Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             13 results found
no title author magazine year volume issue page(s) type
1 Advanced smart card based password authentication protocol Song, Ronggong
2010
32 5-6 p. 321-325
5 p.
article
2 A dynamic privacy model for web services Meziane, Hassina
2010
32 5-6 p. 288-304
17 p.
article
3 A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations Hu, Jiankun
2010
32 5-6 p. 274-280
7 p.
article
4 Analysis of Handover Key Management schemes under IETF perspective Marin-Lopez, R.
2010
32 5-6 p. 266-273
8 p.
article
5 A proposal for automating investigations in live forensics Lee, Seokhee
2010
32 5-6 p. 246-255
10 p.
article
6 A security framework for a workflow-based grid development platform Vivas, José L.
2010
32 5-6 p. 230-245
16 p.
article
7 Editorial Board 2010
32 5-6 p. iii-
1 p.
article
8 Information and communications security, privacy and trust: Standards and regulations Thuraisingham, Bhavani
2010
32 5-6 p. 229-
1 p.
article
9 Proposed corrections to the IEC 61131-3 standard de Sousa, Mário
2010
32 5-6 p. 312-320
9 p.
article
10 Removal notice to “The Software Engineering Model's categories of compliance” [CSI 31/1 (2009) 14–18] Kaushik, Sharat
2010
32 5-6 p. 326-
1 p.
article
11 Revising centralized certificate validation standards for mobile and wireless communications Papapanagiotou, K.
2010
32 5-6 p. 281-287
7 p.
article
12 Security approaches in e-cognocracy Salazar, José Luis
2010
32 5-6 p. 256-265
10 p.
article
13 Towards trustworthy e-voting using paper receipts Lee, Yunho
2010
32 5-6 p. 305-311
7 p.
article
                             13 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands