nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1987 |
6 |
4 |
p. 352-362 11 p. |
artikel |
2 |
An approach to containing computer viruses
|
Pozzo, Maria M. |
|
1987 |
6 |
4 |
p. 321-331 11 p. |
artikel |
3 |
Calendar
|
|
|
1987 |
6 |
4 |
p. 363-364 2 p. |
artikel |
4 |
Design and protection of an information network under a partial ordering: A case study
|
Cohen, Fred |
|
1987 |
6 |
4 |
p. 332-338 7 p. |
artikel |
5 |
From the editor…
|
Highland,, Harold Joseph |
|
1987 |
6 |
4 |
p. 285-287 3 p. |
artikel |
6 |
Implementing the RSA cryptosystem
|
Jung, Achim |
|
1987 |
6 |
4 |
p. 342-350 9 p. |
artikel |
7 |
Information systems security: Management success factors
|
Wood, Charles Cresson |
|
1987 |
6 |
4 |
p. 314-320 7 p. |
artikel |
8 |
Report from the working conference on “the Crypto User's Handbook” held in Stockholm, October 22–23, 1986 by IFIP WG 11:4
|
Fåk, Viiveke |
|
1987 |
6 |
4 |
p. 351- 1 p. |
artikel |
9 |
Risk assessment
|
|
|
1987 |
6 |
4 |
p. 297-298 2 p. |
artikel |
10 |
Strategies for extending the useful lifetime of DES
|
Carroll, John M. |
|
1987 |
6 |
4 |
p. 300-313 14 p. |
artikel |
11 |
Technology watch — access control to mainframe
|
|
|
1987 |
6 |
4 |
p. 295-296 2 p. |
artikel |
12 |
The cost of reducing key-storage requirements in secure networks
|
Mitchell, Chris |
|
1987 |
6 |
4 |
p. 339-341 3 p. |
artikel |
13 |
Very light reading
|
|
|
1987 |
6 |
4 |
p. 298-299 2 p. |
artikel |
14 |
Would you report a suspected data crime to the authorities?
|
Highland, Harold Joseph |
|
1987 |
6 |
4 |
p. 288-295 8 p. |
artikel |