nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Argentine hacker faces court
|
|
|
1998 |
1998 |
1 |
p. 2- 1 p. |
artikel |
2 |
Biometric products eye mass market
|
|
|
1998 |
1998 |
1 |
p. 5- 1 p. |
artikel |
3 |
Crypto software available over internet
|
|
|
1998 |
1998 |
1 |
p. 4- 1 p. |
artikel |
4 |
DVD cracked
|
Wehde, Ed |
|
1998 |
1998 |
1 |
p. 7- 1 p. |
artikel |
5 |
England ponders trade secrets law
|
|
|
1998 |
1998 |
1 |
p. 9- 1 p. |
artikel |
6 |
Events
|
|
|
1998 |
1998 |
1 |
p. 20- 1 p. |
artikel |
7 |
Framework for evaluating security protocols in a banking environment
|
Eloff, J.H.P. |
|
1998 |
1998 |
1 |
p. 15-19 5 p. |
artikel |
8 |
Industry council presses for data protection bill
|
|
|
1998 |
1998 |
1 |
p. 4- 1 p. |
artikel |
9 |
Network associates abandons key recovery alliance
|
|
|
1998 |
1998 |
1 |
p. 3- 1 p. |
artikel |
10 |
Network security firms join forces
|
|
|
1998 |
1998 |
1 |
p. 3- 1 p. |
artikel |
11 |
RSA contests continue
|
|
|
1998 |
1998 |
1 |
p. 4- 1 p. |
artikel |
12 |
Security systems are not convincing internet users
|
|
|
1998 |
1998 |
1 |
p. 3- 1 p. |
artikel |
13 |
Self regulation proposed
|
Wehde, Ed |
|
1998 |
1998 |
1 |
p. 8- 1 p. |
artikel |
14 |
So, who invented public key cryptography?
|
|
|
1998 |
1998 |
1 |
p. 3- 1 p. |
artikel |
15 |
Sun premieres Java cryptography toolkit
|
|
|
1998 |
1998 |
1 |
p. 5- 1 p. |
artikel |
16 |
Telecoms fraud, the gory details
|
Hoath, Peter |
|
1998 |
1998 |
1 |
p. 10-14 5 p. |
artikel |
17 |
Trojan horses
|
|
|
1998 |
1998 |
1 |
p. 2- 1 p. |
artikel |
18 |
US vulnerable to cyberterrorism
|
|
|
1998 |
1998 |
1 |
p. 6-7 2 p. |
artikel |
19 |
Worm alert
|
|
|
1998 |
1998 |
1 |
p. 2- 1 p. |
artikel |
20 |
Y2K sidelined in Asia and Europe
|
|
|
1998 |
1998 |
1 |
p. 4- 1 p. |
artikel |