nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Data protection and Electronic Commerce
|
Aldhouse, Francis |
|
1998 |
3 |
2 |
p. 71-81 11 p. |
artikel |
2 |
Deploying public key infrastructures
|
Khan, Liaquat |
|
1998 |
3 |
2 |
p. 18-33 16 p. |
artikel |
3 |
EDI security
|
Dosdale, T. |
|
1998 |
3 |
2 |
p. 98-110 13 p. |
artikel |
4 |
Introduction
|
Ciechanowicz, Chez |
|
1998 |
3 |
2 |
p. 1-2 2 p. |
artikel |
5 |
Java card technology and security
|
Markantonakis, Constantinos |
|
1998 |
3 |
2 |
p. 82-89 8 p. |
artikel |
6 |
Public key network infrastructure
|
Dennis, Keith R. |
|
1998 |
3 |
2 |
p. 90-97 8 p. |
artikel |
7 |
Report highlights
|
|
|
1998 |
3 |
2 |
p. 3-17 15 p. |
artikel |
8 |
Security in CORBA-based electronic commerce systems
|
Gollmann, Dieter |
|
1998 |
3 |
2 |
p. 62-70 9 p. |
artikel |
9 |
Smartcards in secure Electronic Commerce
|
Stirland, Mark |
|
1998 |
3 |
2 |
p. 41-54 14 p. |
artikel |
10 |
Tools and protocols for E-commerce
|
Zaba, Stefek |
|
1998 |
3 |
2 |
p. 34-40 7 p. |
artikel |
11 |
WYSIWYS? — What you see is what you sign?
|
Landrock, Peter |
|
1998 |
3 |
2 |
p. 55-61 7 p. |
artikel |