nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A fair and secure mobile agent environment based on blind signature and proxy host
|
Lin, Min-Hui |
|
2004 |
23 |
3 |
p. 199-212 14 p. |
artikel |
2 |
Computer security impaired by legitimate users
|
Besnard, Denis |
|
2004 |
23 |
3 |
p. 253-264 12 p. |
artikel |
3 |
Digital signature of multicast streams secure against adaptive chosen message attack
|
Zhu, LieHuang |
|
2004 |
23 |
3 |
p. 229-240 12 p. |
artikel |
4 |
Events calender
|
|
|
2004 |
23 |
3 |
p. EX1- 1 p. |
artikel |
5 |
Predicting the intrusion intentions by observing system call sequences
|
Feng, Li |
|
2004 |
23 |
3 |
p. 241-252 12 p. |
artikel |
6 |
Security views
|
Schultz, Eugene |
|
2004 |
23 |
3 |
p. 181-190 10 p. |
artikel |
7 |
The effect of intrusion detection management methods on the return on investment
|
Iheagwara, Charles |
|
2004 |
23 |
3 |
p. 213-228 16 p. |
artikel |
8 |
Towards information security behavioural compliance
|
Vroom, Cheryl |
|
2004 |
23 |
3 |
p. 191-198 8 p. |
artikel |
9 |
Worms and viruses: are we losing control?
|
Schultz, Eugene |
|
2004 |
23 |
3 |
p. 179-180 2 p. |
artikel |