nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
|
Yang, Jen-Ho |
|
2009 |
28 |
3-4 |
p. 138-143 6 p. |
artikel |
2 |
An incremental frequent structure mining framework for real-time alert correlation
|
Sadoddin, Reza |
|
2009 |
28 |
3-4 |
p. 153-173 21 p. |
artikel |
3 |
Contents
|
|
|
2009 |
28 |
3-4 |
p. iii- 1 p. |
artikel |
4 |
Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions
|
Deepthi, P.P. |
|
2009 |
28 |
3-4 |
p. 229-241 13 p. |
artikel |
5 |
Detecting rogue access points using client-side bottleneck bandwidth analysis
|
Kao, Kuo-Fong |
|
2009 |
28 |
3-4 |
p. 144-152 9 p. |
artikel |
6 |
From desktop to mobile: Examining the security experience
|
Botha, Reinhardt A. |
|
2009 |
28 |
3-4 |
p. 130-137 8 p. |
artikel |
7 |
How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management
|
Liginlal, Divakaran |
|
2009 |
28 |
3-4 |
p. 215-228 14 p. |
artikel |
8 |
IFC - Editorial Board
|
|
|
2009 |
28 |
3-4 |
p. IFC- 1 p. |
artikel |
9 |
IFIP SEC 2009 Advert
|
|
|
2009 |
28 |
3-4 |
p. 246- 1 p. |
artikel |
10 |
Information security: The moving target
|
Dlamini, M.T. |
|
2009 |
28 |
3-4 |
p. 189-198 10 p. |
artikel |
11 |
Preventing massive automated access to web resources
|
Basso, Alessandro |
|
2009 |
28 |
3-4 |
p. 174-188 15 p. |
artikel |
12 |
Reliable and fully distributed trust model for mobile ad hoc networks
|
Omar, Mawloud |
|
2009 |
28 |
3-4 |
p. 199-214 16 p. |
artikel |
13 |
SDriver: Location-specific signatures prevent SQL injection attacks
|
Mitropoulos, Dimitris |
|
2009 |
28 |
3-4 |
p. 121-129 9 p. |
artikel |
14 |
Understanding the limitations of S/MIME digital signatures for e-mails: A GUI based approach
|
Levi, Albert |
|
2009 |
28 |
3-4 |
p. 105-120 16 p. |
artikel |