The SCEAS System
Navigation Menu

Conferences in DBLP

IFIP TC11/WG11.1 Publications (ifip11-1)
1999 (conf/ifip11-1/1999)

  1. Rüdiger Weis
    A protocol improvement for High-bandwidth encryption using non-encrypting Smart Cards. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:1-10 [Conf]
  2. H. S. Venter, Les Labuschagne, Jan H. P. Eloff
    Real-time Risk Analysis on the Internet: a prototype. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:11-28 [Conf]
  3. P. H. Samwel, Marcel E. M. Spruit
    A practical approach to manage data communication security. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:29-40 [Conf]
  4. Matthew J. Warren, William Hutchinson
    The Future of Australian & New Zealand Security Standard AS/NZS 4444?. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:41-50 [Conf]
  5. Werner Olivier, Rossouw von Solms
    The Effective Utilization of Audit Logs in Information Security Management. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:51-62 [Conf]
  6. Ann Frisinger, Louise Yngström
    An approach to standardizing security analysis methods for virtual systems. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:63-74 [Conf]
  7. André Buren, Bert van der Meer, Abbas Shahim, Willem Barnhoorn, Edo Roos Lindereen
    Information Security at Top Level - Securometer® streamlines management information. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:75-88 [Conf]
  8. Marcel E. M. Spruit, P. H. Samwel
    Risk analysis on Internet connection. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:89-102 [Conf]
  9. Vassilis Prevelakis
    A Secure Station for Network Monitoring and Control. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:103-116 [Conf]
  10. Eleanor Hepworth, Ulrich Ultes-Nitsche
    Security aspects of a Java-servlet-based web-hosted e-mail system. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:117-130 [Conf]
  11. Vincent Cordonnier, Anthony Watson, Sergiy Nemchenko
    Time as an Aid to Improving Security in Smart Cards. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:131-144 [Conf]
  12. Mark Vandenwauver, Paul Ashley, Gary Gaskell
    The Intranet Authorization Paradigm. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:145-160 [Conf]
  13. Matthem Berry, Andrew Hutchison, Elton Saul
    Predicting the Performance of Transactional Electronic Commerce Protocols. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:161-178 [Conf]
  14. Willis H. Ware
    The Cyber-Posture of the National Information Infrastructure. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:179-204 [Conf]
  15. Michael Negin, Machiel van der Harst
    Principles of Iris Recognition. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:205-212 [Conf]
  16. Terry Stanley
    Designing a Secure System for Implementing Chip Cards in the Financial Services Industry. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:213-220 [Conf]
  17. Stephen Wilson
    New models for the management of public key infrastructure and root certification authorities. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:221-230 [Conf]
  18. William J. Caelli
    A Secure Electronic Commerce Environment: Only with `Smart Cards'. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:231-242 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002