nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comment on the Chen-Chung scheme for hierarchical access control
|
Zhong, Sheng |
|
2003 |
22 |
5 |
p. 450-452 3 p. |
artikel |
2 |
A new taxonomy of Web attacks suitable for efficient encoding
|
Álvarez, Gonzalo |
|
2003 |
22 |
5 |
p. 435-449 15 p. |
artikel |
3 |
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy
|
Hsu, Chien-Lung |
|
2003 |
22 |
5 |
p. 453-456 4 p. |
artikel |
4 |
Encountering encryption
|
Wolfe, Hank |
|
2003 |
22 |
5 |
p. 388-391 4 p. |
artikel |
5 |
Events
|
|
|
2003 |
22 |
5 |
p. 421- 1 p. |
artikel |
6 |
IFIP technical committee 11
|
|
|
2003 |
22 |
5 |
p. 457-459 3 p. |
artikel |
7 |
International Board of Referees
|
|
|
2003 |
22 |
5 |
p. 422- 1 p. |
artikel |
8 |
Leading attackers through attack graphs with deceptions
|
Cohen, Fred |
|
2003 |
22 |
5 |
p. 402-411 10 p. |
artikel |
9 |
Next generation security for wireless: elliptic curve cryptography
|
Vanstone, S.A |
|
2003 |
22 |
5 |
p. 412-415 4 p. |
artikel |
10 |
Pandora’s Box: spyware, adware, autoexecution, and NGSCB
|
Schultz, E.Eugene |
|
2003 |
22 |
5 |
p. 366-367 2 p. |
artikel |
11 |
Privacy legislation: a comparison of the US and European approaches
|
Hinde, Stephen |
|
2003 |
22 |
5 |
p. 378-387 10 p. |
artikel |
12 |
Refereed papers — Guide for Authors
|
|
|
2003 |
22 |
5 |
p. 459- 1 p. |
artikel |
13 |
Security Views
|
Schultz, Eugene |
|
2003 |
22 |
5 |
p. 368-377 10 p. |
artikel |
14 |
SSL Virtual Private Networks
|
Harding, Andrew |
|
2003 |
22 |
5 |
p. 416-420 5 p. |
artikel |
15 |
The 419 scam: information warfare on the spam front and a proposal for local filtering
|
Edelson, Eve |
|
2003 |
22 |
5 |
p. 392-401 10 p. |
artikel |
16 |
Utilising fuzzy logic and trend analysis for effective intrusion detection
|
Botha, Martin |
|
2003 |
22 |
5 |
p. 423-434 12 p. |
artikel |