supervised network intrusion detection",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "459--467",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001101",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rodwell:2007:NIBa,
  author =       "P. M. Rodwell and S. M. Furnell and P. L. Reynolds",
  title =        "A non-intrusive biometric authentication mechanism
                 utilising physiological characteristics of the human
                 head",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "468--478",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001095",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2007:MTIa,
  author =       "Jianhua Yang and Shou-Hsuan Stephen Huang",
  title =        "Mining {TCP\slash IP} packets to detect stepping-stone
                 intrusion",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "479--484",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000934",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bradbury:2007:SCIa,
  author =       "D. Bradbury",
  title =        "The security challenges inherent in {VoIP}",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "485--487",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000235",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sharma:2007:IDUa,
  author =       "Alok Sharma and Arun K. Pujari and Kuldip K. Paliwal",
  title =        "Intrusion detection using text processing techniques
                 with a kernel based similarity measure",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "488--495",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001113",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Buchholz:2007:RTLa,
  author =       "Florian Buchholz and Eugene H. Spafford",
  title =        "Run-time label propagation for forensic audit data",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "496--513",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000922",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:IEBg,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "ifc--ifc",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001149",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:PDa,
  author =       "Anonymous",
  title =        "Pages 445--514 ({December 2007})",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "??--??",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:ICi,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "iii--iii",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001174",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:GAh,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "iv--v",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001216",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Furnell:2007:AWPb,
  author =       "Steven Furnell",
  title =        "An assessment of website password practices",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "445--451",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001083",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jeong:2007:KAKb,
  author =       "Ik Rae Jeong and Dong Hoon Lee",
  title =        "Key agreement for {\em key hypergraph}",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "452--458",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000946",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2007:ALBb,
  author =       "Yang Li and Li Guo",
  title =        "An active learning based {TCM}-{KNN} algorithm for
                 supervised network intrusion detection",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "459--467",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001101",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rodwell:2007:NIBb,
  author =       "P. M. Rodwell and S. M. Furnell and P. L. Reynolds",
  title =        "A non-intrusive biometric authentication mechanism
                 utilising physiological characteristics of the human
                 head",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "468--478",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001095",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2007:MTIb,
  author =       "Jianhua Yang and Shou-Hsuan Stephen Huang",
  title =        "Mining {TCP\slash IP} packets to detect stepping-stone
                 intrusion",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "479--484",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000934",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bradbury:2007:SCIb,
  author =       "D. Bradbury",
  title =        "The security challenges inherent in {VoIP}",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "485--487",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000235",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sharma:2007:IDUb,
  author =       "Alok Sharma and Arun K. Pujari and Kuldip K. Paliwal",
  title =        "Intrusion detection using text processing techniques
                 with a kernel based similarity measure",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "488--495",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001113",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Buchholz:2007:RTLb,
  author =       "Florian Buchholz and Eugene H. Spafford",
  title =        "Run-time label propagation for forensic audit data",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "496--513",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000922",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:IEBh,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "ifc--ifc",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001149",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:PDb,
  author =       "Anonymous",
  title =        "Pages 445--514 ({December 2007})",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "??--??",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:ICj,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "iii--iii",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001174",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:GAi,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "iv--v",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001216",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Furnell:2007:AWPc,
  author =       "Steven Furnell",
  title =        "An assessment of website password practices",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "445--451",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001083",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jeong:2007:KAKc,
  author =       "Ik Rae Jeong and Dong Hoon Lee",
  title =        "Key agreement for {\em key hypergraph}",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "452--458",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000946",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2007:ALBc,
  author =       "Yang Li and Li Guo",
  title =        "An active learning based {TCM}-{KNN} algorithm for
                 supervised network intrusion detection",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "459--467",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001101",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rodwell:2007:NIBc,
  author =       "P. M. Rodwell and S. M. Furnell and P. L. Reynolds",
  title =        "A non-intrusive biometric authentication mechanism
                 utilising physiological characteristics of the human
                 head",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "468--478",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001095",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2007:MTIc,
  author =       "Jianhua Yang and Shou-Hsuan Stephen Huang",
  title =        "Mining {TCP\slash IP} packets to detect stepping-stone
                 intrusion",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "479--484",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000934",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bradbury:2007:SCIc,
  author =       "D. Bradbury",
  title =        "The security challenges inherent in {VoIP}",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "485--487",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000235",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sharma:2007:IDUc,
  author =       "Alok Sharma and Arun K. Pujari and Kuldip K. Paliwal",
  title =        "Intrusion detection using text processing techniques
                 with a kernel based similarity measure",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "488--495",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001113",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Buchholz:2007:RTLc,
  author =       "Florian Buchholz and Eugene H. Spafford",
  title =        "Run-time label propagation for forensic audit data",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "496--513",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807000922",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:IEBi,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "ifc--ifc",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001149",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2007:PDc,
  author =       "Anonymous",
  title =        "Pages 445--514 ({December 2007})",
  journal =      j-COMPUT-SECUR,
  volume =       "26",
  number =       "7--8",
  pages =        "??--??",
  month =        dec,
  year =         "2007",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:ICa,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "iii--iii",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000199",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolthusen:2008:Ea,
  author =       "S. D. Wolthusen",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "1--1",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480800014X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kang:2008:IKDa,
  author =       "Pilsung Kang and Sunghoon Park and Seong-seob Hwang
                 and Hyoung-joo Lee and Sungzoon Cho",
  title =        "Improvement of keystroke data quality through
                 artificial rhythms and cues",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "3--11",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000023",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Harn:2008:EIBa,
  author =       "Lein Harn and Jian Ren",
  title =        "Efficient identity-based {RSA} multisignatures",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "12--15",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000059",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guo:2008:CSTa,
  author =       "Hua Guo and Zhoujun Li and Yi Mu and Xiyong Zhang",
  title =        "Cryptanalysis of simple three-party key exchange
                 protocol",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "16--21",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000035",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anderson:2008:EISa,
  author =       "Evan E. Anderson and Joobin Choobineh",
  title =        "Enterprise information security strategies",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "22--29",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000060",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ganame:2008:GSAa,
  author =       "Abdoul Karim Ganame and Julien Bourgeois and Renaud
                 Bidou and Francois Spies",
  title =        "A global security architecture for intrusion detection
                 on computer networks",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "30--47",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000047",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palmieri:2008:CLSa,
  author =       "Francesco Palmieri and Ugo Fiore",
  title =        "Containing large-scale worm spreading in the
                 {Internet} by cooperative distribution of traffic
                 filtering policies",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "48--62",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001241",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:IEBa,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "ifc--ifc",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000175",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:PMa,
  author =       "Anonymous",
  title =        "Pages 1--62 ({March 2008})",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "??--??",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:ICb,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "iii--iii",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000199",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolthusen:2008:Eb,
  author =       "S. D. Wolthusen",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "1--1",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480800014X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kang:2008:IKDb,
  author =       "Pilsung Kang and Sunghoon Park and Seong-seob Hwang
                 and Hyoung-joo Lee and Sungzoon Cho",
  title =        "Improvement of keystroke data quality through
                 artificial rhythms and cues",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "3--11",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000023",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Harn:2008:EIBb,
  author =       "Lein Harn and Jian Ren",
  title =        "Efficient identity-based {RSA} multisignatures",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "12--15",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000059",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guo:2008:CSTb,
  author =       "Hua Guo and Zhoujun Li and Yi Mu and Xiyong Zhang",
  title =        "Cryptanalysis of simple three-party key exchange
                 protocol",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "16--21",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000035",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anderson:2008:EISb,
  author =       "Evan E. Anderson and Joobin Choobineh",
  title =        "Enterprise information security strategies",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "22--29",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000060",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ganame:2008:GSAb,
  author =       "Abdoul Karim Ganame and Julien Bourgeois and Renaud
                 Bidou and Francois Spies",
  title =        "A global security architecture for intrusion detection
                 on computer networks",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "30--47",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000047",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palmieri:2008:CLSb,
  author =       "Francesco Palmieri and Ugo Fiore",
  title =        "Containing large-scale worm spreading in the
                 {Internet} by cooperative distribution of traffic
                 filtering policies",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "48--62",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001241",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:IEBb,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "ifc--ifc",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000175",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:PMb,
  author =       "Anonymous",
  title =        "Pages 1--62 ({March 2008})",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "??--??",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:ICc,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "iii--iii",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000199",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolthusen:2008:Ec,
  author =       "S. D. Wolthusen",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "1--1",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480800014X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kang:2008:IKDc,
  author =       "Pilsung Kang and Sunghoon Park and Seong-seob Hwang
                 and Hyoung-joo Lee and Sungzoon Cho",
  title =        "Improvement of keystroke data quality through
                 artificial rhythms and cues",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "3--11",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000023",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Harn:2008:EIBc,
  author =       "Lein Harn and Jian Ren",
  title =        "Efficient identity-based {RSA} multisignatures",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "12--15",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000059",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guo:2008:CSTc,
  author =       "Hua Guo and Zhoujun Li and Yi Mu and Xiyong Zhang",
  title =        "Cryptanalysis of simple three-party key exchange
                 protocol",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "16--21",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000035",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anderson:2008:EISc,
  author =       "Evan E. Anderson and Joobin Choobineh",
  title =        "Enterprise information security strategies",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "22--29",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000060",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ganame:2008:GSAc,
  author =       "Abdoul Karim Ganame and Julien Bourgeois and Renaud
                 Bidou and Francois Spies",
  title =        "A global security architecture for intrusion detection
                 on computer networks",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "30--47",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000047",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palmieri:2008:CLSc,
  author =       "Francesco Palmieri and Ugo Fiore",
  title =        "Containing large-scale worm spreading in the
                 {Internet} by cooperative distribution of traffic
                 filtering policies",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "48--62",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404807001241",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:IEBc,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "ifc--ifc",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000175",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:PMc,
  author =       "Anonymous",
  title =        "Pages 1--62 ({March 2008})",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "1--2",
  pages =        "??--??",
  month =        mar,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:ICd,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "3--4",
  pages =        "iii--iii",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000539",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolthusen:2008:Ed,
  author =       "S. D. Wolthusen",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "3--4",
  pages =        "63--63",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000473",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Oppliger:2008:STS,
  author =       "Rolf Oppliger and Ralf Hauser and David Basin",
  title =        "{SSL\slash TLS} session-aware user authentication
                 revisited",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "3--4",
  pages =        "64--70",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000102",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Venter:2008:SVC,
  author =       "H. S. Venter and J. H. P. Eloff and Y. L. Li",
  title =        "Standardising vulnerability categories",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "3--4",
  pages =        "71--83",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000096",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Horng:2008:FID,
  author =       "Shi-Jinn Horng and Pingzhi Fan and Yao-Ping Chou and
                 Yen-Cheng Chang and Yi Pan",
  title =        "A feasible intrusion detector for recognizing {IIS}
                 attacks based on neural networks",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "3--4",
  pages =        "84--100",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000114",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mourad:2008:AOA,
  author =       "Azzam Mourad and Marc-Andr{\'e} Laverdi{\`e}re and
                 Mourad Debbabi",
  title =        "An aspect-oriented approach for the systematic
                 security hardening of code",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "3--4",
  pages =        "101--114",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000126",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tsai:2008:EMS,
  author =       "Jia-Lun Tsai",
  title =        "Efficient multi-server authentication scheme based on
                 one-way hash function without verification table",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "3--4",
  pages =        "115--121",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000084",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:IEBd,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "3--4",
  pages =        "ifc--ifc",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000515",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:PMJ,
  author =       "Anonymous",
  title =        "Pages 63--122 ({May--June 2008})",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "3--4",
  pages =        "??--??",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:ICg,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "iii--iii",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000746",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolthusen:2008:ECa,
  author =       "S. D. Wolthusen",
  title =        "From the {Editor-in-Chief}",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "123--123",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000709",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gerber:2008:ISRa,
  author =       "Mariana Gerber and Rossouw von Solms",
  title =        "Information security requirements --- Interpreting the
                 legal aspects",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "124--135",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000461",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzalis:2008:SOSa,
  author =       "Dimitris Gritzalis and Yannis Mallios",
  title =        "A {SIP}-oriented {SPIT} Management Framework",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "136--153",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000333",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lo:2008:SEEa,
  author =       "Johnny Li-Chang Lo and Judith Bishop and J. H. P.
                 Eloff",
  title =        "{SMSSec}: an end-to-end protocol for secure {SMS}",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "154--167",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000151",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Beghdad:2008:CSNa,
  author =       "Rachid Beghdad",
  title =        "Critical study of neural networks in detecting
                 intrusions",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "168--175",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000357",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Masri:2008:ABAa,
  author =       "Wes Masri and Andy Podgurski",
  title =        "Application-based anomaly intrusion detection with
                 dynamic information flow analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "176--187",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000369",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2008:BNAa,
  author =       "Shaojun Zhang and Jianhua Li and Xiuzhen Chen and Lei
                 Fan",
  title =        "Building network attack graph for alert causal
                 correlation",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "188--196",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000308",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Huffmire:2008:EMPa,
  author =       "Ted Huffmire and Timothy Sherwood and Ryan Kastner and
                 Timothy Levin",
  title =        "Enforcing memory policy specifications in
                 reconfigurable hardware",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "197--215",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000138",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chien:2008:PAUa,
  author =       "Hung-Yu Chien",
  title =        "Practical anonymous user authentication scheme with
                 security proof",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "216--223",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000291",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kritzinger:2008:ISMa,
  author =       "E. Kritzinger and E. Smith",
  title =        "Information security management: an information
                 security retrieval and awareness model for industry",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "224--231",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000321",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:IEBg,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "ifc--ifc",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000722",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:POa,
  author =       "Anonymous",
  title =        "Pages 123--232 ({October 2008})",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "??--??",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:ICh,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "iii--iii",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000746",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolthusen:2008:ECb,
  author =       "S. D. Wolthusen",
  title =        "From the {Editor-in-Chief}",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "123--123",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000709",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gerber:2008:ISRb,
  author =       "Mariana Gerber and Rossouw von Solms",
  title =        "Information security requirements --- Interpreting the
                 legal aspects",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "124--135",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000461",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzalis:2008:SOSb,
  author =       "Dimitris Gritzalis and Yannis Mallios",
  title =        "A {SIP}-oriented {SPIT} Management Framework",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "136--153",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000333",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lo:2008:SEEb,
  author =       "Johnny Li-Chang Lo and Judith Bishop and J. H. P.
                 Eloff",
  title =        "{SMSSec}: an end-to-end protocol for secure {SMS}",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "154--167",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000151",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Beghdad:2008:CSNb,
  author =       "Rachid Beghdad",
  title =        "Critical study of neural networks in detecting
                 intrusions",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "168--175",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000357",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Masri:2008:ABAb,
  author =       "Wes Masri and Andy Podgurski",
  title =        "Application-based anomaly intrusion detection with
                 dynamic information flow analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "176--187",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000369",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2008:BNAb,
  author =       "Shaojun Zhang and Jianhua Li and Xiuzhen Chen and Lei
                 Fan",
  title =        "Building network attack graph for alert causal
                 correlation",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "188--196",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000308",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Huffmire:2008:EMPb,
  author =       "Ted Huffmire and Timothy Sherwood and Ryan Kastner and
                 Timothy Levin",
  title =        "Enforcing memory policy specifications in
                 reconfigurable hardware",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "197--215",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000138",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chien:2008:PAUb,
  author =       "Hung-Yu Chien",
  title =        "Practical anonymous user authentication scheme with
                 security proof",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "216--223",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000291",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kritzinger:2008:ISMb,
  author =       "E. Kritzinger and E. Smith",
  title =        "Information security management: an information
                 security retrieval and awareness model for industry",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "224--231",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000321",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:IEBh,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "ifc--ifc",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000722",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:POb,
  author =       "Anonymous",
  title =        "Pages 123--232 ({October 2008})",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "??--??",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:ICi,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "iii--iii",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000746",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolthusen:2008:ECc,
  author =       "S. D. Wolthusen",
  title =        "From the {Editor-in-Chief}",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "123--123",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000709",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gerber:2008:ISRc,
  author =       "Mariana Gerber and Rossouw von Solms",
  title =        "Information security requirements --- Interpreting the
                 legal aspects",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "124--135",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000461",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzalis:2008:SOSc,
  author =       "Dimitris Gritzalis and Yannis Mallios",
  title =        "A {SIP}-oriented {SPIT} Management Framework",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "136--153",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000333",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lo:2008:SEEc,
  author =       "Johnny Li-Chang Lo and Judith Bishop and J. H. P.
                 Eloff",
  title =        "{SMSSec}: an end-to-end protocol for secure {SMS}",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "154--167",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000151",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Beghdad:2008:CSNc,
  author =       "Rachid Beghdad",
  title =        "Critical study of neural networks in detecting
                 intrusions",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "168--175",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000357",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Masri:2008:ABAc,
  author =       "Wes Masri and Andy Podgurski",
  title =        "Application-based anomaly intrusion detection with
                 dynamic information flow analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "176--187",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000369",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2008:BNAc,
  author =       "Shaojun Zhang and Jianhua Li and Xiuzhen Chen and Lei
                 Fan",
  title =        "Building network attack graph for alert causal
                 correlation",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "188--196",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000308",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Huffmire:2008:EMPc,
  author =       "Ted Huffmire and Timothy Sherwood and Ryan Kastner and
                 Timothy Levin",
  title =        "Enforcing memory policy specifications in
                 reconfigurable hardware",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "197--215",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000138",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chien:2008:PAUc,
  author =       "Hung-Yu Chien",
  title =        "Practical anonymous user authentication scheme with
                 security proof",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "216--223",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000291",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kritzinger:2008:ISMc,
  author =       "E. Kritzinger and E. Smith",
  title =        "Information security management: an information
                 security retrieval and awareness model for industry",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "224--231",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000321",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:IEBi,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "ifc--ifc",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000722",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:POc,
  author =       "Anonymous",
  title =        "Pages 123--232 ({October 2008})",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "5--6",
  pages =        "??--??",
  month =        oct,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:ICj,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "iii--iii",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001016",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolthusen:2008:Ee,
  author =       "S. D. Wolthusen",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "233--234",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000886",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Furnell:2008:SBBa,
  author =       "Steven Furnell and Valleria Tsaganidi and Andy
                 Phippen",
  title =        "Security beliefs and barriers for novice {Internet}
                 users",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "235--240",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000370",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rezgui:2008:ISAa,
  author =       "Yacine Rezgui and Adam Marks",
  title =        "Information security awareness in higher education: an
                 exploratory study",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "241--253",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000485",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kruger:2008:CRIa,
  author =       "H. A. Kruger and W. D. Kearney",
  title =        "Consensus ranking --- an {ICT} security awareness case
                 study",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "254--259",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000448",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palmer:2008:CEAa,
  author =       "Anthony J. Palmer",
  title =        "Criteria to evaluate Automated Personal Identification
                 Mechanisms",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "260--284",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480800045X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Geneiatakis:2008:OBPa,
  author =       "Dimitris Geneiatakis and Costas Lambrinoudakis and
                 Georgios Kambourakis",
  title =        "An ontology-based policy for deploying secure
                 {SIP}-based {VoIP} services",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "285--297",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000424",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stathopoulos:2008:SLMa,
  author =       "Vassilios Stathopoulos and Panayiotis Kotzanikolaou
                 and Emmanouil Magkos",
  title =        "Secure log management for privacy assurance in
                 electronic communications",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "298--308",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000400",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hernandez-Ardieta:2008:OFEa,
  author =       "Jorge L. Hernandez-Ardieta and Ana I. Gonzalez-Tablas
                 and Benjamin Ramos Alvarez",
  title =        "An optimistic fair exchange protocol based on
                 signature policies",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "309--322",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000436",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Baliga:2008:ACRa,
  author =       "Arati Baliga and Liviu Iftode and Xiaoxin Chen",
  title =        "Automated containment of rootkits attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "323--334",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000382",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Macia-Fernandez:2008:ELRa,
  author =       "Gabriel Maci{\'a}-Fern{\'a}ndez and Jes{\'u}s E.
                 D{\'\i}az-Verdejo and Pedro Garc{\'\i}a-Teodoro",
  title =        "Evaluation of a low-rate {DoS} attack against
                 application servers",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "335--354",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000394",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Piqueira:2008:DMCa,
  author =       "Jose R. C. Piqueira and Adolfo A. de Vasconcelos and
                 Carlos E. C. J. Gabriel and Vanessa O. Araujo",
  title =        "Dynamic models for computer viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "355--359",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000412",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:IEBj,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "ifc--ifc",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000990",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:PDa,
  author =       "Anonymous",
  title =        "Pages 233--360 ({December 2008})",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "??--??",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:ICk,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "iii--iii",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001016",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolthusen:2008:Ef,
  author =       "S. D. Wolthusen",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "233--234",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000886",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Furnell:2008:SBBb,
  author =       "Steven Furnell and Valleria Tsaganidi and Andy
                 Phippen",
  title =        "Security beliefs and barriers for novice {Internet}
                 users",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "235--240",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000370",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rezgui:2008:ISAb,
  author =       "Yacine Rezgui and Adam Marks",
  title =        "Information security awareness in higher education: an
                 exploratory study",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "241--253",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000485",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kruger:2008:CRIb,
  author =       "H. A. Kruger and W. D. Kearney",
  title =        "Consensus ranking --- an {ICT} security awareness case
                 study",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "254--259",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000448",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palmer:2008:CEAb,
  author =       "Anthony J. Palmer",
  title =        "Criteria to evaluate Automated Personal Identification
                 Mechanisms",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "260--284",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480800045X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Geneiatakis:2008:OBPb,
  author =       "Dimitris Geneiatakis and Costas Lambrinoudakis and
                 Georgios Kambourakis",
  title =        "An ontology-based policy for deploying secure
                 {SIP}-based {VoIP} services",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "285--297",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000424",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stathopoulos:2008:SLMb,
  author =       "Vassilios Stathopoulos and Panayiotis Kotzanikolaou
                 and Emmanouil Magkos",
  title =        "Secure log management for privacy assurance in
                 electronic communications",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "298--308",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000400",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hernandez-Ardieta:2008:OFEb,
  author =       "Jorge L. Hernandez-Ardieta and Ana I. Gonzalez-Tablas
                 and Benjamin Ramos Alvarez",
  title =        "An optimistic fair exchange protocol based on
                 signature policies",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "309--322",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000436",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Baliga:2008:ACRb,
  author =       "Arati Baliga and Liviu Iftode and Xiaoxin Chen",
  title =        "Automated containment of rootkits attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "323--334",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000382",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Macia-Fernandez:2008:ELRb,
  author =       "Gabriel Maci{\'a}-Fern{\'a}ndez and Jes{\'u}s E.
                 D{\'\i}az-Verdejo and Pedro Garc{\'\i}a-Teodoro",
  title =        "Evaluation of a low-rate {DoS} attack against
                 application servers",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "335--354",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000394",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Piqueira:2008:DMCb,
  author =       "Jose R. C. Piqueira and Adolfo A. de Vasconcelos and
                 Carlos E. C. J. Gabriel and Vanessa O. Araujo",
  title =        "Dynamic models for computer viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "355--359",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000412",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:IEBk,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "ifc--ifc",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000990",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:PDb,
  author =       "Anonymous",
  title =        "Pages 233--360 ({December 2008})",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "??--??",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:ICl,
  author =       "Anonymous",
  title =        "(iii) Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "iii--iii",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001016",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolthusen:2008:Eg,
  author =       "S. D. Wolthusen",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "233--234",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000886",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Furnell:2008:SBBc,
  author =       "Steven Furnell and Valleria Tsaganidi and Andy
                 Phippen",
  title =        "Security beliefs and barriers for novice {Internet}
                 users",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "235--240",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000370",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rezgui:2008:ISAc,
  author =       "Yacine Rezgui and Adam Marks",
  title =        "Information security awareness in higher education: an
                 exploratory study",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "241--253",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000485",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kruger:2008:CRIc,
  author =       "H. A. Kruger and W. D. Kearney",
  title =        "Consensus ranking --- an {ICT} security awareness case
                 study",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "254--259",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000448",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palmer:2008:CEAc,
  author =       "Anthony J. Palmer",
  title =        "Criteria to evaluate Automated Personal Identification
                 Mechanisms",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "260--284",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480800045X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Geneiatakis:2008:OBPc,
  author =       "Dimitris Geneiatakis and Costas Lambrinoudakis and
                 Georgios Kambourakis",
  title =        "An ontology-based policy for deploying secure
                 {SIP}-based {VoIP} services",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "285--297",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000424",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stathopoulos:2008:SLMc,
  author =       "Vassilios Stathopoulos and Panayiotis Kotzanikolaou
                 and Emmanouil Magkos",
  title =        "Secure log management for privacy assurance in
                 electronic communications",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "298--308",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000400",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hernandez-Ardieta:2008:OFEc,
  author =       "Jorge L. Hernandez-Ardieta and Ana I. Gonzalez-Tablas
                 and Benjamin Ramos Alvarez",
  title =        "An optimistic fair exchange protocol based on
                 signature policies",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "309--322",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000436",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Baliga:2008:ACRc,
  author =       "Arati Baliga and Liviu Iftode and Xiaoxin Chen",
  title =        "Automated containment of rootkits attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "323--334",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000382",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Macia-Fernandez:2008:ELRc,
  author =       "Gabriel Maci{\'a}-Fern{\'a}ndez and Jes{\'u}s E.
                 D{\'\i}az-Verdejo and Pedro Garc{\'\i}a-Teodoro",
  title =        "Evaluation of a low-rate {DoS} attack against
                 application servers",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "335--354",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000394",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Piqueira:2008:DMCc,
  author =       "Jose R. C. Piqueira and Adolfo A. de Vasconcelos and
                 Carlos E. C. J. Gabriel and Vanessa O. Araujo",
  title =        "Dynamic models for computer viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "355--359",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000412",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:IEBl,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "ifc--ifc",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000990",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2008:PDc,
  author =       "Anonymous",
  title =        "Pages 233--360 ({December 2008})",
  journal =      j-COMPUT-SECUR,
  volume =       "27",
  number =       "7--8",
  pages =        "??--??",
  month =        dec,
  year =         "2008",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:Ca,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "iii--iii",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001259",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:GA,
  author =       "Anonymous",
  title =        "Guide for Authors",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "V--VI",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001272",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolthusen:2009:E,
  author =       "S. D. Wolthusen",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "1--1",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480800120X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Obiedkov:2009:BAC,
  author =       "Sergei Obiedkov and Derrick G. Kourie and J. H. P.
                 Eloff",
  title =        "Building access control models with attribute
                 exploration",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "2--7",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000497",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Breaux:2009:DRM,
  author =       "Travis D. Breaux and Annie I. Ant{\'o}n and Eugene H.
                 Spafford",
  title =        "A distributed requirements management framework for
                 legal compliance and accountability",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "8--17",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000679",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Garcia-Teodoro:2009:ABN,
  author =       "P. Garc{\'\i}a-Teodoro and J. D{\'\i}az-Verdejo and G.
                 Maci{\'a}-Fern{\'a}ndez and E. V{\'a}zquez",
  title =        "Anomaly-based network intrusion detection: Techniques,
                 systems and challenges",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "18--28",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000692",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gu:2009:HBJ,
  author =       "Xiaozhuo Gu and Jianzu Yang and Julong Lan and
                 Zhenhuan Cao",
  title =        "{Huffman}-based join-exit-tree scheme for contributory
                 key management",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "29--39",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000680",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Torkestani:2009:RRF,
  author =       "Javad Akbari Torkestani and Mohammad Reza Meybodi",
  title =        "{RAID}-{RMS}: a fault tolerant stripped mirroring
                 {RAID} architecture for distributed systems",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "40--46",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000795",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Weir:2009:UPS,
  author =       "Catherine S. Weir and Gary Douglas and Martin
                 Carruthers and Mervyn Jack",
  title =        "User perceptions of security, convenience and
                 usability for ebanking authentication tokens",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "47--62",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000941",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Herzberg:2009:WJC,
  author =       "Amir Herzberg",
  title =        "Why {Johnny} can't surf (safely)? {Attacks} and
                 defenses for web users",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "63--71",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000916",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hongxin:2009:REM,
  author =       "Zhang Hongxin and Huang Yuewang and Wang Jianxin and
                 Lu Yinghua and Zhang Jinling",
  title =        "Recognition of electro-magnetic leakage information
                 from computer radiation with {SVM}",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "72--76",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480800093X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kumar:2009:SCU,
  author =       "K. Vimal Kumar",
  title =        "Securing communication using function extraction
                 technology for malicious code behavior analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "77--84",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000904",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hwang:2009:KDB,
  author =       "Seong-seob Hwang and Sungzoon Cho and Sunghoon Park",
  title =        "Keystroke dynamics-based authentication for mobile
                 devices",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "85--93",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000965",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ghaeb:2009:OMT,
  author =       "J. A. Ghaeb and J. Chebil",
  title =        "An oblique-matrix technique for data integrity
                 assurance",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "94--99",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000977",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lin:2009:DMG,
  author =       "Song Lin and Biao Wang and Zhoujun Li",
  title =        "Digital multisignature on the generalized conic curve
                 over {$ Z_n $}",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "100--104",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000801",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:IEBa,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "ifc--ifc",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001223",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:PFM,
  author =       "Anonymous",
  title =        "Pages 1--104 ({February-March} 2009)",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "1--2",
  pages =        "??--??",
  month =        feb # "\slash " # mar,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:Cb,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "3--4",
  pages =        "iii--iii",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000212",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Levi:2009:ULM,
  author =       "Albert Levi and Can Berk G{\"u}der",
  title =        "Understanding the limitations of {S/MIME} digital
                 signatures for e-mails: a {GUI} based approach",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "3--4",
  pages =        "105--120",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000783",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mitropoulos:2009:SLS,
  author =       "Dimitris Mitropoulos and Diomidis Spinellis",
  title =        "{SDriver}: Location-specific signatures prevent {SQL}
                 injection attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "3--4",
  pages =        "121--129",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000928",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Botha:2009:DME,
  author =       "Reinhardt A. Botha and Steven M. Furnell and Nathan L.
                 Clarke",
  title =        "From desktop to mobile: Examining the security
                 experience",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "3--4",
  pages =        "130--137",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001089",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2009:IBR,
  author =       "Jen-Ho Yang and Chin-Chen Chang",
  title =        "An {ID}-based remote mutual authentication with key
                 agreement scheme for mobile devices on elliptic curve
                 cryptosystem",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "3--4",
  pages =        "138--143",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001120",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kao:2009:DRA,
  author =       "Kuo-Fong Kao and I.-En Liao and Yueh-Chia Li",
  title =        "Detecting rogue access points using client-side
                 bottleneck bandwidth analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "3--4",
  pages =        "144--152",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001132",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sadoddin:2009:IFS,
  author =       "Reza Sadoddin and Ali A. Ghorbani",
  title =        "An incremental frequent structure mining framework for
                 real-time alert correlation",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "3--4",
  pages =        "153--173",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001144",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Basso:2009:PMA,
  author =       "Alessandro Basso and Stefano Sicco",
  title =        "Preventing massive automated access to web resources",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "3--4",
  pages =        "174--188",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001156",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dlamini:2009:ISM,
  author =       "M. T. Dlamini and J. H. P. Eloff and M. M. Eloff",
  title =        "Information security: the moving target",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "3--4",
  pages =        "189--198",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001168",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Omar:2009:RFD,
  author =       "Mawloud Omar and Yacine Challal and Abdelmadjid
                 Bouabdallah",
  title =        "Reliable and fully distributed trust model for mobile
                 ad hoc networks",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "3--4",
  pages =        "199--214",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480800117X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liginlal:2009:HSH,
  author =       "Divakaran Liginlal and Inkook Sim and Lara Khansa",
  title =        "How significant is human error as a cause of privacy
                 breaches? {An} empirical study and a framework for
                 error management",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "3--4",
  pages =        "215--228",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001181",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Deepthi:2009:DIA,
  author =       "P. P. Deepthi and P. S. Sathidevi",
  title =        "Design, implementation and analysis of hardware
                 efficient stream ciphers using {LFSR} based hash
                 functions",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "3--4",
  pages =        "229--241",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001193",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:ISA,
  author =       "Anonymous",
  title =        "{IFIP SEC} 2009 Advert",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "3--4",
  pages =        "246--246",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480900025X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:IEBb,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "3--4",
  pages =        "ifc--ifc",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000182",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:PMJ,
  author =       "Anonymous",
  title =        "Pages 105--246 ({May-June} 2009)",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "3--4",
  pages =        "??--??",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:Cc,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "5",
  pages =        "iii--iii",
  month =        jul,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000340",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzalis:2009:Ea,
  author =       "Dimitris Gritzalis and Sokratis Katsikas",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "5",
  pages =        "247--247",
  month =        jul,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000388",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gerdes:2009:MDC,
  author =       "John H. Gerdes and Joakim Kalvenes and Chin-Tser
                 Huang",
  title =        "Multi-dimensional credentialing using veiled
                 certificates: Protecting privacy in the face of
                 regulatory reporting requirements",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "5",
  pages =        "248--259",
  month =        jul,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001387",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2009:TSD,
  author =       "Qi Li and Xinwen Zhang and Mingwei Xu and Jianping
                 Wu",
  title =        "Towards secure dynamic collaborations with group-based
                 {RBAC} model",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "5",
  pages =        "260--275",
  month =        jul,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001375",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Choi:2009:FDV,
  author =       "Hyunsang Choi and Heejo Lee and Hyogon Kim",
  title =        "Fast detection and visualization of network attacks on
                 parallel coordinates",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "5",
  pages =        "276--288",
  month =        jul,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001363",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carbonell:2009:SMP,
  author =       "Mildrey Carbonell and Jos{\'e} Mar{\'\i}a Sierra and
                 Javier Lopez",
  title =        "Secure multiparty payment with an intermediary
                 entity",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "5",
  pages =        "289--300",
  month =        jul,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808001351",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Su:2009:RTN,
  author =       "Ming-Yang Su and Gwo-Jong Yu and Chun-Yuen Lin",
  title =        "A real-time network intrusion detection system for
                 large-scale attacks based on an incremental mining
                 approach",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "5",
  pages =        "301--309",
  month =        jul,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480800134X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shaikh:2009:SAU,
  author =       "Siraj A. Shaikh and Vicky J. Bush and Steve A.
                 Schneider",
  title =        "Specifying authentication using signal events in
                 {CSP}",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "5",
  pages =        "310--324",
  month =        jul,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404808000953",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:IEBc,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "5",
  pages =        "ifc--ifc",
  month =        jul,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000315",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:PJ,
  author =       "Anonymous",
  title =        "Pages 247--324 ({July 2009})",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "5",
  pages =        "??--??",
  month =        jul,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:ITAa,
  author =       "Anonymous",
  title =        "{IFIP TC11} --- Aims and Scope",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "6",
  pages =        "i--i",
  month =        sep,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000686",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:ITCa,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "6",
  pages =        "ii--v",
  month =        sep,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000650",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:Cd,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "6",
  pages =        "iii--iii",
  month =        sep,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000649",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzalis:2009:Eb,
  author =       "Dimitris Gritzalis and Javier Lopez",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "6",
  pages =        "325--326",
  month =        sep,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000431",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bhatt:2009:PMD,
  author =       "Siddharth Bhatt and Radu Sion and Bogdan Carbunar",
  title =        "A personal mobile {DRM} manager for smartphones",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "6",
  pages =        "327--340",
  month =        sep,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000121",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mourad:2009:NAO,
  author =       "Azzam Mourad and Andrei Soeanu and Marc-Andr{\'e}
                 Laverdi{\`e}re and Mourad Debbabi",
  title =        "New aspect-oriented constructs for security hardening
                 concerns",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "6",
  pages =        "341--358",
  month =        sep,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480900011X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sadok:2009:RRI,
  author =       "Djamel H. Sadok and Eduardo Souto and Eduardo Feitosa
                 and Judith Kelner and Lars Westberg",
  title =        "{RIP} --- a robust {IP} access architecture",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "6",
  pages =        "359--380",
  month =        sep,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000108",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Edge:2009:SSB,
  author =       "Michael Edward Edge and Pedro R. Falcone Sampaio",
  title =        "A survey of signature based methods for financial
                 fraud detection",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "6",
  pages =        "381--394",
  month =        sep,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000091",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kamel:2009:RSW,
  author =       "Ibrahim Kamel and Qutaiba Albluwi",
  title =        "A robust software watermarking for copyright
                 protection",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "6",
  pages =        "395--409",
  month =        sep,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480900008X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mannan:2009:RTF,
  author =       "Mohammad Mannan and P. C. van Oorschot",
  title =        "Reducing threats from flawed security {APIs}: the
                 banking {PIN} case",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "6",
  pages =        "410--420",
  month =        sep,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000078",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Son:2009:FFR,
  author =       "Joon Son and Jim Alves-Foss",
  title =        "A formal framework for real-time information flow
                 analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "6",
  pages =        "421--432",
  month =        sep,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000066",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palmieri:2009:PTE,
  author =       "Francesco Palmieri and Ugo Fiore",
  title =        "Providing true end-to-end security in converged voice
                 over {IP} infrastructures",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "6",
  pages =        "433--449",
  month =        sep,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000054",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Basagiannis:2009:PMC,
  author =       "Stylianos Basagiannis and Panagiotis Katsaros and
                 Andrew Pombortsis and Nikolaos Alexiou",
  title =        "Probabilistic model checking for the quantification of
                 {DoS} security threats",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "6",
  pages =        "450--465",
  month =        sep,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000042",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2009:BLI,
  author =       "Yang Li and Jun-Li Wang and Zhi-Hong Tian and Tian-Bo
                 Lu and Chen Young",
  title =        "Building lightweight intrusion detection system using
                 wrapper-based feature selection mechanisms",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "6",
  pages =        "466--475",
  month =        sep,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000030",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Albrechtsen:2009:ISD,
  author =       "Eirik Albrechtsen and Jan Hovden",
  title =        "The information security digital divide between
                 information security managers and users",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "6",
  pages =        "476--490",
  month =        sep,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000029",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:IEBd,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "6",
  pages =        "ifc--ifc",
  month =        sep,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000613",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:PS,
  author =       "Anonymous",
  title =        "Pages 325--490 ({September 2009})",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "6",
  pages =        "??--??",
  month =        sep,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:Ce,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "iii--iii",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000972",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzalis:2009:Ec,
  author =       "Dimitris Gritzalis and Steven Furnell",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "491--492",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480900087X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Knapp:2009:ISP,
  author =       "Kenneth J. Knapp and R. Franklin Morris and Thomas E.
                 Marshall and Terry Anthony Byrd",
  title =        "Information security policy: an organizational-level
                 process model",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "493--508",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000765",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kraemer:2009:HOF,
  author =       "Sara Kraemer and Pascale Carayon and John Clem",
  title =        "Human and organizational factors in computer and
                 information security: Pathways to vulnerabilities",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "509--520",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000467",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chivers:2009:RPD,
  author =       "Howard Chivers and John A. Clark and Pau-Chen Cheng",
  title =        "Risk profiles and distributed risk assessment",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "521--535",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000455",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Padayachee:2009:AUC,
  author =       "Keshnee Padayachee and J. H. P. Eloff",
  title =        "Adapting usage control as a deterrent to address the
                 inadequacies of access controls",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "536--544",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000157",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Marmol:2009:STS,
  author =       "F{\'e}lix G{\'o}mez M{\'a}rmol and Gregorio
                 Mart{\'\i}nez P{\'e}rez",
  title =        "Security threats scenarios in trust and reputation
                 models for distributed systems",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "545--556",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000534",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lu:2009:DHE,
  author =       "Hongwei Lu and Bailing Liu",
  title =        "{DFANS}: a highly efficient strategy for automated
                 trust negotiation",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "557--565",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000169",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dragoni:2009:WHA,
  author =       "N. Dragoni and F. Massacci and T. Walter and C.
                 Schaefer",
  title =        "What the heck is this application doing? --- a
                 security-by-contract architecture for pervasive
                 services",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "566--577",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000716",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Geneiatakis:2009:UBF,
  author =       "Dimitris Geneiatakis and Nikos Vrakas and Costas
                 Lambrinoudakis",
  title =        "Utilizing bloom filters for detecting flooding attacks
                 against {SIP} based services",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "578--591",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000443",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kirda:2009:CSC,
  author =       "Engin Kirda and Nenad Jovanovic and Christopher
                 Kruegel and Giovanni Vigna",
  title =        "Client-side cross-site scripting protection",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "592--604",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000479",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2009:MIE,
  author =       "Zonghua Zhang and Pin-Han Ho and Liwen He",
  title =        "Measuring {IDS}-estimated attack impacts for rational
                 incident response: a decision theoretic approach",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "605--614",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000273",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancke:2009:CST,
  author =       "G. P. Hancke and K. E. Mayes and K. Markantonakis",
  title =        "Confidence in smart token proximity: Relay attacks
                 revisited",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "615--627",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000595",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2009:DPW,
  author =       "Fangwei Wang and Yunkai Zhang and Jianfeng Ma",
  title =        "Defending passive worms in unstructured {P2P} networks
                 based on healthy file dissemination",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "628--636",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000741",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Coull:2009:DIC,
  author =       "Scott E. Coull and Boleslaw K. Szymanski",
  title =        "On the development of an internetwork-centric defense
                 for scanning worms",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "637--647",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000777",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kondakci:2009:CCA,
  author =       "Suleyman Kondakci",
  title =        "A concise cost analysis of {Internet} malware",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "648--659",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000133",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bloom:2009:PSE,
  author =       "Gedare Bloom and Bhagirath Narahari and Rahul Simha
                 and Joseph Zambreno",
  title =        "Providing secure execution environments with a last
                 line of defense against {Trojan} circuit attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "660--669",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000145",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cetin:2009:NSA,
  author =       "Ozdemir Cetin and A. Turan Ozcerit",
  title =        "A new steganography algorithm based on color
                 histograms for data embedding into raw video streams",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "670--682",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480900042X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Geetha:2009:BIS,
  author =       "S. Geetha and Siva S. Sivatha Sindhu and N. Kamaraj",
  title =        "Blind image steganalysis based on content independent
                 statistical measures maximizing the specificity and
                 sensitivity of the system",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "683--697",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000285",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kamel:2009:SPI,
  author =       "Ibrahim Kamel",
  title =        "A schema for protecting the integrity of databases",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "698--709",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000297",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Samet:2009:DIH,
  author =       "Refik Samet",
  title =        "Design and implementation of highly reliable
                 dual-computer systems",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "710--722",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000418",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:ITAb,
  author =       "Anonymous",
  title =        "{IFIP TC11} --- Aims and Scope",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "723--723",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001023",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:ITCb,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "724--727",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000984",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:CPa,
  author =       "Anonymous",
  title =        "Call For Papers",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "728--728",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001035",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:IEBe,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "ifc--ifc",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000947",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:PO,
  author =       "Anonymous",
  title =        "Pages 491--728 ({October 2009})",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "7",
  pages =        "??--??",
  month =        oct,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:Cf,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "iii--iii",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001187",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzalis:2009:Ed,
  author =       "Dimitris Gritzalis and Tom Karygiannis",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "729--730",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001114",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Herzberg:2009:DBE,
  author =       "Amir Herzberg",
  title =        "{DNS}-based email sender authentication mechanisms: a
                 critical review",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "731--742",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000492",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dantu:2009:ICS,
  author =       "Ram Dantu and Sonia Fahmy and Henning Schulzrinne and
                 Jo{\~a}o Cangussu",
  title =        "Issues and challenges in securing {VoIP}",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "743--753",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000480",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pudar:2009:PPM,
  author =       "Srdjan Pudar and G. Manimaran and Chen-Ching Liu",
  title =        "{PENET}: a practical method and tool for integrated
                 modeling of security attacks and countermeasures",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "754--771",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000522",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Munoz-Gea:2009:PDE,
  author =       "Juan Pedro Mu{\~n}oz-Gea and Josemaria
                 Malgosa-Sanahuja and Pilar Manzanares-Lopez and Juan
                 Carlos Sanchez-Aarnoutse and Joan Garcia-Haro",
  title =        "Proposal, design and evaluation of a mechanism to
                 limit the length of anonymous overlay network paths",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "772--784",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000509",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yao:2009:STC,
  author =       "Lihong Yao and Xiaochao Zi and Li Pan and Jianhua Li",
  title =        "A study of on\slash off timing channel based on packet
                 delay distribution",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "785--794",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000510",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lee:2009:CWR,
  author =       "Junsup Lee and Sungdeok Cha and Dongkun Lee and
                 Hyungkyu Lee",
  title =        "Classification of web robots: an empirical study based
                 on over one billion requests",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "795--802",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000546",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Huang:2009:OSW,
  author =       "Y. L. Huang and P. H. Lu and J. D. Tygar and A. D.
                 Joseph",
  title =        "{OSNP}: Secure wireless authentication protocol using
                 one-time key",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "803--815",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000558",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rhee:2009:SEI,
  author =       "Hyeun-Suk Rhee and Cheongtag Kim and Young U. Ryu",
  title =        "Self-efficacy in information security: Its influence
                 on end users' information security practice behavior",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "816--826",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480900056X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tang:2009:UBA,
  author =       "Yong Tang and Bin Xiao and Xicheng Lu",
  title =        "Using a bioinformatics approach to generate accurate
                 exploit-based signatures for polymorphic worms",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "827--842",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000583",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gonzalez:2009:ROS,
  author =       "Jorge Fontenla Gonz{\'a}lez and Manuel Caeiro
                 Rodr{\'\i}guez and Mart{\'\i}n Llamas Nistal and Luis
                 Anido Rif{\'o}n",
  title =        "Reverse {OAuth}: a solution to achieve delegated
                 authorizations in single sign-on e-learning systems",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "843--856",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000571",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:ITAc,
  author =       "Anonymous",
  title =        "{IFIP TCII} --- Aims and Scope",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "857--857",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001229",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:ITCc,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "858--861",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001199",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:CPb,
  author =       "Anonymous",
  title =        "Call for Papers",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "862--863",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001230",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:IEBf,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "ifc--ifc",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001151",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2009:PN,
  author =       "Anonymous",
  title =        "Pages 729--864 ({November 2009})",
  journal =      j-COMPUT-SECUR,
  volume =       "28",
  number =       "8",
  pages =        "??--??",
  month =        nov,
  year =         "2009",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2000.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}