nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1982 |
1 |
3 |
p. 293-297 5 p. |
artikel |
2 |
Analog scramblers for speech privacy
|
Jayant, N.S. |
|
1982 |
1 |
3 |
p. 275-289 15 p. |
artikel |
3 |
An executive guide to ADP contingency planning
|
Shaw, James K |
|
1982 |
1 |
3 |
p. 210-215 6 p. |
artikel |
4 |
Applying public key distribution to local area networks
|
Schanning, Brian P. |
|
1982 |
1 |
3 |
p. 268-274 7 p. |
artikel |
5 |
Author index to volume 1
|
|
|
1982 |
1 |
3 |
p. 303-304 2 p. |
artikel |
6 |
Calendar
|
|
|
1982 |
1 |
3 |
p. 298- 1 p. |
artikel |
7 |
Disaster recovery services
|
Ball, Leslie D. |
|
1982 |
1 |
3 |
p. 216-225 10 p. |
artikel |
8 |
Editor's note
|
Highland, Harold Joseph |
|
1982 |
1 |
3 |
p. 242- 1 p. |
artikel |
9 |
Executive guide to computer security
|
|
|
1982 |
1 |
3 |
p. 233-241 9 p. |
artikel |
10 |
Guest editorial
|
Willett, Michael |
|
1982 |
1 |
3 |
p. 243-244 2 p. |
artikel |
11 |
High speed implementation of DES
|
Banerjee, Subodh K. |
|
1982 |
1 |
3 |
p. 261-267 7 p. |
artikel |
12 |
Integrity and security standards based on cryptography
|
Branstad, Dennis K. |
|
1982 |
1 |
3 |
p. 255-260 6 p. |
artikel |
13 |
Management guide to computer security
|
RFB, |
|
1982 |
1 |
3 |
p. 290-291 2 p. |
artikel |
14 |
Multi-national computer systems: An introduction to transnational data flow and data regulation
|
RFB, |
|
1982 |
1 |
3 |
p. 291-292 2 p. |
artikel |
15 |
Reflections on ten years of computer security
|
Reed, Susan K. |
|
1982 |
1 |
3 |
p. 231-232 2 p. |
artikel |
16 |
Sealing electronic money in Sweden
|
Lindén, Christer |
|
1982 |
1 |
3 |
p. 226-230 5 p. |
artikel |
17 |
Security procedures for program libraries
|
Murray, William Hugh |
|
1982 |
1 |
3 |
p. 201-209 9 p. |
artikel |
18 |
Subject index to volume 1
|
|
|
1982 |
1 |
3 |
p. 299-302 4 p. |
artikel |
19 |
The grand lines of cryptology's development
|
Kahn, David |
|
1982 |
1 |
3 |
p. 245-248 4 p. |
artikel |
20 |
The public cryptography study group
|
Creighton Buck, R. |
|
1982 |
1 |
3 |
p. 249-254 6 p. |
artikel |