nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Attacks on the (enhanced) Yang-Shieh authentication
|
Chen, Ke-Fei |
|
2003 |
22 |
8 |
p. 725-727 3 p. |
artikel |
2 |
Beyond cryptography
|
Heiser, Jay G |
|
2003 |
22 |
8 |
p. 673-674 2 p. |
artikel |
3 |
Calendar of forthcoming conferences and events
|
|
|
2003 |
22 |
8 |
p. 693- 1 p. |
artikel |
4 |
Computer security
|
Hinde, Stephen |
|
2003 |
22 |
8 |
p. 664-669 6 p. |
artikel |
5 |
Efficient anonymous auction protocols with freewheeling bids
|
Chang, Chin-Chen |
|
2003 |
22 |
8 |
p. 728-734 7 p. |
artikel |
6 |
IFIP technical committee 11
|
|
|
2003 |
22 |
8 |
p. 735-737 3 p. |
artikel |
7 |
Improving user security behaviour
|
Leach, John |
|
2003 |
22 |
8 |
p. 685-692 8 p. |
artikel |
8 |
Information security and the media
|
Schultz, E.Eugene |
|
2003 |
22 |
8 |
p. 652-653 2 p. |
artikel |
9 |
International Board of Referees
|
|
|
2003 |
22 |
8 |
p. 694- 1 p. |
artikel |
10 |
Security and human computer interfaces
|
Johnston, J. |
|
2003 |
22 |
8 |
p. 675-684 10 p. |
artikel |
11 |
Security views
|
Schultz, Eugene |
|
2003 |
22 |
8 |
p. 654-663 10 p. |
artikel |
12 |
Setting up an electronic evidence forensics laboratory
|
Wolfe, Hank |
|
2003 |
22 |
8 |
p. 670-672 3 p. |
artikel |
13 |
The availability of source code in relation to timely response to security vulnerabilities
|
Reinke, John |
|
2003 |
22 |
8 |
p. 707-724 18 p. |
artikel |
14 |
Understanding users' keystroke patterns for computer access security
|
Guven, Aykut |
|
2003 |
22 |
8 |
p. 695-706 12 p. |
artikel |