Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             55 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adding security labelling to windows NT Wiseman, Simon
1999
4 S1 p. 20-
1 p.
artikel
2 An overview of fingerprint verification technologies O'Gorman, Lawrence
1999
4 S1 p. 28-29
2 p.
artikel
3 Biometrics — A civil liberties and privacy perspective Davies, Simon
1999
4 S1 p. 32-
1 p.
artikel
4 Biometrics and Turing's legacy Hawkes, Peter
1999
4 S1 p. 32-33
2 p.
artikel
5 Cardholder verification realities at point-of-sale Chandler, Ian
1999
4 S1 p. 31-32
2 p.
artikel
6 Cryptographic algorithms in telecommunications systems Roelofsen, Gert
1999
4 S1 p. 9-10
2 p.
artikel
7 Data protection and electronic commerce Aldhouse, Francis
1999
4 S1 p. 25-26
2 p.
artikel
8 Deploying public key infrastructures Khan, Liaquat
1999
4 S1 p. 22-23
2 p.
artikel
9 Detection of fraud in mobile telecommunications Shawe-Taylor, John
1999
4 S1 p. 8-9
2 p.
artikel
10 Developing a Windows NT security policy White, Ian
1999
4 S1 p. 19-20
2 p.
artikel
11 Distributed security services in Microsoft Windows NT 5.0 — Kerberos and the active directory Pittaway, Glenn
1999
4 S1 p. 20-21
2 p.
artikel
12 Distributed security services in Microsoft Windows 2000 (Windows NT 5.0) — protecting data in the enterprise Pittaway, Glenn
1999
4 S1 p. 14-15
2 p.
artikel
13 Distributed systems security (volume 1, number 2) 1999
4 S1 p. 34-
1 p.
artikel
14 EDI security Dosdale, T.
1999
4 S1 p. 27-28
2 p.
artikel
15 EMV — the ICC specifications for payment systems Ward, Mike
1999
4 S1 p. 6-
1 p.
artikel
16 Facial recognition — an overview Pampus, Juergen
1999
4 S1 p. 29-
1 p.
artikel
17 Fundamentals of computer forensics Bates, Jim
1999
4 S1 p. 16-17
2 p.
artikel
18 How secure are telecoms internetwork communications? Collins, Simon
1999
4 S1 p. 10-11
2 p.
artikel
19 Implementation implications of biometrics Carter, Bob
1999
4 S1 p. 30-
1 p.
artikel
20 Implementing a generalized tool for network monitoring Ranum, M.J.
1999
4 S1 p. 15-16
2 p.
artikel
21 Interfacing with smartcard applications. (The OpenCard Framework and PC/SC) Markantonakis, Constantinos
1999
4 S1 p. 7-8
2 p.
artikel
22 Java card technology and security Markantonakis, Constantinos
1999
4 S1 p. 26-27
2 p.
artikel
23 Kerberos authentication in Windows NT 5.0 domains Brundrett, Peter
1999
4 S1 p. 21-22
2 p.
artikel
24 Measuring and comparing the performance of biometric systems Mansfield, Tony
1999
4 S1 p. 30-31
2 p.
artikel
25 Mitigating smartcard risks Ayer, Ken
1999
4 S1 p. 6-7
2 p.
artikel
26 Mondex security strategy Beric, John
1999
4 S1 p. 7-
1 p.
artikel
27 Network security (volume 2, number 3) 1999
4 S1 p. 33-
1 p.
artikel
28 Networks — where does the real threat lie? McNamara, Roy
1999
4 S1 p. 16-
1 p.
artikel
29 Network-versus host-based intrusion detection Schepers, Filip
1999
4 S1 p. 13-14
2 p.
artikel
30 New perspectives in automatic signature verification Fairhurst, M.C.
1999
4 S1 p. 30-
1 p.
artikel
31 New security issues raised by open cards Girard, Pierre
1999
4 S1 p. 4-5
2 p.
artikel
32 Outsourcing (volume 1, number 3) 1999
4 S1 p. 33-34
2 p.
artikel
33 Physical security of smartcards Kuhn, Markus
1999
4 S1 p. 5-
1 p.
artikel
34 Public key network infrastructure. (An evolutionary step in the Ascent of WAN) Dennis, Keith R.
1999
4 S1 p. 27-
1 p.
artikel
35 Recognizing people by their iris patterns Daugman, John
1999
4 S1 p. 29-
1 p.
artikel
36 Regulation in information security (volume 2, number 1) 1999
4 S1 p. 33-
1 p.
artikel
37 Security considerations in the use of biometric devices Rejman-Greene, Marek
1999
4 S1 p. 31-
1 p.
artikel
38 Security in CORBA-based electronic commerce systems Gollmann, Dieter
1999
4 S1 p. 25-
1 p.
artikel
39 Security issues in a satellite global GSM network Johnston, Thomas F
1999
4 S1 p. 11-12
2 p.
artikel
40 Security monitoring in heterogeneous globally distributed environments Venables, Phil
1999
4 S1 p. 13-
1 p.
artikel
41 Smartcard certification Cherrill, David
1999
4 S1 p. 5-6
2 p.
artikel
42 Smartcards in secure electronic commerce Stirland, Mark
1999
4 S1 p. 23-24
2 p.
artikel
43 Speaker recognition Markowitz, Judith A.
1999
4 S1 p. 28-
1 p.
artikel
44 Technical cryptography update — Part 2 (volume 2, number 4) 1999
4 S1 p. 33-
1 p.
artikel
45 Technical cryptography update (volume 2, number 2) 1999
4 S1 p. 33-
1 p.
artikel
46 The chip in your wallet — the technology of security in smartcard chip manufacture Paterson, Mike
1999
4 S1 p. 4-
1 p.
artikel
47 The direction of telecommunications security Walker, Michael
1999
4 S1 p. 12-13
2 p.
artikel
48 The vulnerability instantiation methodology prototype Barker, Robin
1999
4 S1 p. 17-
1 p.
artikel
49 Tools and protocols for E-commerce Zaba, Stefek
1999
4 S1 p. 23-
1 p.
artikel
50 Trusted third parties (volume 1, number 1) 1999
4 S1 p. 34-
1 p.
artikel
51 Veincheck — A technical perspective Sweeney, Eugene
1999
4 S1 p. 29-30
2 p.
artikel
52 Will commercial applications for biometric-based solutions really take off in 1998? Thomas, Stephen
1999
4 S1 p. 32-
1 p.
artikel
53 Windows NT — Remote access Hayday, John
1999
4 S1 p. 18-19
2 p.
artikel
54 Windows NT security architecture Hayday, John
1999
4 S1 p. 17-18
2 p.
artikel
55 WYSIWYS? — What you see is what you sign? Landrock, Peter
1999
4 S1 p. 24-25
2 p.
artikel
                             55 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland