nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A confidentiality system for ISDN inter-PC high-speed file transfer
|
Tanaka, Kiyoto |
|
1996 |
15 |
2 |
p. 141-155 15 p. |
artikel |
2 |
Adding ‘net security
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 127- 1 p. |
artikel |
3 |
A note on distributed coordinated attacks
|
Cohen, Frederick B. |
|
1996 |
15 |
2 |
p. 103-121 19 p. |
artikel |
4 |
A simple scheme to make passwords based on one-way functions much harder to crack
|
Manber, Udi |
|
1996 |
15 |
2 |
p. 171-176 6 p. |
artikel |
5 |
Author index for volume 14
|
|
|
1996 |
15 |
2 |
p. 137-138 2 p. |
artikel |
6 |
Battening down the hatches
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 127-128 2 p. |
artikel |
7 |
Calendar
|
|
|
1996 |
15 |
2 |
p. 129-130 2 p. |
artikel |
8 |
Cylink, GTE target ATM encryption
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 124-125 2 p. |
artikel |
9 |
DE-light shadowed by security concerns
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 126-127 2 p. |
artikel |
10 |
E-mail privacy: a glass almost half full
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 126- 1 p. |
artikel |
11 |
Encryption spec gains momentum
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 123- 1 p. |
artikel |
12 |
Expert: encryption flaws no secret
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 125- 1 p. |
artikel |
13 |
Firewall gets Web capabilities
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 123-124 2 p. |
artikel |
14 |
Firewall servicev unveiled
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 124- 1 p. |
artikel |
15 |
Firewall turns up the heat on internet hackers
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 127- 1 p. |
artikel |
16 |
From the editor
|
|
|
1996 |
15 |
2 |
p. 88-89 2 p. |
artikel |
17 |
HP finds high security ‘net niche
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 123- 1 p. |
artikel |
18 |
IFIP technical committee 11
|
|
|
1996 |
15 |
2 |
p. 177-179 3 p. |
artikel |
19 |
International board of referees
|
|
|
1996 |
15 |
2 |
p. 139-140 2 p. |
artikel |
20 |
Internet security: how much is enough?
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 128- 1 p. |
artikel |
21 |
Intranets: living in your own private internet
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 127- 1 p. |
artikel |
22 |
IT security in Dutch practice
|
Spruit, Marcel E.M. |
|
1996 |
15 |
2 |
p. 157-170 14 p. |
artikel |
23 |
Javascript can trace user tracks
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 126- 1 p. |
artikel |
24 |
Kerberos code crack raises broader issues
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 123- 1 p. |
artikel |
25 |
Medical records security
|
Heinlein, Edwin B. |
|
1996 |
15 |
2 |
p. 100-102 3 p. |
artikel |
26 |
NT gets more secure
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 124- 1 p. |
artikel |
27 |
Online security a pipe dream?
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 125- 1 p. |
artikel |
28 |
Random bits & bytes
|
Joseph Highland, Harold |
|
1996 |
15 |
2 |
p. 90-99 10 p. |
artikel |
29 |
Security risk remains for Web mail
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 124- 1 p. |
artikel |
30 |
Still a few chinks in Java's armour
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 125- 1 p. |
artikel |
31 |
Subject index for volume 14
|
|
|
1996 |
15 |
2 |
p. 131-136 6 p. |
artikel |
32 |
Swiss-cheese secutity
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 125- 1 p. |
artikel |
33 |
The secret struggle
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 127- 1 p. |
artikel |
34 |
Uncle Sam has three-tier scheme for data security
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 126- 1 p. |
artikel |
35 |
Webscan sets up ‘firewall’
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 126- 1 p. |
artikel |
36 |
Win 95 security measures mollify users
|
Collinson, Helen |
|
1996 |
15 |
2 |
p. 125-126 2 p. |
artikel |