Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             36 results found
no title author magazine year volume issue page(s) type
1 A confidentiality system for ISDN inter-PC high-speed file transfer Tanaka, Kiyoto
1996
15 2 p. 141-155
15 p.
article
2 Adding ‘net security Collinson, Helen
1996
15 2 p. 127-
1 p.
article
3 A note on distributed coordinated attacks Cohen, Frederick B.
1996
15 2 p. 103-121
19 p.
article
4 A simple scheme to make passwords based on one-way functions much harder to crack Manber, Udi
1996
15 2 p. 171-176
6 p.
article
5 Author index for volume 14 1996
15 2 p. 137-138
2 p.
article
6 Battening down the hatches Collinson, Helen
1996
15 2 p. 127-128
2 p.
article
7 Calendar 1996
15 2 p. 129-130
2 p.
article
8 Cylink, GTE target ATM encryption Collinson, Helen
1996
15 2 p. 124-125
2 p.
article
9 DE-light shadowed by security concerns Collinson, Helen
1996
15 2 p. 126-127
2 p.
article
10 E-mail privacy: a glass almost half full Collinson, Helen
1996
15 2 p. 126-
1 p.
article
11 Encryption spec gains momentum Collinson, Helen
1996
15 2 p. 123-
1 p.
article
12 Expert: encryption flaws no secret Collinson, Helen
1996
15 2 p. 125-
1 p.
article
13 Firewall gets Web capabilities Collinson, Helen
1996
15 2 p. 123-124
2 p.
article
14 Firewall servicev unveiled Collinson, Helen
1996
15 2 p. 124-
1 p.
article
15 Firewall turns up the heat on internet hackers Collinson, Helen
1996
15 2 p. 127-
1 p.
article
16 From the editor 1996
15 2 p. 88-89
2 p.
article
17 HP finds high security ‘net niche Collinson, Helen
1996
15 2 p. 123-
1 p.
article
18 IFIP technical committee 11 1996
15 2 p. 177-179
3 p.
article
19 International board of referees 1996
15 2 p. 139-140
2 p.
article
20 Internet security: how much is enough? Collinson, Helen
1996
15 2 p. 128-
1 p.
article
21 Intranets: living in your own private internet Collinson, Helen
1996
15 2 p. 127-
1 p.
article
22 IT security in Dutch practice Spruit, Marcel E.M.
1996
15 2 p. 157-170
14 p.
article
23 Javascript can trace user tracks Collinson, Helen
1996
15 2 p. 126-
1 p.
article
24 Kerberos code crack raises broader issues Collinson, Helen
1996
15 2 p. 123-
1 p.
article
25 Medical records security Heinlein, Edwin B.
1996
15 2 p. 100-102
3 p.
article
26 NT gets more secure Collinson, Helen
1996
15 2 p. 124-
1 p.
article
27 Online security a pipe dream? Collinson, Helen
1996
15 2 p. 125-
1 p.
article
28 Random bits & bytes Joseph Highland, Harold
1996
15 2 p. 90-99
10 p.
article
29 Security risk remains for Web mail Collinson, Helen
1996
15 2 p. 124-
1 p.
article
30 Still a few chinks in Java's armour Collinson, Helen
1996
15 2 p. 125-
1 p.
article
31 Subject index for volume 14 1996
15 2 p. 131-136
6 p.
article
32 Swiss-cheese secutity Collinson, Helen
1996
15 2 p. 125-
1 p.
article
33 The secret struggle Collinson, Helen
1996
15 2 p. 127-
1 p.
article
34 Uncle Sam has three-tier scheme for data security Collinson, Helen
1996
15 2 p. 126-
1 p.
article
35 Webscan sets up ‘firewall’ Collinson, Helen
1996
15 2 p. 126-
1 p.
article
36 Win 95 security measures mollify users Collinson, Helen
1996
15 2 p. 125-126
2 p.
article
                             36 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands