nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1990 |
9 |
3 |
p. 265-273 9 p. |
artikel |
2 |
A discussion of implementation strategies for secure database management systems
|
Laferriere, Claude |
|
1990 |
9 |
3 |
p. 235-244 10 p. |
artikel |
3 |
Criminological concepts and research findings relevant for improving computer crime control
|
Sherizen, Sanford |
|
1990 |
9 |
3 |
p. 215-222 8 p. |
artikel |
4 |
Cryptanalysis of a fast cryptographic checksum algorithm
|
Preneel, Bart |
|
1990 |
9 |
3 |
p. 257-262 6 p. |
artikel |
5 |
From the editor
|
|
|
1990 |
9 |
3 |
p. 194-195 2 p. |
artikel |
6 |
IFIP technical committee 11
|
|
|
1990 |
9 |
3 |
p. 263-264 2 p. |
artikel |
7 |
International board of referees
|
|
|
1990 |
9 |
3 |
p. 233- 1 p. |
artikel |
8 |
More options for physical access control
|
Klopp, Charlotte |
|
1990 |
9 |
3 |
p. 229-232 4 p. |
artikel |
9 |
Random bits & bytes
|
Highland, HaroldJoseph |
|
1990 |
9 |
3 |
p. 196-208 13 p. |
artikel |
10 |
Sloppy, sloppier, sloppiest
|
Herschberg, I.S. |
|
1990 |
9 |
3 |
p. 223-228 6 p. |
artikel |
11 |
Transaction protection by “antennas”
|
Muftic, Sead |
|
1990 |
9 |
3 |
p. 245-255 11 p. |
artikel |
12 |
Understanding data communication security vulnerabilities
|
Menkus, Belden |
|
1990 |
9 |
3 |
p. 209-213 5 p. |
artikel |