nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
About “Unofficial patches”
|
Schultz, E. Eugene |
|
2006 |
25 |
2 |
p. 79-80 2 p. |
artikel |
2 |
A framework and taxonomy for comparison of electronic voting schemes
|
Sampigethaya, Krishna |
|
2006 |
25 |
2 |
p. 137-153 17 p. |
artikel |
3 |
A new protocol to counter online dictionary attacks
|
Goyal, Vipul |
|
2006 |
25 |
2 |
p. 114-120 7 p. |
artikel |
4 |
Calendar of Events
|
|
|
2006 |
25 |
2 |
p. EX1- 1 p. |
artikel |
5 |
Computer forensics and electronic discovery: The new management challenge
|
Luoma, Vicki Miller |
|
2006 |
25 |
2 |
p. 91-96 6 p. |
artikel |
6 |
Layered security design for mobile ad hoc networks
|
Komninos, Nikos |
|
2006 |
25 |
2 |
p. 121-130 10 p. |
artikel |
7 |
Provably secure authenticated key exchange protocols for low power computing clients
|
Wen, Hsiang-An |
|
2006 |
25 |
2 |
p. 106-113 8 p. |
artikel |
8 |
Security considerations for incremental hash functions based on pair block chaining
|
Phan, Raphael C.-W. |
|
2006 |
25 |
2 |
p. 131-136 6 p. |
artikel |
9 |
Security Views - Malware Update
|
|
|
2006 |
25 |
2 |
p. 81-88 8 p. |
artikel |
10 |
The metamorphosis of malware writers
|
Bradbury, Danny |
|
2006 |
25 |
2 |
p. 89-90 2 p. |
artikel |
11 |
Uncovering identities: A study into VPN tunnel fingerprinting
|
Izadinia, Vafa D. |
|
2006 |
25 |
2 |
p. 97-105 9 p. |
artikel |