Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             14 results found
no title author magazine year volume issue page(s) type
1 Abstracts of Recent Articles and Literature Ecclestone, Rachel
2001
20 7 p. 585-588
4 p.
article
2 Calendar 2001
20 7 p. 589-
1 p.
article
3 Evaluating Trust in a Public Key Certification Authority Chadwick, David W
2001
20 7 p. 592-611
20 p.
article
4 From Risk Analysis to Security Requirements Gerber, Mariana
2001
20 7 p. 577-584
8 p.
article
5 From The Editor Hancock, Bill
2001
20 7 p. 544-545
2 p.
article
6 Guide for Authors 2001
20 7 p. 638-
1 p.
article
7 Hierarchical key assignment without public-key cryptography Lin, Chu-Hsing
2001
20 7 p. 612-619
8 p.
article
8 IFIP Technical Committee 11 2001
20 7 p. 635-637
3 p.
article
9 Incalculable potential for damage by cyber-terrorism Hinde, Stephen
2001
20 7 p. 568-572
5 p.
article
10 International Board of Referees 2001
20 7 p. 590-591
2 p.
article
11 Lessons Learned Hinde, Stephen
2001
20 7 p. 561-567
7 p.
article
12 Security Views Hancock, Bill
2001
20 7 p. 546-560
15 p.
article
13 The European Union Proposal for a Policy Towards Network and Information Security Pounder, Chris
2001
20 7 p. 573-576
4 p.
article
14 Usability and Security An Appraisal of Usability Issues in Information Security Methods Schultz, E.Eugene
2001
20 7 p. 620-634
15 p.
article
                             14 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands