nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A password authentication scheme with secure password updating
|
Lin, Chun-Li |
|
2003 |
22 |
1 |
p. 68-72 5 p. |
artikel |
2 |
A quantitative study of Public Key Infrastructures
|
Bruschi, D |
|
2003 |
22 |
1 |
p. 56-67 12 p. |
artikel |
3 |
A tangled Web of libel lies?
|
Pounder, Dr Chris |
|
2003 |
22 |
1 |
p. 34-37 4 p. |
artikel |
4 |
Computer forensics
|
Wolfe, Dr.Henry B |
|
2003 |
22 |
1 |
p. 26-28 3 p. |
artikel |
5 |
Efficient anomaly detection by modeling privilege flows using hidden Markov model
|
Cho, Sung-Bae |
|
2003 |
22 |
1 |
p. 45-55 11 p. |
artikel |
6 |
Events
|
|
|
2003 |
22 |
1 |
p. 43- 1 p. |
artikel |
7 |
From the editor-in-chief
|
|
|
2003 |
22 |
1 |
p. 2-3 2 p. |
artikel |
8 |
Guide for Authors
|
|
|
2003 |
22 |
1 |
p. 44- 1 p. |
artikel |
9 |
IFIP technical committee 11
|
|
|
2003 |
22 |
1 |
p. 73-75 3 p. |
artikel |
10 |
International Board of Referees
|
|
|
2003 |
22 |
1 |
p. 44- 1 p. |
artikel |
11 |
LIRVA virus
|
Fisher, Mark |
|
2003 |
22 |
1 |
p. 41-42 2 p. |
artikel |
12 |
Reseacrh in cryptography and security mechanisms
|
Piper, Fred |
|
2003 |
22 |
1 |
p. 22-25 4 p. |
artikel |
13 |
Security in a Flash
|
David, Jon |
|
2003 |
22 |
1 |
p. 29-33 5 p. |
artikel |
14 |
Security views
|
Schultz, Eugene |
|
2003 |
22 |
1 |
p. 4-13 10 p. |
artikel |
15 |
Time cost$ money
|
Hinde, Stephen |
|
2003 |
22 |
1 |
p. 14-21 8 p. |
artikel |
16 |
UK police promise charter to guard good names
|
McKenna, Brian |
|
2003 |
22 |
1 |
p. 38-40 3 p. |
artikel |