nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
Collinson, Helen |
|
1994 |
13 |
7 |
p. 564-569 6 p. |
artikel |
2 |
A dynamic cryptographic key generation and information broadcasting scheme in information systems
|
Liaw, Horng-Twu |
|
1994 |
13 |
7 |
p. 601-610 10 p. |
artikel |
3 |
A note on supplying a trusted clock via a secure device
|
Looi, Mark H. |
|
1994 |
13 |
7 |
p. 611-613 3 p. |
artikel |
4 |
Authentication and protection of public keys
|
Laih, Chi-Sung |
|
1994 |
13 |
7 |
p. 581-585 5 p. |
artikel |
5 |
Calendar
|
|
|
1994 |
13 |
7 |
p. 570- 1 p. |
artikel |
6 |
Database authentication revisited
|
Hardjono, Thomas |
|
1994 |
13 |
7 |
p. 573-580 8 p. |
artikel |
7 |
Distributed database security
|
Harris, Duncan |
|
1994 |
13 |
7 |
p. 547-557 11 p. |
artikel |
8 |
Extended labeling policies for enhanced application support
|
Picciotto, Jeffrey |
|
1994 |
13 |
7 |
p. 587-599 13 p. |
artikel |
9 |
From the editor
|
|
|
1994 |
13 |
7 |
p. 538-539 2 p. |
artikel |
10 |
Guide for authors
|
|
|
1994 |
13 |
7 |
p. 618- 1 p. |
artikel |
11 |
IFIP technical committee 11
|
|
|
1994 |
13 |
7 |
p. 615-617 3 p. |
artikel |
12 |
Industrial espionage: Analysing the risk
|
Sommer, Peter |
|
1994 |
13 |
7 |
p. 558-563 6 p. |
artikel |
13 |
International board of referees
|
|
|
1994 |
13 |
7 |
p. 571- 1 p. |
artikel |
14 |
Random bits & bytes
|
Highland, HaroldJoseph |
|
1994 |
13 |
7 |
p. 540-546 7 p. |
artikel |