nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A framework and assessment instrument for information security culture
|
Da Veiga, A. |
|
2010 |
29 |
2 |
p. 196-207 12 p. |
artikel |
2 |
An efficient and fair buyer–seller fingerprinting scheme for large scale networks
|
Chang, Chin-Chen |
|
2010 |
29 |
2 |
p. 269-277 9 p. |
artikel |
3 |
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
|
Jarraya, Houssem |
|
2010 |
29 |
2 |
p. 180-195 16 p. |
artikel |
4 |
Call for papers
|
|
|
2010 |
29 |
2 |
p. 297- 1 p. |
artikel |
5 |
Call for papers
|
|
|
2010 |
29 |
2 |
p. 296- 1 p. |
artikel |
6 |
Certified electronic mail: Properties revisited
|
Ferrer-Gomilla, Josep Lluis |
|
2010 |
29 |
2 |
p. 167-179 13 p. |
artikel |
7 |
Contents
|
|
|
2010 |
29 |
2 |
p. iii- 1 p. |
artikel |
8 |
Editorial
|
Gritzalis, Dimitris |
|
2010 |
29 |
2 |
p. 165-166 2 p. |
artikel |
9 |
IFC - Editorial Board
|
|
|
2010 |
29 |
2 |
p. IFC- 1 p. |
artikel |
10 |
IFIP TCII - Aims and Scope
|
|
|
2010 |
29 |
2 |
p. 291- 1 p. |
artikel |
11 |
IFIP Technical Committee
|
|
|
2010 |
29 |
2 |
p. 292-295 4 p. |
artikel |
12 |
On the symbiosis of specification-based and anomaly-based detection
|
Stakhanova, Natalia |
|
2010 |
29 |
2 |
p. 253-268 16 p. |
artikel |
13 |
PKI-based trust management in inter-domain scenarios
|
López Millán, Gabriel |
|
2010 |
29 |
2 |
p. 278-290 13 p. |
artikel |
14 |
Survey of network security systems to counter SIP-based denial-of-service attacks
|
Ehlert, Sven |
|
2010 |
29 |
2 |
p. 225-243 19 p. |
artikel |
15 |
Two proposed identity-based three-party authenticated key agreement protocols from pairings
|
Hölbl, Marko |
|
2010 |
29 |
2 |
p. 244-252 9 p. |
artikel |
16 |
WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks
|
Su, Ming-Yang |
|
2010 |
29 |
2 |
p. 208-224 17 p. |
artikel |