nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A secure multi-item e-auction mechanism with bid privacy
|
Shih, Dong-Her |
|
2011 |
30 |
4 |
p. 273-287 15 p. |
artikel |
2 |
Call for membership
|
|
|
2011 |
30 |
4 |
p. 293- 1 p. |
artikel |
3 |
Contents
|
|
|
2011 |
30 |
4 |
p. iii- 1 p. |
artikel |
4 |
Editorial
|
Spafford, Eugene H. |
|
2011 |
30 |
4 |
p. 171- 1 p. |
artikel |
5 |
Extending the enforcement power of truncation monitors using static analysis
|
Chabot, Hugues |
|
2011 |
30 |
4 |
p. 194-207 14 p. |
artikel |
6 |
HMMPayl: An intrusion detection system based on Hidden Markov Models
|
Ariu, Davide |
|
2011 |
30 |
4 |
p. 221-241 21 p. |
artikel |
7 |
IFC - Editorial Board
|
|
|
2011 |
30 |
4 |
p. IFC- 1 p. |
artikel |
8 |
IFIP TCII - Aims, Scope and Technical Committee
|
|
|
2011 |
30 |
4 |
p. 288-292 5 p. |
artikel |
9 |
Legally “reasonable” security requirements: A 10-year FTC retrospective
|
Breaux, Travis D. |
|
2011 |
30 |
4 |
p. 178-193 16 p. |
artikel |
10 |
Modeling the behavior of users who are confronted with security mechanisms
|
Möller, Sebastian |
|
2011 |
30 |
4 |
p. 242-256 15 p. |
artikel |
11 |
Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach
|
Basagiannis, S. |
|
2011 |
30 |
4 |
p. 257-272 16 p. |
artikel |
12 |
Universally composable and customizable post-processing for practical quantum key distribution
|
Ma, Xiongfeng |
|
2011 |
30 |
4 |
p. 172-177 6 p. |
artikel |
13 |
User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking
|
Gunson, Nancie |
|
2011 |
30 |
4 |
p. 208-220 13 p. |
artikel |