nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A contest to evaluate IT security services management
|
Moulton, Rolf |
|
2003 |
22 |
3 |
p. 204-206 3 p. |
artikel |
2 |
A model for deriving information security control attribute profiles
|
van der Haar, Helen |
|
2003 |
22 |
3 |
p. 233-244 12 p. |
artikel |
3 |
Analysis of vulnerabilities in Internet firewalls
|
Kamara, Seny |
|
2003 |
22 |
3 |
p. 214-232 19 p. |
artikel |
4 |
Cyber-terrorism in context
|
Hinde, Stephen |
|
2003 |
22 |
3 |
p. 188-192 5 p. |
artikel |
5 |
Events
|
|
|
2003 |
22 |
3 |
p. 212- 1 p. |
artikel |
6 |
Evidence acquisition
|
Wolfe, Hank |
|
2003 |
22 |
3 |
p. 193-195 3 p. |
artikel |
7 |
Fault trees for security system design and analysis
|
Brooke, Phillip J. |
|
2003 |
22 |
3 |
p. 256-264 9 p. |
artikel |
8 |
From the editor-in-chief
|
|
|
2003 |
22 |
3 |
p. 174-175 2 p. |
artikel |
9 |
Generalization of proxy signature-based on discrete logarithms 1 1 This research was partially supported by the National Science Council, Taiwan, R.O.C., under contract no.: NSC91-2213-E-324-003.
|
Li, Li-Hua |
|
2003 |
22 |
3 |
p. 245-255 11 p. |
artikel |
10 |
Governments act to improve security
|
Pounder, Dr Chris |
|
2003 |
22 |
3 |
p. 207-211 5 p. |
artikel |
11 |
Guide for authors
|
|
|
2003 |
22 |
3 |
p. 213- 1 p. |
artikel |
12 |
IFIP technical committee 11
|
|
|
2003 |
22 |
3 |
p. 265-267 3 p. |
artikel |
13 |
International Board of Referees
|
|
|
2003 |
22 |
3 |
p. 213- 1 p. |
artikel |
14 |
International legal aspects of cryptography
|
Aljifri, Hassan |
|
2003 |
22 |
3 |
p. 196-203 8 p. |
artikel |
15 |
Security views
|
Schultz, Eugene |
|
2003 |
22 |
3 |
p. 176-187 12 p. |
artikel |