no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Information systems security policies: a contextual perspective
|
Karyda, Maria |
|
2005 |
24 |
3 |
p. 246-260 15 p. |
article |
2 |
Matching key recovery mechanisms to business requirements
|
Rantos, Konstantinos |
|
2005 |
24 |
3 |
p. 232-245 14 p. |
article |
3 |
Multiple behavior information fusion based quantitative threat evaluation
|
Chen, Xiu-Zhen |
|
2005 |
24 |
3 |
p. 218-231 14 p. |
article |
4 |
Performance of the Java security manager
|
Herzog, Almut |
|
2005 |
24 |
3 |
p. 192-207 16 p. |
article |
5 |
Secure business application logic for e-commerce systems
|
Nabi, Faisal |
|
2005 |
24 |
3 |
p. 208-217 10 p. |
article |
6 |
Security dilemmas with Microsoft's Internet Explorer
|
Schultz, Eugene |
|
2005 |
24 |
3 |
p. 175-176 2 p. |
article |
7 |
Security views - Malware update
|
|
|
2005 |
24 |
3 |
p. 177-187 11 p. |
article |
8 |
Smart card based authentication – any future?
|
|
|
2005 |
24 |
3 |
p. 188-191 4 p. |
article |