nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1992 |
11 |
6 |
p. 535-542 8 p. |
artikel |
2 |
Breach of system security and theft of data: Legal aspects and preventive measures
|
Gilbert, Françoise |
|
1992 |
11 |
6 |
p. 508-517 10 p. |
artikel |
3 |
Calendar
|
|
|
1992 |
11 |
6 |
p. 543-544 2 p. |
artikel |
4 |
Computer security evaluation: Developments in the European ITSEC programme
|
Robinson, John |
|
1992 |
11 |
6 |
p. 518-524 7 p. |
artikel |
5 |
Defense-in-depth against computer viruses
|
Cohen, Frederick B. |
|
1992 |
11 |
6 |
p. 563-579 17 p. |
artikel |
6 |
Eliminating polyinstantiation securely
|
Sandhu, Ravi S. |
|
1992 |
11 |
6 |
p. 547-562 16 p. |
artikel |
7 |
From the editor
|
|
|
1992 |
11 |
6 |
p. 496-497 2 p. |
artikel |
8 |
Guide for authors
|
|
|
1992 |
11 |
6 |
p. 588- 1 p. |
artikel |
9 |
IFIP TC 11 news
|
Highland, HaroldJoseph |
|
1992 |
11 |
6 |
p. 531-534 4 p. |
artikel |
10 |
IFIP technical committee 11
|
|
|
1992 |
11 |
6 |
p. 585-587 3 p. |
artikel |
11 |
International board of referees
|
|
|
1992 |
11 |
6 |
p. 545- 1 p. |
artikel |
12 |
Letter to the editor
|
Bowe, Rennie |
|
1992 |
11 |
6 |
p. 529-530 2 p. |
artikel |
13 |
On blind signatures and perfect crimes
|
von Solms, Sebastiaan |
|
1992 |
11 |
6 |
p. 581-583 3 p. |
artikel |
14 |
Random bits & bytes
|
Highland, HaroldJoseph |
|
1992 |
11 |
6 |
p. 498-507 10 p. |
artikel |
15 |
Understanding EDI security issues
|
Menkus, Belden |
|
1992 |
11 |
6 |
p. 525-528 4 p. |
artikel |