nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Author biographies
|
|
|
1994 |
17 |
7 |
p. 554-556 3 p. |
artikel |
2 |
Editorial
|
Muftic, Sead |
|
1994 |
17 |
7 |
p. 451-452 2 p. |
artikel |
3 |
Generic interface to security services
|
Linn, John |
|
1994 |
17 |
7 |
p. 483-491 9 p. |
artikel |
4 |
Long awaited text on interconnection
|
Merabti, Madjid |
|
1994 |
17 |
7 |
p. 558- 1 p. |
artikel |
5 |
Modern key agreement techniques
|
Rueppel, Rainer A |
|
1994 |
17 |
7 |
p. 458-465 8 p. |
artikel |
6 |
Piloting authentication and security services in the ‘PASSWORD’ project
|
Kirstein, Peter T |
|
1994 |
17 |
7 |
p. 519-531 13 p. |
artikel |
7 |
SAMSON: Management of security in open systems
|
Lechner, Stephan |
|
1994 |
17 |
7 |
p. 538-543 6 p. |
artikel |
8 |
Security architecture for distributed systems
|
Muftic, Sead |
|
1994 |
17 |
7 |
p. 492-500 9 p. |
artikel |
9 |
Security in EDIFACT systems
|
Dosdale, Terry |
|
1994 |
17 |
7 |
p. 532-537 6 p. |
artikel |
10 |
Security management for OSI networks
|
Patel, Ahmed |
|
1994 |
17 |
7 |
p. 544-553 10 p. |
artikel |
11 |
Security protection for parts of a data structure
|
Kaijser, Per |
|
1994 |
17 |
7 |
p. 476-482 7 p. |
artikel |
12 |
SESAME: The solution to security for open distributed systems
|
Kaijser, Per |
|
1994 |
17 |
7 |
p. 501-518 18 p. |
artikel |
13 |
TESS: A security system based on discrete exponentiation
|
Beth, Thomas |
|
1994 |
17 |
7 |
p. 466-475 10 p. |
artikel |
14 |
The US key escrow encryption technology
|
Denning, Dorothy E |
|
1994 |
17 |
7 |
p. 453-457 5 p. |
artikel |
15 |
Wide survey of security techniques
|
Peyravian, Mohammed |
|
1994 |
17 |
7 |
p. 557-558 2 p. |
artikel |