nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A brief history of cryptography
|
Davies, Donald |
|
1997 |
|
2 |
p. 14-17 4 p. |
artikel |
2 |
A comprehensive approach to digital incident investigation
|
|
|
2003 |
|
2 |
p. 42-54 13 p. |
artikel |
3 |
A cryptographic tour of the IPsec standards
|
Paterson, Kenneth G. |
|
2006 |
|
2 |
p. 72-81 |
artikel |
4 |
Addressing the data problem
|
|
|
2003 |
|
2 |
p. 18-31 14 p. |
artikel |
5 |
AEGIS: A single-chip secure processor
|
Suh, G. Edward |
|
2005 |
|
2 |
p. 63-73 11 p. |
artikel |
6 |
An Advanced Trusted Platform for mobile phone devices
|
Covey, Carlin |
|
2005 |
|
2 |
p. 96-104 9 p. |
artikel |
7 |
An overview of RFID tags and new cryptographic developments
|
Robshaw, Matthew J.B. |
|
2006 |
|
2 |
p. 82-88 |
artikel |
8 |
Attacking smart card systems: Theory and practice
|
Markantonakis, Konstantinos |
|
2009 |
|
2 |
p. 46-56 |
artikel |
9 |
Authentication using cryptography
|
Mitchell, Chris |
|
1997 |
|
2 |
p. 25-32 8 p. |
artikel |
10 |
Benchmarking for Critical Infrastructure Protection
|
Todd, Mike |
|
2002 |
|
2 |
p. 37-49 13 p. |
artikel |
11 |
Bucket attack on numeric set watermarking model and safeguards
|
Gupta, Gaurav |
|
2011 |
|
2 |
p. 59-66 |
artikel |
12 |
Building secure business applications at Microsoft
|
Steer, John |
|
2008 |
|
2 |
p. 105-110 |
artikel |
13 |
“Building secure business applications at Microsoft” by J. Steer and A. Popli
|
|
|
2008 |
|
2 |
p. 104 |
artikel |
14 |
Business issues relating to malware
|
Fothergill, Shaun |
|
2004 |
|
2 |
p. 65-75 11 p. |
artikel |
15 |
Can CLI be trusted?
|
Clayton, Richard |
|
2007 |
|
2 |
p. 74-79 |
artikel |
16 |
Compatibility, competition, and control in trusted computing environments
|
Schoen, Seth |
|
2005 |
|
2 |
p. 105-119 15 p. |
artikel |
17 |
Computer forensics: past, present and future
|
|
|
2003 |
|
2 |
p. 32-36 5 p. |
artikel |
18 |
Convergence
|
Jones, Andrew |
|
2007 |
|
2 |
p. 69-73 |
artikel |
19 |
Cryptographic security in the internet protocol suite: Practice and proposals
|
Zaba, Stefek |
|
1997 |
|
2 |
p. 54-73 20 p. |
artikel |
20 |
Cryptography and trust
|
Walton, Richard |
|
2006 |
|
2 |
p. 68-71 |
artikel |
21 |
Database Security in a Web Environment
|
Lothian, Paul |
|
2001 |
|
2 |
p. 12-20 9 p. |
artikel |
22 |
Database Security: Retrospective and Way Forward
|
Wiseman, Simon |
|
2001 |
|
2 |
p. 30-43 14 p. |
artikel |
23 |
Data protection and Electronic Commerce
|
Aldhouse, Francis |
|
1998 |
|
2 |
p. 71-81 11 p. |
artikel |
24 |
Deconstructing malware: what it is and how to stop it
|
Williamson, David |
|
2004 |
|
2 |
p. 27-34 8 p. |
artikel |
25 |
Deploying public key infrastructures
|
Khan, Liaquat |
|
1998 |
|
2 |
p. 18-33 16 p. |
artikel |
26 |
Digital forensics and the issues of identity
|
Jones, Andy |
|
2010 |
|
2 |
p. 67-71 |
artikel |
27 |
EDI security
|
Dosdale, T. |
|
1998 |
|
2 |
p. 98-110 13 p. |
artikel |
28 |
Electronic passports – from secure specifications to secure implementations
|
Liersch, Ingo |
|
2009 |
|
2 |
p. 96-100 |
artikel |
29 |
Elliptic curve cryptosystem — The answer to strong, fast public-key cryptography for securing constrained environments
|
Vanstone, Scott A |
|
1997 |
|
2 |
p. 78-87 10 p. |
artikel |
30 |
EMV card payments – An update
|
Ward, M. |
|
2006 |
|
2 |
p. 89-92 |
artikel |
31 |
EMV — The ICC specifications for payment systems
|
Ward, Mike |
|
1999 |
|
2 |
p. 51-57 7 p. |
artikel |
32 |
Fool’s gold
|
Lawrence Öqvist, Karen |
|
2010 |
|
2 |
p. 72-75 |
artikel |
33 |
Forensic analysis on a Lotus Notes server
|
|
|
2003 |
|
2 |
p. 6-17 12 p. |
artikel |
34 |
How much material on BitTorrent is infringing content? A case study
|
Watters, Paul A. |
|
2011 |
|
2 |
p. 79-87 |
artikel |
35 |
How to defend against smartcard attacks – Or the amazing number of different ways to check a PIN securely
|
Rankl, Wolfgang |
|
2009 |
|
2 |
p. 79-86 |
artikel |
36 |
Identity management of e-ID, privacy and security in Europe. A human rights view
|
De Hert, Paul |
|
2008 |
|
2 |
p. 71-75 |
artikel |
37 |
Identity management throughout one's whole life
|
Hansen, Marit |
|
2008 |
|
2 |
p. 83-94 |
artikel |
38 |
Identity Theft and Reconstruction
|
Ciechanowicz, Chez |
|
2010 |
|
2 |
p. 41 |
artikel |
39 |
Information protection and data back-up in a distributed environment
|
Galsworthy, Joe |
|
1996 |
|
2 |
p. 36-45 10 p. |
artikel |
40 |
Information Sharing in the Cyber Age: a Key to Critical Infrastructure Protection
|
Rak, Adam |
|
2002 |
|
2 |
p. 50-56 7 p. |
artikel |
41 |
Insights on identity documents based on the Belgian case study
|
De Cock, Danny |
|
2008 |
|
2 |
p. 54-60 |
artikel |
42 |
Integrity of intention (a theory of types for security APIs)
|
Bond, Mike |
|
2006 |
|
2 |
p. 93-99 |
artikel |
43 |
Interfacing with smartcard applications — (ThOpen Card Framework and PC/SC)
|
Markantonakis, Constantinos |
|
1999 |
|
2 |
p. 69-77 9 p. |
artikel |
44 |
In the new converged world are we secure enough?
|
King, Paul |
|
2007 |
|
2 |
p. 90-97 |
artikel |
45 |
Introduction
|
Ciechanowicz, Dr Chez |
|
2003 |
|
2 |
p. 5- 1 p. |
artikel |
46 |
Introduction
|
Ciechanowicz, Chez |
|
2002 |
|
2 |
p. 1- 1 p. |
artikel |
47 |
Introduction
|
Hardy, Gary |
|
1996 |
|
2 |
p. 1-2 2 p. |
artikel |
48 |
Introduction
|
Ciechanowicz, Chez |
|
2001 |
|
2 |
p. 1- 1 p. |
artikel |
49 |
Introduction
|
Hardy, Gary |
|
1997 |
|
2 |
p. 1-2 2 p. |
artikel |
50 |
Introduction
|
Ciechanowicz, Chez |
|
1998 |
|
2 |
p. 1-2 2 p. |
artikel |
51 |
Introduction
|
Ciechanowicz, Chez |
|
1999 |
|
2 |
p. 1- 1 p. |
artikel |
52 |
Introduction
|
Ganley, Michael |
|
2004 |
|
2 |
p. 5- 1 p. |
artikel |
53 |
Introduction – Cryptography
|
Ganley, Michael |
|
2006 |
|
2 |
p. 67 |
artikel |
54 |
Introduction to cryptology
|
Piper, Fred |
|
1997 |
|
2 |
p. 10-13 4 p. |
artikel |
55 |
Introduction to this issue
|
Ganley, Michael J. |
|
2009 |
|
2 |
p. 35 |
artikel |
56 |
Introduction to this issue
|
Ganley, Michael J. |
|
2008 |
|
2 |
p. 45 |
artikel |
57 |
Is there a Need for Survivable Computation in Critical Infrastructures?
|
Desmedt, Yvo |
|
2002 |
|
2 |
p. 11-21 11 p. |
artikel |
58 |
Java card technology and security
|
Markantonakis, Constantinos |
|
1998 |
|
2 |
p. 82-89 8 p. |
artikel |
59 |
Legal and organizational challenges and solutions for achieving a pan-European electronic ID solution
|
Myhr, Thomas |
|
2008 |
|
2 |
p. 76-82 |
artikel |
60 |
MACs and hash functions: State of the art
|
Preneel, Bart |
|
1997 |
|
2 |
p. 33-43 11 p. |
artikel |
61 |
Malicious software – past, present and future
|
Nikishin, Andrey |
|
2004 |
|
2 |
p. 6-18 13 p. |
artikel |
62 |
Management strategies for implementing forensic security measures
|
|
|
2003 |
|
2 |
p. 55-64 10 p. |
artikel |
63 |
Managing access rights in the distributed world
|
Girt, Keith |
|
1996 |
|
2 |
p. 29-35 7 p. |
artikel |
64 |
Microsoft CryptoAPI
|
Fuchsberger, Andreas |
|
1997 |
|
2 |
p. 74-77 4 p. |
artikel |
65 |
Mitigating smart card risks
|
Ayer, Kenneth R |
|
1999 |
|
2 |
p. 58-63 6 p. |
artikel |
66 |
Mondex security strategy
|
Beric, John |
|
1999 |
|
2 |
p. 64-68 5 p. |
artikel |
67 |
Multiapplication smart card: Towards an open smart card?
|
Sauveron, Damien |
|
2009 |
|
2 |
p. 70-78 |
artikel |
68 |
National e-ID card schemes: A European overview
|
Arora, Siddhartha |
|
2008 |
|
2 |
p. 46-53 |
artikel |
69 |
New security issues raised by open cards
|
Girard, Pierre |
|
1999 |
|
2 |
p. 19-27 9 p. |
artikel |
70 |
News update
|
|
|
1996 |
|
2 |
p. 3-4 2 p. |
artikel |
71 |
Online identity: Giving it all away?
|
Furnell, S.M. |
|
2010 |
|
2 |
p. 42-46 |
artikel |
72 |
Opening up business securely
|
|
|
1996 |
|
2 |
p. 64-71 8 p. |
artikel |
73 |
Physical security of smartcards
|
Kuhn, Markus |
|
1999 |
|
2 |
p. 28-41 14 p. |
artikel |
74 |
Privacy threats in a mobile enterprise social network
|
Tomlinson, Allan |
|
2010 |
|
2 |
p. 57-66 |
artikel |
75 |
Protecting the Critical National Infrastructure — Developing a Method for the Measurement of Threat Agents in an Information Environment
|
Jones, Andy |
|
2002 |
|
2 |
p. 22-36 15 p. |
artikel |
76 |
Public key network infrastructure
|
Dennis, Keith R. |
|
1998 |
|
2 |
p. 90-97 8 p. |
artikel |
77 |
Quantum cryptography: Protecting our future networks with quantum mechanics
|
Phoenix, Simon J.D. |
|
1997 |
|
2 |
p. 88-97 10 p. |
artikel |
78 |
Real-time detection of children’s skin on social networking sites using Markov random field modelling
|
Islam, Mofakharul |
|
2011 |
|
2 |
p. 51-58 |
artikel |
79 |
Recent developments in cryptographic hash functions: Security implications and future directions
|
Cid, Carlos |
|
2006 |
|
2 |
p. 100-107 |
artikel |
80 |
Report Highlights
|
|
|
2002 |
|
2 |
p. 3-10 8 p. |
artikel |
81 |
Report highlights
|
|
|
1996 |
|
2 |
p. 5-9 5 p. |
artikel |
82 |
Report Highlights
|
|
|
2001 |
|
2 |
p. 3-11 9 p. |
artikel |
83 |
Report highlights
|
|
|
1997 |
|
2 |
p. 3-9 7 p. |
artikel |
84 |
Report highlights
|
|
|
1999 |
|
2 |
p. 3-12 10 p. |
artikel |
85 |
Report highlights
|
|
|
1998 |
|
2 |
p. 3-17 15 p. |
artikel |
86 |
Risks due to convergence of physical security systems and information technology environments
|
Eugene Schultz, E. |
|
2007 |
|
2 |
p. 80-84 |
artikel |
87 |
Role Based Access Control Models
|
Bellettini, Carlo |
|
2001 |
|
2 |
p. 21-29 9 p. |
artikel |
88 |
Secure Mobile Architecture (SMA) – A way to fix the broken Internet
|
Paine, Richard H. |
|
2007 |
|
2 |
p. 85-89 |
artikel |
89 |
Securing a distributed environment — A practical case study
|
Oxley, Simon |
|
1996 |
|
2 |
p. 17-28 12 p. |
artikel |
90 |
Securing the Critical IP Infrastructure
|
Branigan, Steven |
|
2002 |
|
2 |
p. 57-64 8 p. |
artikel |
91 |
Security for Distributed Databases
|
Thuraisingham, Bhavani |
|
2001 |
|
2 |
p. 95-102 8 p. |
artikel |
92 |
Security for eBusiness
|
Davidson, Mary Ann |
|
2001 |
|
2 |
p. 80-94 15 p. |
artikel |
93 |
Security for Workflow Systems
|
Atluri, Vijay |
|
2001 |
|
2 |
p. 59-68 10 p. |
artikel |
94 |
Security in CORBA-based electronic commerce systems
|
Gollmann, Dieter |
|
1998 |
|
2 |
p. 62-70 9 p. |
artikel |
95 |
Security in CORBA distributed object systems
|
Fairthorne, Belinda |
|
1996 |
|
2 |
p. 56-63 8 p. |
artikel |
96 |
Security in Federated Database Systems
|
Jajodia, Sushil |
|
2001 |
|
2 |
p. 69-79 11 p. |
artikel |
97 |
Smart card applications and security
|
Leng, Xuefei |
|
2009 |
|
2 |
p. 36-45 |
artikel |
98 |
Smartcard certfication
|
Cherrill, D |
|
1999 |
|
2 |
p. 42-50 9 p. |
artikel |
99 |
Smart cards and remote computing: Interaction or convergence?
|
Chaumette, Serge |
|
2009 |
|
2 |
p. 101-110 |
artikel |
100 |
Smart card security evaluation: Community solutions to intractable problems
|
Boswell, Tony |
|
2009 |
|
2 |
p. 57-69 |
artikel |
101 |
Smartcards in secure Electronic Commerce
|
Stirland, Mark |
|
1998 |
|
2 |
p. 41-54 14 p. |
artikel |
102 |
Social networking and the risk to companies and institutions
|
Langheinrich, Marc |
|
2010 |
|
2 |
p. 51-56 |
artikel |
103 |
Social networking as a nexus for engagement and exploitation of young people
|
Quayle, Ethel |
|
2011 |
|
2 |
p. 44-50 |
artikel |
104 |
Social networking searching and privacy issues
|
Qi, Man |
|
2011 |
|
2 |
p. 74-78 |
artikel |
105 |
Social networking threats
|
Watters, Paul A. |
|
2011 |
|
2 |
p. 37 |
artikel |
106 |
Socio-technological phishing prevention
|
Gupta, Gaurav |
|
2011 |
|
2 |
p. 67-73 |
artikel |
107 |
Some stepping stones in computer forensics
|
|
|
2003 |
|
2 |
p. 37-41 5 p. |
artikel |
108 |
Some thoughts on the underlying logic and process underpinning Electronic Identity (e-ID)
|
Collings, Tony |
|
2008 |
|
2 |
p. 61-70 |
artikel |
109 |
Sound of silence
|
Rautiainen, Sami |
|
2004 |
|
2 |
p. 42-46 5 p. |
artikel |
110 |
The art of alchemy
|
Lawrence Öqvist, Karen |
|
2010 |
|
2 |
p. 47-50 |
artikel |
111 |
The benefits and drawbacks of using electronic identities
|
Price, Geraint |
|
2008 |
|
2 |
p. 95-103 |
artikel |
112 |
The chip in your wallet — The technology of security in smartcard chip manufacture
|
Paterson, Mike |
|
1999 |
|
2 |
p. 13-18 6 p. |
artikel |
113 |
The data encryption standard
|
Coppersmith, Don |
|
1997 |
|
2 |
p. 22-24 3 p. |
artikel |
114 |
The difficulty of attacking cryptosystems
|
Murphy, Sean |
|
1997 |
|
2 |
p. 18-21 4 p. |
artikel |
115 |
The future of virus detection
|
Ford, Richard |
|
2004 |
|
2 |
p. 19-26 8 p. |
artikel |
116 |
The management of symmetric keys
|
Halliden, Paul |
|
1997 |
|
2 |
p. 44-53 10 p. |
artikel |
117 |
The security of distributed systems — An overview
|
Horrell, Mike |
|
1996 |
|
2 |
p. 10-16 7 p. |
artikel |
118 |
The threats of social networking: Old wine in new bottles?
|
Weir, George R.S. |
|
2011 |
|
2 |
p. 38-43 |
artikel |
119 |
The truth behind single sign-on
|
Hardy, Gary |
|
1996 |
|
2 |
p. 46-55 10 p. |
artikel |
120 |
The UK Financial Sector's Place in the Critical National Infrastructure
|
Whittaker, Colin |
|
2002 |
|
2 |
p. 65-74 10 p. |
artikel |
121 |
This business of malware
|
Stewart, Joe |
|
2004 |
|
2 |
p. 35-41 7 p. |
artikel |
122 |
Tools and protocols for E-commerce
|
Zaba, Stefek |
|
1998 |
|
2 |
p. 34-40 7 p. |
artikel |
123 |
Towards multilaterally secure computing platforms—with open source and trusted computing
|
Sadeghi, Ahmad-Reza |
|
2005 |
|
2 |
p. 83-95 13 p. |
artikel |
124 |
Transport ticketing security and fraud controls
|
Mayes, Keith E. |
|
2009 |
|
2 |
p. 87-95 |
artikel |
125 |
Trusted computing and open source
|
Safford, David |
|
2005 |
|
2 |
p. 74-82 9 p. |
artikel |
126 |
Trusted computing group history
|
Berger, Brian |
|
2005 |
|
2 |
p. 59-62 4 p. |
artikel |
127 |
Trusted computing using AMD “Pacifica” and “Presidio” secure virtual machine technology
|
Strongin, Geoffrey |
|
2005 |
|
2 |
p. 120-132 13 p. |
artikel |
128 |
Understanding today's malware
|
Heiser, Jay G |
|
2004 |
|
2 |
p. 47-64 18 p. |
artikel |
129 |
When networks collide
|
Samani, Raj |
|
2007 |
|
2 |
p. 98-110 |
artikel |
130 |
WYSIWYS? — What you see is what you sign?
|
Landrock, Peter |
|
1998 |
|
2 |
p. 55-61 7 p. |
artikel |
131 |
XML security
|
Bertino, Elisa |
|
2001 |
|
2 |
p. 44-58 15 p. |
artikel |