Applied Cryptography (English)
- New search for: Joseph, Harold
- New search for: Joseph, Harold
In:
Computers & security
;
15
, 1
; 4
;
1996
-
ISSN:
- Article (Journal) / Print
-
Title:Applied Cryptography
-
Contributors:Joseph, Harold ( author )
-
Published in:Computers & security ; 15, 1 ; 4
-
Publisher:
- New search for: Elsevier
-
Place of publication:Kidlington, Oxford
-
Publication date:1996
-
ISSN:
-
ZDBID:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38 Computersicherheit -
Source:
Table of contents – Volume 15, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 2
-
From the Editor| 1996
- 4
-
Ready for Spamming?Joseph, Harold et al. | 1996
- 4
-
Applied CryptographyJoseph, Harold et al. | 1996
- 4
-
NTIS Volumes of InterestJoseph, Harold et al. | 1996
- 4
-
Fighting Computer CrimeJoseph, Harold et al. | 1996
- 13
-
The New Face of the Virus ThreatDavid, Jon et al. | 1996
- 17
-
The Spook Solution - Now Open For BusinessBuckwell, Mark et al. | 1996
- 27
-
Achieving Interoperable Security Services in Open Systems ProductsSmith, Paul et al. | 1996
- 39
-
A Probabilistic Flaw in PGP DesignMoreau, Thierry et al. | 1996
- 44
-
Abstracts of recent articles and literature| 1996
- 50
-
Calendar of forthcoming conferences and events| 1996
- 53
-
International Board of Referees| 1996
- 55
-
Security classification for documentsEloff, J. et al. | 1996
- 73
-
An access control system based on Chinese remainder theorem and time stamp conceptHwang, Min-Shiang et al. | 1996
- 83
-
IFIP Technical Committee 11| 1996
- 86
-
Guide for Authors| 1996