nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Application of temporal and spatial role based access control in 802.11 wireless networks
|
Tomur, Emrah |
|
2006 |
25 |
6 |
p. 452-458 7 p. |
artikel |
2 |
A quantitative method for ISO 17799 gap analysis
|
Karabacak, Bilge |
|
2006 |
25 |
6 |
p. 413-419 7 p. |
artikel |
3 |
A secure extension of the Kwak–Moon group signcryption scheme
|
Kwak, DongJin |
|
2006 |
25 |
6 |
p. 435-444 10 p. |
artikel |
4 |
A Secure Identification and Key agreement protocol with user Anonymity (SIKA)
|
Mangipudi, Kumar |
|
2006 |
25 |
6 |
p. 420-425 6 p. |
artikel |
5 |
FTKM: A fault-tolerant key management protocol for multicast communications
|
Seba, H. |
|
2006 |
25 |
6 |
p. 426-434 9 p. |
artikel |
6 |
Guide for Authors.
|
|
|
2006 |
25 |
6 |
p. IV- 1 p. |
artikel |
7 |
IBC - Calendar of Events
|
|
|
2006 |
25 |
6 |
p. CO3- 1 p. |
artikel |
8 |
IFC - Editorial Board
|
|
|
2006 |
25 |
6 |
p. CO2- 1 p. |
artikel |
9 |
(iii) Contents
|
|
|
2006 |
25 |
6 |
p. iii- 1 p. |
artikel |
10 |
Infection, imitation and a hierarchy of computer viruses
|
Zuo, Zhi-hong |
|
2006 |
25 |
6 |
p. 469-473 5 p. |
artikel |
11 |
Information Security Governance: A model based on the Direct–Control Cycle
|
von Solms, Rossouw |
|
2006 |
25 |
6 |
p. 408-412 5 p. |
artikel |
12 |
Microsoft is back in the hot seat
|
Schultz, E. Eugene |
|
2006 |
25 |
6 |
p. 393-394 2 p. |
artikel |
13 |
Microsoft's new window on security
|
Bradbury, Danny |
|
2006 |
25 |
6 |
p. 405-407 3 p. |
artikel |
14 |
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data
|
Abimbola, A.A. |
|
2006 |
25 |
6 |
p. 445-451 7 p. |
artikel |
15 |
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks
|
Amini, Morteza |
|
2006 |
25 |
6 |
p. 459-468 10 p. |
artikel |
16 |
Security Views - Malware Update
|
|
|
2006 |
25 |
6 |
p. 395-404 10 p. |
artikel |