nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A user friendly remote authentication scheme with smart cards
|
Wu, Shyi-Tsong |
|
2003 |
22 |
6 |
p. 547-550 4 p. |
artikel |
2 |
Efficient proxy multisignature schemes based on the elliptic curve cryptosystem
|
Chen, Tzer-Shyong |
|
2003 |
22 |
6 |
p. 527-534 8 p. |
artikel |
3 |
Events
|
|
|
2003 |
22 |
6 |
p. 521- 1 p. |
artikel |
4 |
From the editor-in-chief
|
|
|
2003 |
22 |
6 |
p. 462-463 2 p. |
artikel |
5 |
IFIP technical committee 11
|
|
|
2003 |
22 |
6 |
p. 551-553 3 p. |
artikel |
6 |
New hierarchical assignment without Public Key cryptography
|
Chien, Hung-Yu |
|
2003 |
22 |
6 |
p. 523-526 4 p. |
artikel |
7 |
Operationalizing IT Risk Management
|
Coles, Robert S |
|
2003 |
22 |
6 |
p. 487-493 7 p. |
artikel |
8 |
Presenting the Evidence Report
|
|
|
2003 |
22 |
6 |
p. 479-481 3 p. |
artikel |
9 |
RBAC models — concepts and trends
|
Bertino, Elisa |
|
2003 |
22 |
6 |
p. 511-514 4 p. |
artikel |
10 |
Refereed papers
|
|
|
2003 |
22 |
6 |
p. 522- 1 p. |
artikel |
11 |
Roadmap to checking data migration
|
Kelly, Christopher |
|
2003 |
22 |
6 |
p. 506-510 5 p. |
artikel |
12 |
Security analysis of XML usage and XML parsing
|
Blyth, Dr.Andrew |
|
2003 |
22 |
6 |
p. 494-505 12 p. |
artikel |
13 |
Security engineering and security RoI
|
Leach, Dr John |
|
2003 |
22 |
6 |
p. 482-486 5 p. |
artikel |
14 |
Security middleware for enhancing interoperability of Public Key Infrastructure
|
Lam, Kwok-Yan |
|
2003 |
22 |
6 |
p. 535-546 12 p. |
artikel |
15 |
Security views
|
Schultz, Eugene |
|
2003 |
22 |
6 |
p. 464-473 10 p. |
artikel |
16 |
Spam: the evolution of a nuisance
|
Hinde, Stephen |
|
2003 |
22 |
6 |
p. 474-478 5 p. |
artikel |
17 |
Web services set to provoke new sthreats
|
McKenna, Brian |
|
2003 |
22 |
6 |
p. 515-516 2 p. |
artikel |