Stop the war!
Остановите войну!
for scientists:
default search action
Conference on Information Security Management & Small Systems Security 1999: Amsterdam, The Netherlands
- Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Jan Verschuren:
Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30 - October 1, 1999, Amsterdam, The Netherlands. IFIP Conference Proceedings 154, Kluwer 1999, ISBN 0-7923-8626-4
Reviewed Papers
- Rüdiger Weis:
A protocol improvement for High-bandwidth encryption using non-encrypting Smart Cards. Conference on Information Security Management & Small Systems Security 1999: 1-10 - H. S. Venter, Les Labuschagne, Jan H. P. Eloff:
Real-time Risk Analysis on the Internet: a prototype. Conference on Information Security Management & Small Systems Security 1999: 11-28 - P. H. Samwel, Marcel E. M. Spruit:
A practical approach to manage data communication security. Conference on Information Security Management & Small Systems Security 1999: 29-40 - Matthew J. Warren, William Hutchinson:
The Future of Australian & New Zealand Security Standard AS/NZS 4444?. Conference on Information Security Management & Small Systems Security 1999: 41-50 - Werner Olivier, Rossouw von Solms:
The Effective Utilization of Audit Logs in Information Security Management. Conference on Information Security Management & Small Systems Security 1999: 51-62 - Ann Frisinger, Louise Yngström:
An approach to standardizing security analysis methods for virtual systems. Conference on Information Security Management & Small Systems Security 1999: 63-74 - André Buren, Bert van der Meer, Abbas Shahim, Willem Barnhoorn, Edo Roos Lindereen:
Information Security at Top Level - Securometer® streamlines management information. Conference on Information Security Management & Small Systems Security 1999: 75-88 - Marcel E. M. Spruit, P. H. Samwel:
Risk analysis on Internet connection. Conference on Information Security Management & Small Systems Security 1999: 89-102 - Vassilis Prevelakis:
A Secure Station for Network Monitoring and Control. Conference on Information Security Management & Small Systems Security 1999: 103-116 - Eleanor Hepworth, Ulrich Ultes-Nitsche:
Security aspects of a Java-servlet-based web-hosted e-mail system. Conference on Information Security Management & Small Systems Security 1999: 117-130 - Vincent Cordonnier, Anthony Watson, Sergiy Nemchenko:
Time as an Aid to Improving Security in Smart Cards. Conference on Information Security Management & Small Systems Security 1999: 131-144 - Mark Vandenwauver, Paul Ashley, Gary Gaskell:
The Intranet Authorization Paradigm. Conference on Information Security Management & Small Systems Security 1999: 145-160 - Matthem Berry, Andrew Hutchison, Elton Saul:
Predicting the Performance of Transactional Electronic Commerce Protocols. Conference on Information Security Management & Small Systems Security 1999: 161-178
Invited Papers
- Willis H. Ware:
The Cyber-Posture of the National Information Infrastructure. Conference on Information Security Management & Small Systems Security 1999: 179-204 - Michael Negin, Machiel van der Harst:
Principles of Iris Recognition. Conference on Information Security Management & Small Systems Security 1999: 205-212 - Terry Stanley:
Designing a Secure System for Implementing Chip Cards in the Financial Services Industry. Conference on Information Security Management & Small Systems Security 1999: 213-220 - Stephen Wilson:
New models for the management of public key infrastructure and root certification authorities. Conference on Information Security Management & Small Systems Security 1999: 221-230 - William J. Caelli:
A Secure Electronic Commerce Environment: Only with 'Smart Cards'. Conference on Information Security Management & Small Systems Security 1999: 231-242
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.