Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             131 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A brief history of cryptography Davies, Donald
1997
2 p. 14-17
4 p.
artikel
2 A comprehensive approach to digital incident investigation 2003
2 p. 42-54
13 p.
artikel
3 A cryptographic tour of the IPsec standards Paterson, Kenneth G.
2006
2 p. 72-81
artikel
4 Addressing the data problem 2003
2 p. 18-31
14 p.
artikel
5 AEGIS: A single-chip secure processor Suh, G. Edward
2005
2 p. 63-73
11 p.
artikel
6 An Advanced Trusted Platform for mobile phone devices Covey, Carlin
2005
2 p. 96-104
9 p.
artikel
7 An overview of RFID tags and new cryptographic developments Robshaw, Matthew J.B.
2006
2 p. 82-88
artikel
8 Attacking smart card systems: Theory and practice Markantonakis, Konstantinos
2009
2 p. 46-56
artikel
9 Authentication using cryptography Mitchell, Chris
1997
2 p. 25-32
8 p.
artikel
10 Benchmarking for Critical Infrastructure Protection Todd, Mike
2002
2 p. 37-49
13 p.
artikel
11 Bucket attack on numeric set watermarking model and safeguards Gupta, Gaurav
2011
2 p. 59-66
artikel
12 Building secure business applications at Microsoft Steer, John
2008
2 p. 105-110
artikel
13 “Building secure business applications at Microsoft” by J. Steer and A. Popli 2008
2 p. 104
artikel
14 Business issues relating to malware Fothergill, Shaun
2004
2 p. 65-75
11 p.
artikel
15 Can CLI be trusted? Clayton, Richard
2007
2 p. 74-79
artikel
16 Compatibility, competition, and control in trusted computing environments Schoen, Seth
2005
2 p. 105-119
15 p.
artikel
17 Computer forensics: past, present and future 2003
2 p. 32-36
5 p.
artikel
18 Convergence Jones, Andrew
2007
2 p. 69-73
artikel
19 Cryptographic security in the internet protocol suite: Practice and proposals Zaba, Stefek
1997
2 p. 54-73
20 p.
artikel
20 Cryptography and trust Walton, Richard
2006
2 p. 68-71
artikel
21 Database Security in a Web Environment Lothian, Paul
2001
2 p. 12-20
9 p.
artikel
22 Database Security: Retrospective and Way Forward Wiseman, Simon
2001
2 p. 30-43
14 p.
artikel
23 Data protection and Electronic Commerce Aldhouse, Francis
1998
2 p. 71-81
11 p.
artikel
24 Deconstructing malware: what it is and how to stop it Williamson, David
2004
2 p. 27-34
8 p.
artikel
25 Deploying public key infrastructures Khan, Liaquat
1998
2 p. 18-33
16 p.
artikel
26 Digital forensics and the issues of identity Jones, Andy
2010
2 p. 67-71
artikel
27 EDI security Dosdale, T.
1998
2 p. 98-110
13 p.
artikel
28 Electronic passports – from secure specifications to secure implementations Liersch, Ingo
2009
2 p. 96-100
artikel
29 Elliptic curve cryptosystem — The answer to strong, fast public-key cryptography for securing constrained environments Vanstone, Scott A
1997
2 p. 78-87
10 p.
artikel
30 EMV card payments – An update Ward, M.
2006
2 p. 89-92
artikel
31 EMV — The ICC specifications for payment systems Ward, Mike
1999
2 p. 51-57
7 p.
artikel
32 Fool’s gold Lawrence Öqvist, Karen
2010
2 p. 72-75
artikel
33 Forensic analysis on a Lotus Notes server 2003
2 p. 6-17
12 p.
artikel
34 How much material on BitTorrent is infringing content? A case study Watters, Paul A.
2011
2 p. 79-87
artikel
35 How to defend against smartcard attacks – Or the amazing number of different ways to check a PIN securely Rankl, Wolfgang
2009
2 p. 79-86
artikel
36 Identity management of e-ID, privacy and security in Europe. A human rights view De Hert, Paul
2008
2 p. 71-75
artikel
37 Identity management throughout one's whole life Hansen, Marit
2008
2 p. 83-94
artikel
38 Identity Theft and Reconstruction Ciechanowicz, Chez
2010
2 p. 41
artikel
39 Information protection and data back-up in a distributed environment Galsworthy, Joe
1996
2 p. 36-45
10 p.
artikel
40 Information Sharing in the Cyber Age: a Key to Critical Infrastructure Protection Rak, Adam
2002
2 p. 50-56
7 p.
artikel
41 Insights on identity documents based on the Belgian case study De Cock, Danny
2008
2 p. 54-60
artikel
42 Integrity of intention (a theory of types for security APIs) Bond, Mike
2006
2 p. 93-99
artikel
43 Interfacing with smartcard applications — (ThOpen Card Framework and PC/SC) Markantonakis, Constantinos
1999
2 p. 69-77
9 p.
artikel
44 In the new converged world are we secure enough? King, Paul
2007
2 p. 90-97
artikel
45 Introduction Ciechanowicz, Dr Chez
2003
2 p. 5-
1 p.
artikel
46 Introduction Ciechanowicz, Chez
2002
2 p. 1-
1 p.
artikel
47 Introduction Hardy, Gary
1996
2 p. 1-2
2 p.
artikel
48 Introduction Ciechanowicz, Chez
2001
2 p. 1-
1 p.
artikel
49 Introduction Hardy, Gary
1997
2 p. 1-2
2 p.
artikel
50 Introduction Ciechanowicz, Chez
1998
2 p. 1-2
2 p.
artikel
51 Introduction Ciechanowicz, Chez
1999
2 p. 1-
1 p.
artikel
52 Introduction Ganley, Michael
2004
2 p. 5-
1 p.
artikel
53 Introduction – Cryptography Ganley, Michael
2006
2 p. 67
artikel
54 Introduction to cryptology Piper, Fred
1997
2 p. 10-13
4 p.
artikel
55 Introduction to this issue Ganley, Michael J.
2009
2 p. 35
artikel
56 Introduction to this issue Ganley, Michael J.
2008
2 p. 45
artikel
57 Is there a Need for Survivable Computation in Critical Infrastructures? Desmedt, Yvo
2002
2 p. 11-21
11 p.
artikel
58 Java card technology and security Markantonakis, Constantinos
1998
2 p. 82-89
8 p.
artikel
59 Legal and organizational challenges and solutions for achieving a pan-European electronic ID solution Myhr, Thomas
2008
2 p. 76-82
artikel
60 MACs and hash functions: State of the art Preneel, Bart
1997
2 p. 33-43
11 p.
artikel
61 Malicious software – past, present and future Nikishin, Andrey
2004
2 p. 6-18
13 p.
artikel
62 Management strategies for implementing forensic security measures 2003
2 p. 55-64
10 p.
artikel
63 Managing access rights in the distributed world Girt, Keith
1996
2 p. 29-35
7 p.
artikel
64 Microsoft CryptoAPI Fuchsberger, Andreas
1997
2 p. 74-77
4 p.
artikel
65 Mitigating smart card risks Ayer, Kenneth R
1999
2 p. 58-63
6 p.
artikel
66 Mondex security strategy Beric, John
1999
2 p. 64-68
5 p.
artikel
67 Multiapplication smart card: Towards an open smart card? Sauveron, Damien
2009
2 p. 70-78
artikel
68 National e-ID card schemes: A European overview Arora, Siddhartha
2008
2 p. 46-53
artikel
69 New security issues raised by open cards Girard, Pierre
1999
2 p. 19-27
9 p.
artikel
70 News update 1996
2 p. 3-4
2 p.
artikel
71 Online identity: Giving it all away? Furnell, S.M.
2010
2 p. 42-46
artikel
72 Opening up business securely 1996
2 p. 64-71
8 p.
artikel
73 Physical security of smartcards Kuhn, Markus
1999
2 p. 28-41
14 p.
artikel
74 Privacy threats in a mobile enterprise social network Tomlinson, Allan
2010
2 p. 57-66
artikel
75 Protecting the Critical National Infrastructure — Developing a Method for the Measurement of Threat Agents in an Information Environment Jones, Andy
2002
2 p. 22-36
15 p.
artikel
76 Public key network infrastructure Dennis, Keith R.
1998
2 p. 90-97
8 p.
artikel
77 Quantum cryptography: Protecting our future networks with quantum mechanics Phoenix, Simon J.D.
1997
2 p. 88-97
10 p.
artikel
78 Real-time detection of children’s skin on social networking sites using Markov random field modelling Islam, Mofakharul
2011
2 p. 51-58
artikel
79 Recent developments in cryptographic hash functions: Security implications and future directions Cid, Carlos
2006
2 p. 100-107
artikel
80 Report Highlights 2002
2 p. 3-10
8 p.
artikel
81 Report highlights 1996
2 p. 5-9
5 p.
artikel
82 Report Highlights 2001
2 p. 3-11
9 p.
artikel
83 Report highlights 1997
2 p. 3-9
7 p.
artikel
84 Report highlights 1999
2 p. 3-12
10 p.
artikel
85 Report highlights 1998
2 p. 3-17
15 p.
artikel
86 Risks due to convergence of physical security systems and information technology environments Eugene Schultz, E.
2007
2 p. 80-84
artikel
87 Role Based Access Control Models Bellettini, Carlo
2001
2 p. 21-29
9 p.
artikel
88 Secure Mobile Architecture (SMA) – A way to fix the broken Internet Paine, Richard H.
2007
2 p. 85-89
artikel
89 Securing a distributed environment — A practical case study Oxley, Simon
1996
2 p. 17-28
12 p.
artikel
90 Securing the Critical IP Infrastructure Branigan, Steven
2002
2 p. 57-64
8 p.
artikel
91 Security for Distributed Databases Thuraisingham, Bhavani
2001
2 p. 95-102
8 p.
artikel
92 Security for eBusiness Davidson, Mary Ann
2001
2 p. 80-94
15 p.
artikel
93 Security for Workflow Systems Atluri, Vijay
2001
2 p. 59-68
10 p.
artikel
94 Security in CORBA-based electronic commerce systems Gollmann, Dieter
1998
2 p. 62-70
9 p.
artikel
95 Security in CORBA distributed object systems Fairthorne, Belinda
1996
2 p. 56-63
8 p.
artikel
96 Security in Federated Database Systems Jajodia, Sushil
2001
2 p. 69-79
11 p.
artikel
97 Smart card applications and security Leng, Xuefei
2009
2 p. 36-45
artikel
98 Smartcard certfication Cherrill, D
1999
2 p. 42-50
9 p.
artikel
99 Smart cards and remote computing: Interaction or convergence? Chaumette, Serge
2009
2 p. 101-110
artikel
100 Smart card security evaluation: Community solutions to intractable problems Boswell, Tony
2009
2 p. 57-69
artikel
101 Smartcards in secure Electronic Commerce Stirland, Mark
1998
2 p. 41-54
14 p.
artikel
102 Social networking and the risk to companies and institutions Langheinrich, Marc
2010
2 p. 51-56
artikel
103 Social networking as a nexus for engagement and exploitation of young people Quayle, Ethel
2011
2 p. 44-50
artikel
104 Social networking searching and privacy issues Qi, Man
2011
2 p. 74-78
artikel
105 Social networking threats Watters, Paul A.
2011
2 p. 37
artikel
106 Socio-technological phishing prevention Gupta, Gaurav
2011
2 p. 67-73
artikel
107 Some stepping stones in computer forensics 2003
2 p. 37-41
5 p.
artikel
108 Some thoughts on the underlying logic and process underpinning Electronic Identity (e-ID) Collings, Tony
2008
2 p. 61-70
artikel
109 Sound of silence Rautiainen, Sami
2004
2 p. 42-46
5 p.
artikel
110 The art of alchemy Lawrence Öqvist, Karen
2010
2 p. 47-50
artikel
111 The benefits and drawbacks of using electronic identities Price, Geraint
2008
2 p. 95-103
artikel
112 The chip in your wallet — The technology of security in smartcard chip manufacture Paterson, Mike
1999
2 p. 13-18
6 p.
artikel
113 The data encryption standard Coppersmith, Don
1997
2 p. 22-24
3 p.
artikel
114 The difficulty of attacking cryptosystems Murphy, Sean
1997
2 p. 18-21
4 p.
artikel
115 The future of virus detection Ford, Richard
2004
2 p. 19-26
8 p.
artikel
116 The management of symmetric keys Halliden, Paul
1997
2 p. 44-53
10 p.
artikel
117 The security of distributed systems — An overview Horrell, Mike
1996
2 p. 10-16
7 p.
artikel
118 The threats of social networking: Old wine in new bottles? Weir, George R.S.
2011
2 p. 38-43
artikel
119 The truth behind single sign-on Hardy, Gary
1996
2 p. 46-55
10 p.
artikel
120 The UK Financial Sector's Place in the Critical National Infrastructure Whittaker, Colin
2002
2 p. 65-74
10 p.
artikel
121 This business of malware Stewart, Joe
2004
2 p. 35-41
7 p.
artikel
122 Tools and protocols for E-commerce Zaba, Stefek
1998
2 p. 34-40
7 p.
artikel
123 Towards multilaterally secure computing platforms—with open source and trusted computing Sadeghi, Ahmad-Reza
2005
2 p. 83-95
13 p.
artikel
124 Transport ticketing security and fraud controls Mayes, Keith E.
2009
2 p. 87-95
artikel
125 Trusted computing and open source Safford, David
2005
2 p. 74-82
9 p.
artikel
126 Trusted computing group history Berger, Brian
2005
2 p. 59-62
4 p.
artikel
127 Trusted computing using AMD “Pacifica” and “Presidio” secure virtual machine technology Strongin, Geoffrey
2005
2 p. 120-132
13 p.
artikel
128 Understanding today's malware Heiser, Jay G
2004
2 p. 47-64
18 p.
artikel
129 When networks collide Samani, Raj
2007
2 p. 98-110
artikel
130 WYSIWYS? — What you see is what you sign? Landrock, Peter
1998
2 p. 55-61
7 p.
artikel
131 XML security Bertino, Elisa
2001
2 p. 44-58
15 p.
artikel
                             131 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland