nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1993 |
12 |
8 |
p. 740-744 5 p. |
artikel |
2 |
Authentication services in distributed systems
|
Gollmann, Dieter |
|
1993 |
12 |
8 |
p. 753-764 12 p. |
artikel |
3 |
Calendar
|
|
|
1993 |
12 |
8 |
p. 745-746 2 p. |
artikel |
4 |
Commercial accreditation of information security
|
Hardy, Gary |
|
1993 |
12 |
8 |
p. 716-729 14 p. |
artikel |
5 |
EDIFACT security made simple—the EDIMED approach
|
Ølnes, Jon |
|
1993 |
12 |
8 |
p. 765-774 10 p. |
artikel |
6 |
From the editor
|
|
|
1993 |
12 |
8 |
p. 696-697 2 p. |
artikel |
7 |
IFIP TC 11 news
|
Highland, HaroldJoseph |
|
1993 |
12 |
8 |
p. 735-739 5 p. |
artikel |
8 |
IFIP technical committee 11
|
|
|
1993 |
12 |
8 |
p. 747-749 3 p. |
artikel |
9 |
International board of referees
|
|
|
1993 |
12 |
8 |
p. 751- 1 p. |
artikel |
10 |
Message collision in block ciphers with message authentication
|
Allinson, Caroline |
|
1993 |
12 |
8 |
p. 781-787 7 p. |
artikel |
11 |
Organizational issues in IT security
|
Fagan, Peter |
|
1993 |
12 |
8 |
p. 710-715 6 p. |
artikel |
12 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1993 |
12 |
8 |
p. 698-709 12 p. |
artikel |
13 |
System threats and vulnerabilities and the contrary principle
|
Koerner, Frank |
|
1993 |
12 |
8 |
p. 775-779 5 p. |
artikel |
14 |
16th national computer security conference
|
Highland, Harold Joseph |
|
1993 |
12 |
8 |
p. 730-734 5 p. |
artikel |