nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition
|
Li, Ming |
|
2004 |
23 |
7 |
p. 549-558 10 p. |
artikel |
2 |
Authentication and authorization infrastructures (AAIs): a comparative survey
|
Lopez, Javier |
|
2004 |
23 |
7 |
p. 578-590 13 p. |
artikel |
3 |
Enhanced three-party encrypted key exchange without server public keys
|
Lee, Tian-Fu |
|
2004 |
23 |
7 |
p. 571-577 7 p. |
artikel |
4 |
Events Calendar
|
|
|
2004 |
23 |
7 |
p. 547- 1 p. |
artikel |
5 |
Filtering XPath expressions for XML access control
|
Jeon, Jae-Myeong |
|
2004 |
23 |
7 |
p. 591-605 15 p. |
artikel |
6 |
Improvement on Li et al.'s generalization of proxy signature schemes
|
Hwang, Shin-Jia |
|
2004 |
23 |
7 |
p. 615-619 5 p. |
artikel |
7 |
Improving the ROI of the security management process
|
Purser, Steve A. |
|
2004 |
23 |
7 |
p. 542-546 5 p. |
artikel |
8 |
Personalised cryptographic key generation based on FaceHashing
|
Teoh, Andrew B.J. |
|
2004 |
23 |
7 |
p. 606-614 9 p. |
artikel |
9 |
Security views
|
Schultz, Eugene |
|
2004 |
23 |
7 |
p. 533-541 9 p. |
artikel |
10 |
The gap between cryptography and information security: has it narrowed?
|
Schultz Dr, E. Eugene |
|
2004 |
23 |
7 |
p. 531-532 2 p. |
artikel |
11 |
Towards Web Service access control
|
Coetzee, M. |
|
2004 |
23 |
7 |
p. 559-570 12 p. |
artikel |