nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Analyses of two end-user software vulnerability exposure metrics (extended version)
|
L. Wright, Jason |
|
2013 |
17 |
4 |
p. 173-184 |
artikel |
2 |
Analyzing settings for social identity management on Social Networking Sites: Classification, current state, and proposed developments
|
Riesner, Moritz |
|
2013 |
17 |
4 |
p. 185-198 |
artikel |
3 |
ARES 2012 special issue
|
|
|
2013 |
17 |
4 |
p. 129-130 |
artikel |
4 |
Bridging the gap between role mining and role engineering via migration guides
|
Baumgrass, Anne |
|
2013 |
17 |
4 |
p. 148-172 |
artikel |
5 |
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs
|
Frühwirt, Peter |
|
2013 |
17 |
4 |
p. 227-238 |
artikel |
6 |
Oblivious and fair server-aided two-party computation
|
Herzberg, Amir |
|
2013 |
17 |
4 |
p. 210-226 |
artikel |
7 |
On measuring the parasitic backscatter of sensor-enabled UHF RFID tags
|
Plos, Thomas |
|
2013 |
17 |
4 |
p. 239-252 |
artikel |
8 |
Semantic analysis of role mining results and shadowed roles detection
|
Hachana, Safaà |
|
2013 |
17 |
4 |
p. 131-147 |
artikel |
9 |
Toward web-based information security knowledge sharing
|
Feledi, Daniel |
|
2013 |
17 |
4 |
p. 199-209 |
artikel |