nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1993 |
12 |
2 |
p. 143-149 7 p. |
artikel |
2 |
A chosen plaintext attack on an adaptive arithmetic coding compression algorithm
|
Bergen, Helen A. |
|
1993 |
12 |
2 |
p. 157-167 11 p. |
artikel |
3 |
A shortest path network security model
|
Fitch III, John A. |
|
1993 |
12 |
2 |
p. 169-189 21 p. |
artikel |
4 |
Author index for vol. 11
|
|
|
1993 |
12 |
2 |
p. 199- 1 p. |
artikel |
5 |
Calendar
|
|
|
1993 |
12 |
2 |
p. 151-153 3 p. |
artikel |
6 |
DECnet security (Not necessarily an oxymoron)
|
Clyde, Robert A. |
|
1993 |
12 |
2 |
p. 123-127 5 p. |
artikel |
7 |
From the editor
|
|
|
1993 |
12 |
2 |
p. 104-105 2 p. |
artikel |
8 |
Guide for authors
|
|
|
1993 |
12 |
2 |
p. 211- 1 p. |
artikel |
9 |
IFIP TC 11 news
|
Highland, HaroldJoseph |
|
1993 |
12 |
2 |
p. 139-142 4 p. |
artikel |
10 |
IFIP technical committee 11
|
|
|
1993 |
12 |
2 |
p. 207-209 3 p. |
artikel |
11 |
Information security in workstation environments
|
Stahl, Stanley H. |
|
1993 |
12 |
2 |
p. 117-122 6 p. |
artikel |
12 |
International board of referees
|
|
|
1993 |
12 |
2 |
p. 155- 1 p. |
artikel |
13 |
Letters to the editor
|
Cumming, Andrea |
|
1993 |
12 |
2 |
p. 136-138 3 p. |
artikel |
14 |
Network security in the '90s: Issues and solutions for managers
|
Lathrop, David L. |
|
1993 |
12 |
2 |
p. 135- 1 p. |
artikel |
15 |
Perceptions of computer viruses: a cross-cultural assessment
|
Jones, M.C. |
|
1993 |
12 |
2 |
p. 191-197 7 p. |
artikel |
16 |
Public key management for X.25 network security
|
Moseley, David |
|
1993 |
12 |
2 |
p. 128-133 6 p. |
artikel |
17 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1993 |
12 |
2 |
p. 106-116 11 p. |
artikel |
18 |
Subject index for vol. 11
|
|
|
1993 |
12 |
2 |
p. 201-205 5 p. |
artikel |