nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Analysis of end user security behaviors
|
Stanton, Jeffrey M. |
|
2005 |
24 |
2 |
p. 124-133 10 p. |
artikel |
2 |
An improvement on efficient anonymous auction protocols
|
Jiang, Rui |
|
2005 |
24 |
2 |
p. 169-174 6 p. |
artikel |
3 |
Cryptanalyses of two key assignment schemes based on polynomial interpolations
|
Wang, Shyh-Yih |
|
2005 |
24 |
2 |
p. 134-138 5 p. |
artikel |
4 |
Dealing with packet loss in the Interactive Chained Stream Authentication protocol
|
Bergadano, Francesco |
|
2005 |
24 |
2 |
p. 139-146 8 p. |
artikel |
5 |
Empirical evaluation of SVM-based masquerade detection using UNIX commands
|
Kim, Han-Sung |
|
2005 |
24 |
2 |
p. 160-168 9 p. |
artikel |
6 |
Information Security governance: COBIT or ISO 17799 or both?
|
von Solms, Basie |
|
2005 |
24 |
2 |
p. 99-104 6 p. |
artikel |
7 |
ISRAM: information security risk analysis method
|
Karabacak, Bilge |
|
2005 |
24 |
2 |
p. 147-159 13 p. |
artikel |
8 |
Keyjacking: the surprising insecurity of client-side SSL
|
Marchesini, John |
|
2005 |
24 |
2 |
p. 109-123 15 p. |
artikel |
9 |
Lycos crosses the line
|
Schultz, Dr Eugene |
|
2005 |
24 |
2 |
p. 89-90 2 p. |
artikel |
10 |
Search engines: a growing contributor to security risk
|
Schultz, Dr Eugene |
|
2005 |
24 |
2 |
p. 87-88 2 p. |
artikel |
11 |
Security views: Malware Update
|
|
|
2005 |
24 |
2 |
p. 91-98 8 p. |
artikel |
12 |
The economic approach of information security
|
Tsiakis, Theodosios |
|
2005 |
24 |
2 |
p. 105-108 4 p. |
artikel |