nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A distributed requirements management framework for legal compliance and accountability
|
Breaux, Travis D. |
|
2009 |
|
1-2 |
p. 8-17 10 p. |
artikel |
2 |
A global security architecture for intrusion detection on computer networks
|
Karim Ganame, Abdoul |
|
2008 |
|
1-2 |
p. 30-47 18 p. |
artikel |
3 |
An oblique-matrix technique for data integrity assurance
|
Ghaeb, J.A. |
|
2009 |
|
1-2 |
p. 94-99 6 p. |
artikel |
4 |
Anomaly-based network intrusion detection: Techniques, systems and challenges
|
GarcĂa-Teodoro, P. |
|
2009 |
|
1-2 |
p. 18-28 11 p. |
artikel |
5 |
Building access control models with attribute exploration
|
Obiedkov, Sergei |
|
2009 |
|
1-2 |
p. 2-7 6 p. |
artikel |
6 |
Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies
|
Palmieri, Francesco |
|
2008 |
|
1-2 |
p. 48-62 15 p. |
artikel |
7 |
Contents
|
|
|
2009 |
|
1-2 |
p. iii- 1 p. |
artikel |
8 |
Cryptanalysis of simple three-party key exchange protocol
|
Guo, Hua |
|
2008 |
|
1-2 |
p. 16-21 6 p. |
artikel |
9 |
Digital multisignature on the generalized conic curve over Zn
|
Lin, Song |
|
2009 |
|
1-2 |
p. 100-104 5 p. |
artikel |
10 |
Editorial
|
Wolthusen, S.D. |
|
2008 |
|
1-2 |
p. 1- 1 p. |
artikel |
11 |
Editorial
|
Wolthusen, S.D. |
|
2009 |
|
1-2 |
p. 1- 1 p. |
artikel |
12 |
Efficient identity-based RSA multisignatures
|
Harn, Lein |
|
2008 |
|
1-2 |
p. 12-15 4 p. |
artikel |
13 |
Enterprise information security strategies
|
Anderson, Evan E. |
|
2008 |
|
1-2 |
p. 22-29 8 p. |
artikel |
14 |
Guide for Authors.
|
|
|
2009 |
|
1-2 |
p. V-VI nvt p. |
artikel |
15 |
Huffman-based join-exit-tree scheme for contributory key management
|
Gu, Xiaozhuo |
|
2009 |
|
1-2 |
p. 29-39 11 p. |
artikel |
16 |
IFC - Editorial Board
|
|
|
2009 |
|
1-2 |
p. IFC- 1 p. |
artikel |
17 |
IFC - Editorial Board
|
|
|
2008 |
|
1-2 |
p. IFC- 1 p. |
artikel |
18 |
(iii) Contents
|
|
|
2008 |
|
1-2 |
p. iii- 1 p. |
artikel |
19 |
Improvement of keystroke data quality through artificial rhythms and cues
|
Kang, Pilsung |
|
2008 |
|
1-2 |
p. 3-11 9 p. |
artikel |
20 |
Keystroke dynamics-based authentication for mobile devices
|
Hwang, Seong-seob |
|
2009 |
|
1-2 |
p. 85-93 9 p. |
artikel |
21 |
RAID-RMS: A fault tolerant stripped mirroring RAID architecture for distributed systems
|
Akbari Torkestani, Javad |
|
2009 |
|
1-2 |
p. 40-46 7 p. |
artikel |
22 |
Recognition of electro-magnetic leakage information from computer radiation with SVM
|
Hongxin, Zhang |
|
2009 |
|
1-2 |
p. 72-76 5 p. |
artikel |
23 |
Securing communication using function extraction technology for malicious code behavior analysis
|
Kumar, K. Vimal |
|
2009 |
|
1-2 |
p. 77-84 8 p. |
artikel |
24 |
User perceptions of security, convenience and usability for ebanking authentication tokens
|
Weir, Catherine S. |
|
2009 |
|
1-2 |
p. 47-62 16 p. |
artikel |
25 |
Why Johnny can't surf (safely)? Attacks and defenses for web users
|
Herzberg, Amir |
|
2009 |
|
1-2 |
p. 63-71 9 p. |
artikel |