The SCEAS System
Navigation Menu

Conferences in DBLP

Advanced Courses (ac)
1991 (conf/ac/1991esat)

  1. Bart De Schutter
    Trends in the Fight Against Computer-Related Delinquency. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:3-19 [Conf]
  2. Joos Vandewalle, René Govaerts, Bart Preneel
    Technical Approaches to Thwart Computer Fraud. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:20-30 [Conf]
  3. Marijke De Soete
    Public Key Cryptography. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:33-49 [Conf]
  4. Dominique de Waleffe, Jean-Jacques Quisquater
    Better Login Protocols for Computer Networks. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:50-70 [Conf]
  5. Johan van Tilburg
    Secret-Key Exchange with Authentication. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:71-86 [Conf]
  6. Bart Preneel, René Govaerts, Joos Vandewalle
    Information Authentication: Hash Functions and Digital Signatures. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:87-131 [Conf]
  7. Walter Fumy
    Key Management. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:132-147 [Conf]
  8. David W. Roberts
    Evaluation Criteria for IT Security. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:151-161 [Conf]
  9. Bart Preneel
    Standardization of Cryptographic Techniques. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:162-173 [Conf]
  10. David Chaum
    Numbers Can Be a Better Form of Cash than Paper. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:174-178 [Conf]
  11. Jan Verschuren, René Govaerts, Joos Vandewalle
    ISO-OSI Security Architecture. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:179-192 [Conf]
  12. Klaus Vedder
    Security Aspects of Mobile Communications. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:193-210 [Conf]
  13. Walter Fumy
    (Local Area) Network Security. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:211-226 [Conf]
  14. Antoon Bosselaers, René Govaerts, Joos Vandewalle
    Cryptography Within Phase I of the EEC-RACE Programme. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:227-234 [Conf]
  15. Gordon Lennox
    EDI Security. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:235-243 [Conf]
  16. Marc Geoffroy, Ronny Bjones, Hedwig Cnudde
    AXYTRANS: Physical Funds Transport and DES. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:244-256 [Conf]
  17. Bart De Decker
    Unix Security & Kerberos. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:257-274 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002