Verifying the authentication of an information system user (English)
- New search for: Ahituv, Niv
- New search for: Lapid, Yeheskel
- New search for: Neumann, Seev
- New search for: Ahituv, Niv
- New search for: Lapid, Yeheskel
- New search for: Neumann, Seev
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Verifying the authentication of an information system user
-
Contributors:
-
Publisher:
-
Publication date:1974-01-01
-
Size:6 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 6, Issue 2
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 97
-
In this issue…Dr.FICS Highland, HaroldJoseph et al. | 1974
- 99
-
How secure are your encryption keys?Dr.FICS Highland, HaroldJoseph et al. | 1974
- 100
-
The DES revisited — Part IIDr.FICS Highland, HaroldJoseph et al. | 1974
- 102
-
Computer security: A new focus at the National Bureau of StandardsDr.FICS Highland, HaroldJoseph et al. | 1974
- 103
-
Technology watchDr.FICS Highland, HaroldJoseph et al. | 1974
- 108
-
The charade of computer securityDr.FICS Highland, HaroldJoseph et al. | 1974
- 109
-
Random notes and reportsDr.FICS Highland, HaroldJoseph et al. | 1974
- 111
-
Computer crime — numbers lieSaari, Juhani et al. | 1974
- 118
-
Protection and administration of information networks with partial orderingsCohe, Fred et al. | 1974
- 129
-
How security fits in — a management viewCDP Schweitzer, James A. et al. | 1974
- 133
-
The hackers' comfortProf. dr. Herschberg, I.S. et al. | 1974
- 139
-
Cost-effectiveness modeling for a decision support system in computer securityBui, Tung / Sivasankaran, Taracad R. et al. | 1974
- 152
-
Verifying the authentication of an information system userAhituv, Niv / Lapid, Yeheskel / Neumann, Seev et al. | 1974
- 158
-
Networks without user observabilityPfitzmann, Andreas / Waidner, Michael et al. | 1974
- 167
-
IFIP/Sec'86: Information security: The challengeDr. Paans, Ronald et al. | 1974
- 172
-
ECOMA-14Paans, Ronald et al. | 1974
- 173
-
First European Conference on Computer Audit, Control & SecurityPaans, Ronald et al. | 1974
- 177
-
Positive alternatives to computer misuse: A report of the proceedings of an ACM panel on hackingLee, J.A.N. / Segal, Gerald et al. | 1974
- 180
-
Abstracts of recent articles and literature| 1974
- 191
-
Calendar| 1974