1

Approaches to handling “Trojan Horse” threats

Year:
1986
Language:
english
File:
PDF, 614 KB
english, 1986
2

Protecting statistical databases against retrieval of private information

Year:
1988
Language:
english
File:
PDF, 365 KB
english, 1988
3

Verifying the authentication of an information system user

Year:
1987
Language:
english
File:
PDF, 627 KB
english, 1987
4

Processing encrypted data

Year:
1987
Language:
english
File:
PDF, 2.53 MB
english, 1987