nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A global security architecture for intrusion detection on computer networks
|
Karim Ganame, Abdoul |
|
2008 |
27 |
1-2 |
p. 30-47 18 p. |
artikel |
2 |
Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies
|
Palmieri, Francesco |
|
2008 |
27 |
1-2 |
p. 48-62 15 p. |
artikel |
3 |
Cryptanalysis of simple three-party key exchange protocol
|
Guo, Hua |
|
2008 |
27 |
1-2 |
p. 16-21 6 p. |
artikel |
4 |
Editorial
|
Wolthusen, S.D. |
|
2008 |
27 |
1-2 |
p. 1- 1 p. |
artikel |
5 |
Efficient identity-based RSA multisignatures
|
Harn, Lein |
|
2008 |
27 |
1-2 |
p. 12-15 4 p. |
artikel |
6 |
Enterprise information security strategies
|
Anderson, Evan E. |
|
2008 |
27 |
1-2 |
p. 22-29 8 p. |
artikel |
7 |
IFC - Editorial Board
|
|
|
2008 |
27 |
1-2 |
p. IFC- 1 p. |
artikel |
8 |
(iii) Contents
|
|
|
2008 |
27 |
1-2 |
p. iii- 1 p. |
artikel |
9 |
Improvement of keystroke data quality through artificial rhythms and cues
|
Kang, Pilsung |
|
2008 |
27 |
1-2 |
p. 3-11 9 p. |
artikel |