nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adding security labelling to windows NT
|
Wiseman, Simon |
|
1999 |
4 |
S1 |
p. 20- 1 p. |
artikel |
2 |
An overview of fingerprint verification technologies
|
O'Gorman, Lawrence |
|
1999 |
4 |
S1 |
p. 28-29 2 p. |
artikel |
3 |
Biometrics — A civil liberties and privacy perspective
|
Davies, Simon |
|
1999 |
4 |
S1 |
p. 32- 1 p. |
artikel |
4 |
Biometrics and Turing's legacy
|
Hawkes, Peter |
|
1999 |
4 |
S1 |
p. 32-33 2 p. |
artikel |
5 |
Cardholder verification realities at point-of-sale
|
Chandler, Ian |
|
1999 |
4 |
S1 |
p. 31-32 2 p. |
artikel |
6 |
Cryptographic algorithms in telecommunications systems
|
Roelofsen, Gert |
|
1999 |
4 |
S1 |
p. 9-10 2 p. |
artikel |
7 |
Data protection and electronic commerce
|
Aldhouse, Francis |
|
1999 |
4 |
S1 |
p. 25-26 2 p. |
artikel |
8 |
Deploying public key infrastructures
|
Khan, Liaquat |
|
1999 |
4 |
S1 |
p. 22-23 2 p. |
artikel |
9 |
Detection of fraud in mobile telecommunications
|
Shawe-Taylor, John |
|
1999 |
4 |
S1 |
p. 8-9 2 p. |
artikel |
10 |
Developing a Windows NT security policy
|
White, Ian |
|
1999 |
4 |
S1 |
p. 19-20 2 p. |
artikel |
11 |
Distributed security services in Microsoft Windows NT 5.0 — Kerberos and the active directory
|
Pittaway, Glenn |
|
1999 |
4 |
S1 |
p. 20-21 2 p. |
artikel |
12 |
Distributed security services in Microsoft Windows 2000 (Windows NT 5.0) — protecting data in the enterprise
|
Pittaway, Glenn |
|
1999 |
4 |
S1 |
p. 14-15 2 p. |
artikel |
13 |
Distributed systems security (volume 1, number 2)
|
|
|
1999 |
4 |
S1 |
p. 34- 1 p. |
artikel |
14 |
EDI security
|
Dosdale, T. |
|
1999 |
4 |
S1 |
p. 27-28 2 p. |
artikel |
15 |
EMV — the ICC specifications for payment systems
|
Ward, Mike |
|
1999 |
4 |
S1 |
p. 6- 1 p. |
artikel |
16 |
Facial recognition — an overview
|
Pampus, Juergen |
|
1999 |
4 |
S1 |
p. 29- 1 p. |
artikel |
17 |
Fundamentals of computer forensics
|
Bates, Jim |
|
1999 |
4 |
S1 |
p. 16-17 2 p. |
artikel |
18 |
How secure are telecoms internetwork communications?
|
Collins, Simon |
|
1999 |
4 |
S1 |
p. 10-11 2 p. |
artikel |
19 |
Implementation implications of biometrics
|
Carter, Bob |
|
1999 |
4 |
S1 |
p. 30- 1 p. |
artikel |
20 |
Implementing a generalized tool for network monitoring
|
Ranum, M.J. |
|
1999 |
4 |
S1 |
p. 15-16 2 p. |
artikel |
21 |
Interfacing with smartcard applications. (The OpenCard Framework and PC/SC)
|
Markantonakis, Constantinos |
|
1999 |
4 |
S1 |
p. 7-8 2 p. |
artikel |
22 |
Java card technology and security
|
Markantonakis, Constantinos |
|
1999 |
4 |
S1 |
p. 26-27 2 p. |
artikel |
23 |
Kerberos authentication in Windows NT 5.0 domains
|
Brundrett, Peter |
|
1999 |
4 |
S1 |
p. 21-22 2 p. |
artikel |
24 |
Measuring and comparing the performance of biometric systems
|
Mansfield, Tony |
|
1999 |
4 |
S1 |
p. 30-31 2 p. |
artikel |
25 |
Mitigating smartcard risks
|
Ayer, Ken |
|
1999 |
4 |
S1 |
p. 6-7 2 p. |
artikel |
26 |
Mondex security strategy
|
Beric, John |
|
1999 |
4 |
S1 |
p. 7- 1 p. |
artikel |
27 |
Network security (volume 2, number 3)
|
|
|
1999 |
4 |
S1 |
p. 33- 1 p. |
artikel |
28 |
Networks — where does the real threat lie?
|
McNamara, Roy |
|
1999 |
4 |
S1 |
p. 16- 1 p. |
artikel |
29 |
Network-versus host-based intrusion detection
|
Schepers, Filip |
|
1999 |
4 |
S1 |
p. 13-14 2 p. |
artikel |
30 |
New perspectives in automatic signature verification
|
Fairhurst, M.C. |
|
1999 |
4 |
S1 |
p. 30- 1 p. |
artikel |
31 |
New security issues raised by open cards
|
Girard, Pierre |
|
1999 |
4 |
S1 |
p. 4-5 2 p. |
artikel |
32 |
Outsourcing (volume 1, number 3)
|
|
|
1999 |
4 |
S1 |
p. 33-34 2 p. |
artikel |
33 |
Physical security of smartcards
|
Kuhn, Markus |
|
1999 |
4 |
S1 |
p. 5- 1 p. |
artikel |
34 |
Public key network infrastructure. (An evolutionary step in the Ascent of WAN)
|
Dennis, Keith R. |
|
1999 |
4 |
S1 |
p. 27- 1 p. |
artikel |
35 |
Recognizing people by their iris patterns
|
Daugman, John |
|
1999 |
4 |
S1 |
p. 29- 1 p. |
artikel |
36 |
Regulation in information security (volume 2, number 1)
|
|
|
1999 |
4 |
S1 |
p. 33- 1 p. |
artikel |
37 |
Security considerations in the use of biometric devices
|
Rejman-Greene, Marek |
|
1999 |
4 |
S1 |
p. 31- 1 p. |
artikel |
38 |
Security in CORBA-based electronic commerce systems
|
Gollmann, Dieter |
|
1999 |
4 |
S1 |
p. 25- 1 p. |
artikel |
39 |
Security issues in a satellite global GSM network
|
Johnston, Thomas F |
|
1999 |
4 |
S1 |
p. 11-12 2 p. |
artikel |
40 |
Security monitoring in heterogeneous globally distributed environments
|
Venables, Phil |
|
1999 |
4 |
S1 |
p. 13- 1 p. |
artikel |
41 |
Smartcard certification
|
Cherrill, David |
|
1999 |
4 |
S1 |
p. 5-6 2 p. |
artikel |
42 |
Smartcards in secure electronic commerce
|
Stirland, Mark |
|
1999 |
4 |
S1 |
p. 23-24 2 p. |
artikel |
43 |
Speaker recognition
|
Markowitz, Judith A. |
|
1999 |
4 |
S1 |
p. 28- 1 p. |
artikel |
44 |
Technical cryptography update — Part 2 (volume 2, number 4)
|
|
|
1999 |
4 |
S1 |
p. 33- 1 p. |
artikel |
45 |
Technical cryptography update (volume 2, number 2)
|
|
|
1999 |
4 |
S1 |
p. 33- 1 p. |
artikel |
46 |
The chip in your wallet — the technology of security in smartcard chip manufacture
|
Paterson, Mike |
|
1999 |
4 |
S1 |
p. 4- 1 p. |
artikel |
47 |
The direction of telecommunications security
|
Walker, Michael |
|
1999 |
4 |
S1 |
p. 12-13 2 p. |
artikel |
48 |
The vulnerability instantiation methodology prototype
|
Barker, Robin |
|
1999 |
4 |
S1 |
p. 17- 1 p. |
artikel |
49 |
Tools and protocols for E-commerce
|
Zaba, Stefek |
|
1999 |
4 |
S1 |
p. 23- 1 p. |
artikel |
50 |
Trusted third parties (volume 1, number 1)
|
|
|
1999 |
4 |
S1 |
p. 34- 1 p. |
artikel |
51 |
Veincheck — A technical perspective
|
Sweeney, Eugene |
|
1999 |
4 |
S1 |
p. 29-30 2 p. |
artikel |
52 |
Will commercial applications for biometric-based solutions really take off in 1998?
|
Thomas, Stephen |
|
1999 |
4 |
S1 |
p. 32- 1 p. |
artikel |
53 |
Windows NT — Remote access
|
Hayday, John |
|
1999 |
4 |
S1 |
p. 18-19 2 p. |
artikel |
54 |
Windows NT security architecture
|
Hayday, John |
|
1999 |
4 |
S1 |
p. 17-18 2 p. |
artikel |
55 |
WYSIWYS? — What you see is what you sign?
|
Landrock, Peter |
|
1999 |
4 |
S1 |
p. 24-25 2 p. |
artikel |