Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             21 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks Tan, Hailun
2013
32 C p. 36-55
20 p.
artikel
2 A middleware approach for outsourcing data securely Jammalamadaka, Ravi Chandra
2013
32 C p. 252-266
15 p.
artikel
3 A universal system for fair non-repudiable certified e-mail without a trusted third party Paulin, Alois
2013
32 C p. 207-218
12 p.
artikel
4 Contents 2013
32 C p. iii-iv
nvt p.
artikel
5 Design and formal security evaluation of NeMHIP: A new secure and efficient network mobility management protocol based on the Host Identity Protocol Toledo, Nerea
2013
32 C p. 1-18
18 p.
artikel
6 Digital media triage with bulk data analysis and bulk_extractor Garfinkel, Simson L.
2013
32 C p. 56-72
17 p.
artikel
7 Editorial Spafford, Eugene H.
2013
32 C p. v-
1 p.
artikel
8 Editorial Board 2013
32 C p. IFC-
1 p.
artikel
9 EVIV: An end-to-end verifiable Internet voting system Joaquim, Rui
2013
32 C p. 170-191
22 p.
artikel
10 Exploring attack graph for cost-benefit security hardening: A probabilistic approach Wang, Shuzhen
2013
32 C p. 158-169
12 p.
artikel
11 From keyloggers to touchloggers: Take the rough with the smooth Damopoulos, D.
2013
32 C p. 102-114
13 p.
artikel
12 Future directions for behavioral information security research Crossler, Robert E.
2013
32 C p. 90-101
12 p.
artikel
13 Hacking VoIP Soupionis, Yannis
2013
32 C p. 267-
1 p.
artikel
14 LSB matching steganalysis based on patterns of pixel differences and random embedding Lerch-Hostalot, Daniel
2013
32 C p. 192-206
15 p.
artikel
15 Metasploit the Penetration Tester's Guide Kandias, Miltiadis
2013
32 C p. 268-269
2 p.
artikel
16 On the detection of desynchronisation attacks against security protocols that use dynamic shared secrets Lasc, Ioana
2013
32 C p. 115-129
15 p.
artikel
17 Security-related behavior in using information systems in the workplace: A review and synthesis Guo, Ken H.
2013
32 C p. 242-251
10 p.
artikel
18 Systematic bug finding and fault localization enhanced with input data tracking DeMott, Jared D.
2013
32 C p. 130-157
28 p.
artikel
19 The architecture of a digital forensic readiness management system Reddy, K.
2013
32 C p. 73-89
17 p.
artikel
20 The state of the art of application restrictions and sandboxes: A survey of application-oriented access controls and their shortfalls Schreuders, Z. Cliffe
2013
32 C p. 219-241
23 p.
artikel
21 Tree-formed verification data for trusted platforms Schmidt, Andreas U.
2013
32 C p. 19-35
17 p.
artikel
                             21 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland