no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Abstracts of Recent Articles and Literature
|
Ecclestone, Rachel |
|
2001 |
20 |
7 |
p. 585-588 4 p. |
article |
2 |
Calendar
|
|
|
2001 |
20 |
7 |
p. 589- 1 p. |
article |
3 |
Evaluating Trust in a Public Key Certification Authority
|
Chadwick, David W |
|
2001 |
20 |
7 |
p. 592-611 20 p. |
article |
4 |
From Risk Analysis to Security Requirements
|
Gerber, Mariana |
|
2001 |
20 |
7 |
p. 577-584 8 p. |
article |
5 |
From The Editor
|
Hancock, Bill |
|
2001 |
20 |
7 |
p. 544-545 2 p. |
article |
6 |
Guide for Authors
|
|
|
2001 |
20 |
7 |
p. 638- 1 p. |
article |
7 |
Hierarchical key assignment without public-key cryptography
|
Lin, Chu-Hsing |
|
2001 |
20 |
7 |
p. 612-619 8 p. |
article |
8 |
IFIP Technical Committee 11
|
|
|
2001 |
20 |
7 |
p. 635-637 3 p. |
article |
9 |
Incalculable potential for damage by cyber-terrorism
|
Hinde, Stephen |
|
2001 |
20 |
7 |
p. 568-572 5 p. |
article |
10 |
International Board of Referees
|
|
|
2001 |
20 |
7 |
p. 590-591 2 p. |
article |
11 |
Lessons Learned
|
Hinde, Stephen |
|
2001 |
20 |
7 |
p. 561-567 7 p. |
article |
12 |
Security Views
|
Hancock, Bill |
|
2001 |
20 |
7 |
p. 546-560 15 p. |
article |
13 |
The European Union Proposal for a Policy Towards Network and Information Security
|
Pounder, Chris |
|
2001 |
20 |
7 |
p. 573-576 4 p. |
article |
14 |
Usability and Security An Appraisal of Usability Issues in Information Security Methods
|
Schultz, E.Eugene |
|
2001 |
20 |
7 |
p. 620-634 15 p. |
article |