nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Advanced smart card based password authentication protocol
|
Song, Ronggong |
|
2010 |
32 |
5-6 |
p. 321-325 5 p. |
artikel |
2 |
A dynamic privacy model for web services
|
Meziane, Hassina |
|
2010 |
32 |
5-6 |
p. 288-304 17 p. |
artikel |
3 |
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
|
Hu, Jiankun |
|
2010 |
32 |
5-6 |
p. 274-280 7 p. |
artikel |
4 |
Analysis of Handover Key Management schemes under IETF perspective
|
Marin-Lopez, R. |
|
2010 |
32 |
5-6 |
p. 266-273 8 p. |
artikel |
5 |
A proposal for automating investigations in live forensics
|
Lee, Seokhee |
|
2010 |
32 |
5-6 |
p. 246-255 10 p. |
artikel |
6 |
A security framework for a workflow-based grid development platform
|
Vivas, José L. |
|
2010 |
32 |
5-6 |
p. 230-245 16 p. |
artikel |
7 |
Editorial Board
|
|
|
2010 |
32 |
5-6 |
p. iii- 1 p. |
artikel |
8 |
Information and communications security, privacy and trust: Standards and regulations
|
Thuraisingham, Bhavani |
|
2010 |
32 |
5-6 |
p. 229- 1 p. |
artikel |
9 |
Proposed corrections to the IEC 61131-3 standard
|
de Sousa, Mário |
|
2010 |
32 |
5-6 |
p. 312-320 9 p. |
artikel |
10 |
Removal notice to “The Software Engineering Model's categories of compliance” [CSI 31/1 (2009) 14–18]
|
Kaushik, Sharat |
|
2010 |
32 |
5-6 |
p. 326- 1 p. |
artikel |
11 |
Revising centralized certificate validation standards for mobile and wireless communications
|
Papapanagiotou, K. |
|
2010 |
32 |
5-6 |
p. 281-287 7 p. |
artikel |
12 |
Security approaches in e-cognocracy
|
Salazar, José Luis |
|
2010 |
32 |
5-6 |
p. 256-265 10 p. |
artikel |
13 |
Towards trustworthy e-voting using paper receipts
|
Lee, Yunho |
|
2010 |
32 |
5-6 |
p. 305-311 7 p. |
artikel |