nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An English auction scheme in the online transaction environment
|
Chen, Tzer-Shyong |
|
2004 |
23 |
5 |
p. 389-399 11 p. |
artikel |
2 |
Cryptanalysis of a user friendly remote authentication scheme with smart cards
|
Yang, Chou-Chen |
|
2004 |
23 |
5 |
p. 425-427 3 p. |
artikel |
3 |
Cumulative notarization for long-term preservation of digital signatures
|
Lekkas, Dimitris |
|
2004 |
23 |
5 |
p. 413-424 12 p. |
artikel |
4 |
Events calender
|
|
|
2004 |
23 |
5 |
p. 377- 1 p. |
artikel |
5 |
Internet privacy law: a comparison between the United States and the European Union
|
Baumer, David L. |
|
2004 |
23 |
5 |
p. 400-412 13 p. |
artikel |
6 |
Keystroke dynamics identity verification—its problems and practical solutions
|
Yu, Enzhe |
|
2004 |
23 |
5 |
p. 428-440 13 p. |
artikel |
7 |
On risk: perception and direction
|
Stewart, Andrew |
|
2004 |
23 |
5 |
p. 362-370 9 p. |
artikel |
8 |
Sarbanes–Oxley—a huge boon to information security in the US
|
Schultz, E.Eugene |
|
2004 |
23 |
5 |
p. 353-354 2 p. |
artikel |
9 |
Search engines and privacy
|
Aljifri, Hassan |
|
2004 |
23 |
5 |
p. 379-388 10 p. |
artikel |
10 |
Security views
|
Schultz, E |
|
2004 |
23 |
5 |
p. 355-361 7 p. |
artikel |
11 |
The 10 deadly sins of information security management
|
von Solms, Basie |
|
2004 |
23 |
5 |
p. 371-376 6 p. |
artikel |