nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1993 |
12 |
3 |
p. 263-269 7 p. |
artikel |
2 |
A distributed capability-based architecture for the transform model
|
Sandhu, Ravi S. |
|
1993 |
12 |
3 |
p. 285-303 19 p. |
artikel |
3 |
A model for detecting the existence of software corruption in real time
|
Voas, Jeffrey M. |
|
1993 |
12 |
3 |
p. 275-283 9 p. |
artikel |
4 |
Calendar
|
|
|
1993 |
12 |
3 |
p. 270-272 3 p. |
artikel |
5 |
Conference report
|
Highland, Harold Joseph |
|
1993 |
12 |
3 |
p. 249-253 5 p. |
artikel |
6 |
Digital signatures— Explanation and usage
|
Lawrence, L.G. |
|
1993 |
12 |
3 |
p. 230-233 4 p. |
artikel |
7 |
Disaster recovery after downsizing
|
Norman, Geoff |
|
1993 |
12 |
3 |
p. 225-229 5 p. |
artikel |
8 |
From the editor
|
|
|
1993 |
12 |
3 |
p. 214-215 2 p. |
artikel |
9 |
Guide for authors
|
|
|
1993 |
12 |
3 |
p. 318- 1 p. |
artikel |
10 |
IFIP TC 11 news
|
Highland, HaroldJoseph |
|
1993 |
12 |
3 |
p. 259-261 3 p. |
artikel |
11 |
IFIP technical committee 11
|
|
|
1993 |
12 |
3 |
p. 315-317 3 p. |
artikel |
12 |
Letter to the editor
|
Roberts, Steve |
|
1993 |
12 |
3 |
p. 255-257 3 p. |
artikel |
13 |
NADIR: An automated system for detecting network intrusion and misuse
|
Hochberg, Judith |
|
1993 |
12 |
3 |
p. 235-248 14 p. |
artikel |
14 |
Random bits & bytes
|
Highland, HaroldJoseph |
|
1993 |
12 |
3 |
p. 216-224 9 p. |
artikel |
15 |
Refereed papers
|
|
|
1993 |
12 |
3 |
p. 273- 1 p. |
artikel |
16 |
The authenticated datagram protocol: A high performance, subtransport level, secure communication protocol
|
Rangan, P.Venkat |
|
1993 |
12 |
3 |
p. 305-314 10 p. |
artikel |