nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Access control in a hierarchy using one-way hash functions
|
Yang, Cungang |
|
2004 |
23 |
8 |
p. 659-664 6 p. |
artikel |
2 |
A framework for the governance of information security
|
Posthumus, Shaun |
|
2004 |
23 |
8 |
p. 638-646 9 p. |
artikel |
3 |
A hybrid scheme for multicast authentication over lossy networks
|
Aslan, Heba K. |
|
2004 |
23 |
8 |
p. 705-713 9 p. |
artikel |
4 |
Characterization of defense mechanisms against distributed denial of service attacks
|
Chen, Li-Chiou |
|
2004 |
23 |
8 |
p. 665-678 14 p. |
artikel |
5 |
Embedding biometric identifiers in 2D barcodes for improved security
|
Noore, Afzel |
|
2004 |
23 |
8 |
p. 679-686 8 p. |
artikel |
6 |
Events Calendar
|
|
|
2004 |
23 |
8 |
p. 647- 1 p. |
artikel |
7 |
From secure wired networks to secure wireless networks – what are the extra risks?
|
von Solms, Basie |
|
2004 |
23 |
8 |
p. 633-637 5 p. |
artikel |
8 |
Is the U.S. government really getting serious about information security?
|
Schultz, Eugene |
|
2004 |
23 |
8 |
p. 621-622 2 p. |
artikel |
9 |
Modelling and solving the intrusion detection problem in computer networks
|
Beghdad, Rachid |
|
2004 |
23 |
8 |
p. 687-696 10 p. |
artikel |
10 |
New efficient user identification and key distribution scheme providing enhanced security
|
Yang, Yanjiang |
|
2004 |
23 |
8 |
p. 697-704 8 p. |
artikel |
11 |
Security views
|
|
|
2004 |
23 |
8 |
p. 623-632 10 p. |
artikel |
12 |
XML distributed security policy for clusters
|
Apvrille, A. |
|
2004 |
23 |
8 |
p. 649-658 10 p. |
artikel |