Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             55 results found
no title author magazine year volume issue page(s) type
1 Adding security labelling to windows NT Wiseman, Simon
1999
4 S1 p. 20-
1 p.
article
2 An overview of fingerprint verification technologies O'Gorman, Lawrence
1999
4 S1 p. 28-29
2 p.
article
3 Biometrics — A civil liberties and privacy perspective Davies, Simon
1999
4 S1 p. 32-
1 p.
article
4 Biometrics and Turing's legacy Hawkes, Peter
1999
4 S1 p. 32-33
2 p.
article
5 Cardholder verification realities at point-of-sale Chandler, Ian
1999
4 S1 p. 31-32
2 p.
article
6 Cryptographic algorithms in telecommunications systems Roelofsen, Gert
1999
4 S1 p. 9-10
2 p.
article
7 Data protection and electronic commerce Aldhouse, Francis
1999
4 S1 p. 25-26
2 p.
article
8 Deploying public key infrastructures Khan, Liaquat
1999
4 S1 p. 22-23
2 p.
article
9 Detection of fraud in mobile telecommunications Shawe-Taylor, John
1999
4 S1 p. 8-9
2 p.
article
10 Developing a Windows NT security policy White, Ian
1999
4 S1 p. 19-20
2 p.
article
11 Distributed security services in Microsoft Windows NT 5.0 — Kerberos and the active directory Pittaway, Glenn
1999
4 S1 p. 20-21
2 p.
article
12 Distributed security services in Microsoft Windows 2000 (Windows NT 5.0) — protecting data in the enterprise Pittaway, Glenn
1999
4 S1 p. 14-15
2 p.
article
13 Distributed systems security (volume 1, number 2) 1999
4 S1 p. 34-
1 p.
article
14 EDI security Dosdale, T.
1999
4 S1 p. 27-28
2 p.
article
15 EMV — the ICC specifications for payment systems Ward, Mike
1999
4 S1 p. 6-
1 p.
article
16 Facial recognition — an overview Pampus, Juergen
1999
4 S1 p. 29-
1 p.
article
17 Fundamentals of computer forensics Bates, Jim
1999
4 S1 p. 16-17
2 p.
article
18 How secure are telecoms internetwork communications? Collins, Simon
1999
4 S1 p. 10-11
2 p.
article
19 Implementation implications of biometrics Carter, Bob
1999
4 S1 p. 30-
1 p.
article
20 Implementing a generalized tool for network monitoring Ranum, M.J.
1999
4 S1 p. 15-16
2 p.
article
21 Interfacing with smartcard applications. (The OpenCard Framework and PC/SC) Markantonakis, Constantinos
1999
4 S1 p. 7-8
2 p.
article
22 Java card technology and security Markantonakis, Constantinos
1999
4 S1 p. 26-27
2 p.
article
23 Kerberos authentication in Windows NT 5.0 domains Brundrett, Peter
1999
4 S1 p. 21-22
2 p.
article
24 Measuring and comparing the performance of biometric systems Mansfield, Tony
1999
4 S1 p. 30-31
2 p.
article
25 Mitigating smartcard risks Ayer, Ken
1999
4 S1 p. 6-7
2 p.
article
26 Mondex security strategy Beric, John
1999
4 S1 p. 7-
1 p.
article
27 Network security (volume 2, number 3) 1999
4 S1 p. 33-
1 p.
article
28 Networks — where does the real threat lie? McNamara, Roy
1999
4 S1 p. 16-
1 p.
article
29 Network-versus host-based intrusion detection Schepers, Filip
1999
4 S1 p. 13-14
2 p.
article
30 New perspectives in automatic signature verification Fairhurst, M.C.
1999
4 S1 p. 30-
1 p.
article
31 New security issues raised by open cards Girard, Pierre
1999
4 S1 p. 4-5
2 p.
article
32 Outsourcing (volume 1, number 3) 1999
4 S1 p. 33-34
2 p.
article
33 Physical security of smartcards Kuhn, Markus
1999
4 S1 p. 5-
1 p.
article
34 Public key network infrastructure. (An evolutionary step in the Ascent of WAN) Dennis, Keith R.
1999
4 S1 p. 27-
1 p.
article
35 Recognizing people by their iris patterns Daugman, John
1999
4 S1 p. 29-
1 p.
article
36 Regulation in information security (volume 2, number 1) 1999
4 S1 p. 33-
1 p.
article
37 Security considerations in the use of biometric devices Rejman-Greene, Marek
1999
4 S1 p. 31-
1 p.
article
38 Security in CORBA-based electronic commerce systems Gollmann, Dieter
1999
4 S1 p. 25-
1 p.
article
39 Security issues in a satellite global GSM network Johnston, Thomas F
1999
4 S1 p. 11-12
2 p.
article
40 Security monitoring in heterogeneous globally distributed environments Venables, Phil
1999
4 S1 p. 13-
1 p.
article
41 Smartcard certification Cherrill, David
1999
4 S1 p. 5-6
2 p.
article
42 Smartcards in secure electronic commerce Stirland, Mark
1999
4 S1 p. 23-24
2 p.
article
43 Speaker recognition Markowitz, Judith A.
1999
4 S1 p. 28-
1 p.
article
44 Technical cryptography update — Part 2 (volume 2, number 4) 1999
4 S1 p. 33-
1 p.
article
45 Technical cryptography update (volume 2, number 2) 1999
4 S1 p. 33-
1 p.
article
46 The chip in your wallet — the technology of security in smartcard chip manufacture Paterson, Mike
1999
4 S1 p. 4-
1 p.
article
47 The direction of telecommunications security Walker, Michael
1999
4 S1 p. 12-13
2 p.
article
48 The vulnerability instantiation methodology prototype Barker, Robin
1999
4 S1 p. 17-
1 p.
article
49 Tools and protocols for E-commerce Zaba, Stefek
1999
4 S1 p. 23-
1 p.
article
50 Trusted third parties (volume 1, number 1) 1999
4 S1 p. 34-
1 p.
article
51 Veincheck — A technical perspective Sweeney, Eugene
1999
4 S1 p. 29-30
2 p.
article
52 Will commercial applications for biometric-based solutions really take off in 1998? Thomas, Stephen
1999
4 S1 p. 32-
1 p.
article
53 Windows NT — Remote access Hayday, John
1999
4 S1 p. 18-19
2 p.
article
54 Windows NT security architecture Hayday, John
1999
4 S1 p. 17-18
2 p.
article
55 WYSIWYS? — What you see is what you sign? Landrock, Peter
1999
4 S1 p. 24-25
2 p.
article
                             55 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands