Computer

Issue 2 • Feb. 1983

Filter Results

Displaying Results 1 - 25 of 30
  • [Front cover]

    Publication Year: 1983, Page(s):c1 - c2
    Request permission for commercial reuse | PDF file iconPDF (1522 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 1983, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (914 KB)
    Freely Available from IEEE
  • [IEEE Computer - Magazine's Staff]

    Publication Year: 1983, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (363 KB)
    Freely Available from IEEE
  • Advertisement

    Publication Year: 1983, Page(s):4 - nil1
    Request permission for commercial reuse | PDF file iconPDF (11832 KB)
    Freely Available from IEEE
  • Special Message

    Publication Year: 1983, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (1120 KB)
    Freely Available from IEEE
  • IEEE Computer Society Members Elected to Fellow Grade

    Publication Year: 1983, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (1111 KB)
    Freely Available from IEEE
  • Data Security in Computer Networks: Guest Editor's Introduction

    Publication Year: 1983, Page(s):8 - 10
    Cited by:  Papers (3)
    Request permission for commercial reuse | PDF file iconPDF (3311 KB)
    Freely Available from IEEE
  • Digital signatures: A tutorial survey

    Publication Year: 1983, Page(s):15 - 24
    Cited by:  Papers (9)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2246 KB)

    As paper gives way to electronic mail, a secure means for validating and authenticating messages is required. The answer could be one of several digital signature schemes. In the last few years, research in cryptography has provided various methods for generating digital signatures, both true and arbitrated. Some of these methods utilize conventional private-key cryptosystems such as the Data Encr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • International Conference on Computer Design VLSI in Computers

    Publication Year: 1983, Page(s): 25
    Request permission for commercial reuse | PDF file iconPDF (989 KB)
    Freely Available from IEEE
  • Protecting Public Keys and Signature Keys

    Publication Year: 1983, Page(s):27 - 35
    Cited by:  Papers (10)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8336 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preliminary Program and Announcement

    Publication Year: 1983, Page(s):36 - 37
    Request permission for commercial reuse | PDF file iconPDF (194 KB)
    Freely Available from IEEE
  • Protocols for Data Security

    Publication Year: 1983, Page(s):39 - 51
    Cited by:  Papers (18)  |  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (10156 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial Week Europe 83: IEEE Tutorials on Computers in Industry

    Publication Year: 1983, Page(s):52 - 53
    Request permission for commercial reuse | PDF file iconPDF (1562 KB)
    Freely Available from IEEE
  • Compsac 83

    Publication Year: 1983, Page(s): 54
    Request permission for commercial reuse | PDF file iconPDF (1061 KB)
    Freely Available from IEEE
  • Applying the RSA Digital Signature to Electronic Mail

    Publication Year: 1983, Page(s):55 - 62
    Cited by:  Papers (7)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6151 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expert computer systems

    Publication Year: 1983, Page(s):63 - 85
    Cited by:  Papers (89)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5861 KB)

    Ordinary computer programs organize knowledge on two levels: data and program. Most expert computer systems, however, organize knowledge on three levels: data, knowledge base, and control. Computers organized in this way are often called knowledge-based svstems. On the data level is declarative knowledge about the particular problem being solved and the current state of affairs in the attempt to s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Open Channel

    Publication Year: 1983, Page(s):86 - 87
    Request permission for commercial reuse | PDF file iconPDF (354 KB)
    Freely Available from IEEE
  • New products

    Publication Year: 1983, Page(s):88 - 93
    Request permission for commercial reuse | PDF file iconPDF (6972 KB)
    Freely Available from IEEE
  • New Literature

    Publication Year: 1983, Page(s): 93
    Request permission for commercial reuse | PDF file iconPDF (1147 KB)
    Freely Available from IEEE
  • Recent IC announcements

    Publication Year: 1983, Page(s): 94
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Recent Microsystem Announcements

    Publication Year: 1983, Page(s): 95
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • New Applications & Recent Research

    Publication Year: 1983, Page(s): 96
    Request permission for commercial reuse | PDF file iconPDF (195 KB)
    Freely Available from IEEE
  • IEEE Infocom 83: Second Annual Joint Conference

    Publication Year: 1983, Page(s):96a - 96f
    Request permission for commercial reuse | PDF file iconPDF (4936 KB)
    Freely Available from IEEE
  • Update: information for the computer systems design professional

    Publication Year: 1983, Page(s):97 - 102
    Request permission for commercial reuse | PDF file iconPDF (3726 KB)
    Freely Available from IEEE
  • 1983 International Conference on Parallel Processing August 23-26, 1983

    Publication Year: 1983, Page(s): 101
    Request permission for commercial reuse | PDF file iconPDF (150 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org