nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1990 |
9 |
8 |
p. 739-747 9 p. |
artikel |
2 |
Author index for refereed articles in vol. 9
|
|
|
1990 |
9 |
8 |
p. 751- 1 p. |
artikel |
3 |
Calendar
|
|
|
1990 |
9 |
8 |
p. 749-750 2 p. |
artikel |
4 |
Cognitive passwords: The key to easy access control
|
Zviran, Moshe |
|
1990 |
9 |
8 |
p. 723-736 14 p. |
artikel |
5 |
Computer access control policy choices
|
Olson, Ingrid M. |
|
1990 |
9 |
8 |
p. 699-714 16 p. |
artikel |
6 |
Ethical issues of the information era
|
Bologna, Jack |
|
1990 |
9 |
8 |
p. 689-692 4 p. |
artikel |
7 |
Fifteen major forces driving the civilian information security market
|
Wood, Charles Cresson |
|
1990 |
9 |
8 |
p. 677-686 10 p. |
artikel |
8 |
From the editor
|
|
|
1990 |
9 |
8 |
p. 658-659 2 p. |
artikel |
9 |
IFIP technical committee 11
|
|
|
1990 |
9 |
8 |
p. 737-738 2 p. |
artikel |
10 |
International board of referees
|
|
|
1990 |
9 |
8 |
p. 697- 1 p. |
artikel |
11 |
Perestroika and its implications for computer security in the U.S.S.R.
|
Lathrop, David L. |
|
1990 |
9 |
8 |
p. 693-696 4 p. |
artikel |
12 |
Random bits & bytes
|
Highland, Harold Joseph |
|
1990 |
9 |
8 |
p. 660-675 16 p. |
artikel |
13 |
Subject index for refereed articles in vol. 9
|
|
|
1990 |
9 |
8 |
p. 753-756 4 p. |
artikel |
14 |
Value exchange systems enabling security and unobservability
|
Bürk, Holger |
|
1990 |
9 |
8 |
p. 715-721 7 p. |
artikel |