nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Access all areas
|
Meyer, Helen |
|
1996 |
15 |
3 |
p. 221-222 2 p. |
artikel |
2 |
A conventional approach to secret balloting in computer networks
|
Jing-Jang, Hwang |
|
1996 |
15 |
3 |
p. 249-262 14 p. |
artikel |
3 |
Bank restless with app-level security
|
Meyer, Helen |
|
1996 |
15 |
3 |
p. 221- 1 p. |
artikel |
4 |
Biology battles PC viruses
|
Meyer, Helen |
|
1996 |
15 |
3 |
p. 222-223 2 p. |
artikel |
5 |
Calendar
|
|
|
1996 |
15 |
3 |
p. 227-228 2 p. |
artikel |
6 |
Cracking the complex world of security
|
Meyer, Helen |
|
1996 |
15 |
3 |
p. 224- 1 p. |
artikel |
7 |
Cypherwiz cracks cybersecurity
|
Meyer, Helen |
|
1996 |
15 |
3 |
p. 221- 1 p. |
artikel |
8 |
Decoding encryption policy
|
Meyer, Helen |
|
1996 |
15 |
3 |
p. 225- 1 p. |
artikel |
9 |
Desperate times call for desperate measures
|
Meyer, Helen |
|
1996 |
15 |
3 |
p. 222- 1 p. |
artikel |
10 |
Digital signatures: how they work
|
Meyer, Helen |
|
1996 |
15 |
3 |
p. 223- 1 p. |
artikel |
11 |
Enforcing legal ownership rights by an access control system
|
Born, Eike |
|
1996 |
15 |
3 |
p. 212-220 9 p. |
artikel |
12 |
Establishing web sites — legal issues and risks
|
Miller, Nigel |
|
1996 |
15 |
3 |
p. 198-202 5 p. |
artikel |
13 |
Firewalls
|
Meyer, Helen |
|
1996 |
15 |
3 |
p. 225-226 2 p. |
artikel |
14 |
Firewalls light up
|
Meyer, Helen |
|
1996 |
15 |
3 |
p. 222- 1 p. |
artikel |
15 |
From the editor
|
|
|
1996 |
15 |
3 |
p. 182-183 2 p. |
artikel |
16 |
IFIP technical committee 11
|
|
|
1996 |
15 |
3 |
p. 263-266 4 p. |
artikel |
17 |
Information protection for publishers
|
Evans, Paul |
|
1996 |
15 |
3 |
p. 209-211 3 p. |
artikel |
18 |
International Board of Referees
|
|
|
1996 |
15 |
3 |
p. 229-230 2 p. |
artikel |
19 |
Internet as a Pornotopia?
|
Blatchford, Clive |
|
1996 |
15 |
3 |
p. 203-208 6 p. |
artikel |
20 |
InterScan blocks internet viruses
|
Meyer, Helen |
|
1996 |
15 |
3 |
p. 224-225 2 p. |
artikel |
21 |
Keep your network virus-free
|
Meyer, Helen |
|
1996 |
15 |
3 |
p. 224- 1 p. |
artikel |
22 |
Random Bits & Bytes
|
Joseph Highland, Harold |
|
1996 |
15 |
3 |
p. 184-197 14 p. |
artikel |
23 |
Real security
|
Meyer, Helen |
|
1996 |
15 |
3 |
p. 223-224 2 p. |
artikel |
24 |
Risk analysis modelling with the use of fuzzy logic
|
de Ru, W.G. |
|
1996 |
15 |
3 |
p. 239-248 10 p. |
artikel |
25 |
Setting up a security perimeter for distributed networks
|
Meyer, Helen |
|
1996 |
15 |
3 |
p. 223- 1 p. |
artikel |
26 |
Smart card based secure password authentication scheme
|
Shiuh-Jeng, Wang |
|
1996 |
15 |
3 |
p. 231-237 7 p. |
artikel |
27 |
Will spies hold your keys
|
Meyer, Helen |
|
1996 |
15 |
3 |
p. 225- 1 p. |
artikel |
28 |
Windows 95 antivirus utilities: the latest in PC protection
|
Meyer, Helen |
|
1996 |
15 |
3 |
p. 222- 1 p. |
artikel |
29 |
Your defensive line
|
Meyer, Helen |
|
1996 |
15 |
3 |
p. 225- 1 p. |
artikel |