Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             11 results found
no title author magazine year volume issue page(s) type
1 An improvement of Hwang–Lee–Tang's simple remote user authentication scheme Yoon, Eun-Jun
2005
24 1 p. 50-56
7 p.
article
2 A randomized RSA-based partially blind signature scheme for electronic cash Cao, Tianjie
2005
24 1 p. 44-49
6 p.
article
3 A taxonomy of network and computer attacks Hansman, Simon
2005
24 1 p. 31-43
13 p.
article
4 Events Calendar 2005
24 1 p. EX1-
1 p.
article
5 H 2 A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming Challal, Yacine
2005
24 1 p. 57-68
12 p.
article
6 Improvements on the WTLS protocol to avoid denial of service attacks Zhang, Ruishan
2005
24 1 p. 76-82
7 p.
article
7 Information security obedience: a definition Thomson, Kerry-Lynn
2005
24 1 p. 69-75
7 p.
article
8 Management of risk in the information age Gerber, Mariana
2005
24 1 p. 16-30
15 p.
article
9 Multiplexer-based double-exponentiation for normal basis of GF(2 m ) Chiou, Che Wun
2005
24 1 p. 83-86
4 p.
article
10 Security views: Malware update 2005
24 1 p. 1-9
9 p.
article
11 The concept of security and trust in electronic payments Tsiakis, Theodosios
2005
24 1 p. 10-15
6 p.
article
                             11 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands