Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             12 results found
no title author magazine year volume issue page(s) type
1 Abstracts of recent articles and literature 1992
11 2 p. 185-192
8 p.
article
2 An axiomatic theory of trust in secure communication protocols Rangan, P.Venkat
1992
11 2 p. 163-172
10 p.
article
3 Asymmetric user authentication Laun, Rotraut
1992
11 2 p. 173-183
11 p.
article
4 Biometrics futures Sherman, Robin L.
1992
11 2 p. 128-133
6 p.
article
5 Determining access rights for medical information systems Gritzalis, D.
1992
11 2 p. 149-161
13 p.
article
6 From the editor 1992
11 2 p. 108-109
2 p.
article
7 IFIP TC11 news Highland, HaroldJoseph
1992
11 2 p. 145-146
2 p.
article
8 International board of referees 1992
11 2 p. 147-
1 p.
article
9 Introduction to computer security Menkus, Belden
1992
11 2 p. 121-127
7 p.
article
10 Letter to the editor Cohen, Frederick B.
1992
11 2 p. 140-142
3 p.
article
11 Practical unix security Highland, Harold Joseph
1992
11 2 p. 134-139
6 p.
article
12 Random bits & bytes Highland, Harold Joseph
1992
11 2 p. 110-120
11 p.
article
                             12 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands