nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A note about the identifier parent property in Reed-Solomon codes
|
Fernandez, Marcel |
|
2010 |
29 |
5 |
p. 628-635 8 p. |
artikel |
2 |
A provably secure secret handshake with dynamic controlled matching
|
Sorniotti, Alessandro |
|
2010 |
29 |
5 |
p. 619-627 9 p. |
artikel |
3 |
Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony
|
Soupionis, Yannis |
|
2010 |
29 |
5 |
p. 603-618 16 p. |
artikel |
4 |
Collaborative privacy management
|
Kolter, Jan |
|
2010 |
29 |
5 |
p. 580-591 12 p. |
artikel |
5 |
Contents
|
|
|
2010 |
29 |
5 |
p. iv- 1 p. |
artikel |
6 |
Editorial
|
Gritzalis, Dimitris |
|
2010 |
29 |
5 |
p. 521-522 2 p. |
artikel |
7 |
IFC - Editorial Board
|
|
|
2010 |
29 |
5 |
p. IFC- 1 p. |
artikel |
8 |
IFIP TCII - Aims, Scope and Technical Committee
|
|
|
2010 |
29 |
5 |
p. 636-640 5 p. |
artikel |
9 |
Managing key hierarchies for access control enforcement: Heuristic approaches
|
Blundo, Carlo |
|
2010 |
29 |
5 |
p. 533-547 15 p. |
artikel |
10 |
On a taxonomy of delegation
|
Pham, Quan |
|
2010 |
29 |
5 |
p. 565-579 15 p. |
artikel |
11 |
Reconstruction of electronic signatures from eDocument printouts
|
Leitold, Herbert |
|
2010 |
29 |
5 |
p. 523-532 10 p. |
artikel |
12 |
Roving bugnet: Distributed surveillance threat and mitigation
|
Farley, Ryan |
|
2010 |
29 |
5 |
p. 592-602 11 p. |
artikel |
13 |
Taming role mining complexity in RBAC
|
Colantonio, Alessandro |
|
2010 |
29 |
5 |
p. 548-564 17 p. |
artikel |