no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1992 |
11 |
2 |
p. 185-192 8 p. |
article |
2 |
An axiomatic theory of trust in secure communication protocols
|
Rangan, P.Venkat |
|
1992 |
11 |
2 |
p. 163-172 10 p. |
article |
3 |
Asymmetric user authentication
|
Laun, Rotraut |
|
1992 |
11 |
2 |
p. 173-183 11 p. |
article |
4 |
Biometrics futures
|
Sherman, Robin L. |
|
1992 |
11 |
2 |
p. 128-133 6 p. |
article |
5 |
Determining access rights for medical information systems
|
Gritzalis, D. |
|
1992 |
11 |
2 |
p. 149-161 13 p. |
article |
6 |
From the editor
|
|
|
1992 |
11 |
2 |
p. 108-109 2 p. |
article |
7 |
IFIP TC11 news
|
Highland, HaroldJoseph |
|
1992 |
11 |
2 |
p. 145-146 2 p. |
article |
8 |
International board of referees
|
|
|
1992 |
11 |
2 |
p. 147- 1 p. |
article |
9 |
Introduction to computer security
|
Menkus, Belden |
|
1992 |
11 |
2 |
p. 121-127 7 p. |
article |
10 |
Letter to the editor
|
Cohen, Frederick B. |
|
1992 |
11 |
2 |
p. 140-142 3 p. |
article |
11 |
Practical unix security
|
Highland, Harold Joseph |
|
1992 |
11 |
2 |
p. 134-139 6 p. |
article |
12 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1992 |
11 |
2 |
p. 110-120 11 p. |
article |