nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cryptographic implementation for dynamic access control in a user hierarchy
|
Hui-Min, Tsai |
|
1995 |
14 |
2 |
p. 159-166 8 p. |
artikel |
2 |
A geometric approach for sharing secrets
|
Tzong-Chen, Wu |
|
1995 |
14 |
2 |
p. 135-145 11 p. |
artikel |
3 |
A hacker's lines of attack
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 120- 1 p. |
artikel |
4 |
A higher level of computer security through active policies
|
Abrams, Marshall D. |
|
1995 |
14 |
2 |
p. 147-157 11 p. |
artikel |
5 |
Author index for volume 13
|
|
|
1995 |
14 |
2 |
p. 124- 1 p. |
artikel |
6 |
Calendar
|
|
|
1995 |
14 |
2 |
p. 122-123 2 p. |
artikel |
7 |
Calling in confidence
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 120- 1 p. |
artikel |
8 |
Cellular carriers try new tricks to beat bandits
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 119- 1 p. |
artikel |
9 |
Computer security: For fun and profit
|
Wolfe, Henry B. |
|
1995 |
14 |
2 |
p. 113-115 3 p. |
artikel |
10 |
Costly cellular phone fraud rises with number ‘cloning’
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 119- 1 p. |
artikel |
11 |
Crash course in 'net security
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 120- 1 p. |
artikel |
12 |
From the editor
|
|
|
1995 |
14 |
2 |
p. 88-89 2 p. |
artikel |
13 |
Hacker alerts intuit to problems with its US tax filing system
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 117-118 2 p. |
artikel |
14 |
Hacking: To criminalize or not ? — suggestions for the legislature
|
Möhrenschlager, Manfred |
|
1995 |
14 |
2 |
p. 103-112 10 p. |
artikel |
15 |
IFIP technical committee 11
|
|
|
1995 |
14 |
2 |
p. 181-183 3 p. |
artikel |
16 |
International Board of Referees
|
|
|
1995 |
14 |
2 |
p. 133-134 2 p. |
artikel |
17 |
Logicode's datasafe modem provides security at 28.8 Kbps
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 121- 1 p. |
artikel |
18 |
Medical records, privacy on the line
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 118- 1 p. |
artikel |
19 |
Motorola, MOBIUS pact aims at halting hackers
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 117- 1 p. |
artikel |
20 |
Mystery ‘virus’ bugged budget
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 117- 1 p. |
artikel |
21 |
Netscape signs up 19 users for its system of Internet security
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 118-119 2 p. |
artikel |
22 |
New computer system causes chaos
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 120-121 2 p. |
artikel |
23 |
On the insecurity of arithmetic coding
|
Cleary, John G. |
|
1995 |
14 |
2 |
p. 167-180 14 p. |
artikel |
24 |
Privacy called endangered species
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 118- 1 p. |
artikel |
25 |
Random Bits & Bytes
|
Highland, Harold Joseph |
|
1995 |
14 |
2 |
p. 90-102 13 p. |
artikel |
26 |
Security aspects of card systems
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 120- 1 p. |
artikel |
27 |
Security starts with access control
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 118- 1 p. |
artikel |
28 |
Sign here — caught in the cross fire of digital signatures
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 121- 1 p. |
artikel |
29 |
Software piracy declines in Asia, elsewhere
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 118- 1 p. |
artikel |
30 |
Subject index for volume 13
|
|
|
1995 |
14 |
2 |
p. 125-132 8 p. |
artikel |
31 |
Time bombs, drop dead devices and electronic software repossession
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 121- 1 p. |
artikel |
32 |
Unravelling copyright rules for cyberspace
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 119- 1 p. |
artikel |
33 |
What's copyrightable in computer software?
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 118- 1 p. |
artikel |
34 |
Workstation access control
|
Collinson, Helen |
|
1995 |
14 |
2 |
p. 121- 1 p. |
artikel |