Conference on Information Security Management & Small Systems Security最新文献

筛选
英文 中文
Intrusion Detection Systems: Possibilities for the Future 入侵检测系统:未来的可能性
Conference on Information Security Management & Small Systems Security Pub Date : 2001-09-27 DOI: 10.1007/0-306-47007-1_14
K. Forcht, C. Allen, Barbara Brodman, David Corning, J. Kouns
{"title":"Intrusion Detection Systems: Possibilities for the Future","authors":"K. Forcht, C. Allen, Barbara Brodman, David Corning, J. Kouns","doi":"10.1007/0-306-47007-1_14","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_14","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123082521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing a Secure System for Implementing Chip Cards in the Financial Services Industry 设计一种在金融服务业中实施芯片卡的安全系统
Conference on Information Security Management & Small Systems Security Pub Date : 1999-09-30 DOI: 10.1007/978-0-387-35575-7_16
Terry Stanley
{"title":"Designing a Secure System for Implementing Chip Cards in the Financial Services Industry","authors":"Terry Stanley","doi":"10.1007/978-0-387-35575-7_16","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_16","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123236941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security aspects of a Java-servlet-based web-hosted e-mail system 基于java -servlet的web托管电子邮件系统的安全方面
Conference on Information Security Management & Small Systems Security Pub Date : 1999-09-30 DOI: 10.1007/978-0-387-35575-7_10
E. Hepworth, U. Ultes-Nitsche
{"title":"Security aspects of a Java-servlet-based web-hosted e-mail system","authors":"E. Hepworth, U. Ultes-Nitsche","doi":"10.1007/978-0-387-35575-7_10","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_10","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130270330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Intranet Authorization Paradigm 内网授权模式
Conference on Information Security Management & Small Systems Security Pub Date : 1999-09-30 DOI: 10.1007/978-0-387-35575-7_12
M. Vandenwauver, P. Ashley, Gary Gaskell
{"title":"The Intranet Authorization Paradigm","authors":"M. Vandenwauver, P. Ashley, Gary Gaskell","doi":"10.1007/978-0-387-35575-7_12","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_12","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126826009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Future of Australian & New Zealand Security Standard AS/NZS 4444? 澳大利亚和新西兰安全标准AS/NZS 4444的未来?
Conference on Information Security Management & Small Systems Security Pub Date : 1999-09-30 DOI: 10.1007/978-0-387-35575-7_4
M. Warren, W. Hutchinson
{"title":"The Future of Australian & New Zealand Security Standard AS/NZS 4444?","authors":"M. Warren, W. Hutchinson","doi":"10.1007/978-0-387-35575-7_4","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_4","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125267226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Secure Electronic Commerce Environment: Only with 'Smart Cards' 安全的电子商务环境:只需要智能卡
Conference on Information Security Management & Small Systems Security Pub Date : 1999-09-30 DOI: 10.1007/978-0-387-35575-7_18
W. Caelli
{"title":"A Secure Electronic Commerce Environment: Only with 'Smart Cards'","authors":"W. Caelli","doi":"10.1007/978-0-387-35575-7_18","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_18","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133365172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A practical approach to manage data communication security 管理数据通信安全的实用方法
Conference on Information Security Management & Small Systems Security Pub Date : 1999-09-30 DOI: 10.1007/978-0-387-35575-7_3
P. Samwel, Marcel E. M. Spruit
{"title":"A practical approach to manage data communication security","authors":"P. Samwel, Marcel E. M. Spruit","doi":"10.1007/978-0-387-35575-7_3","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_3","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121868152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time as an Aid to Improving Security in Smart Cards 时间是提高智能卡安全性的辅助工具
Conference on Information Security Management & Small Systems Security Pub Date : 1999-09-30 DOI: 10.1007/978-0-387-35575-7_11
V. Cordonnier, Anthony Watson, S. Nemchenko
{"title":"Time as an Aid to Improving Security in Smart Cards","authors":"V. Cordonnier, Anthony Watson, S. Nemchenko","doi":"10.1007/978-0-387-35575-7_11","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_11","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130341305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An approach to standardizing security analysis methods for virtual systems 虚拟系统安全分析方法的标准化研究
Conference on Information Security Management & Small Systems Security Pub Date : 1999-09-30 DOI: 10.1007/978-0-387-35575-7_6
Ann Frisinger, L. Yngström
{"title":"An approach to standardizing security analysis methods for virtual systems","authors":"Ann Frisinger, L. Yngström","doi":"10.1007/978-0-387-35575-7_6","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_6","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123650621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Principles of Iris Recognition 虹膜识别原理
Conference on Information Security Management & Small Systems Security Pub Date : 1999-09-30 DOI: 10.1007/978-0-387-35575-7_15
M. Negin, Machiel van der Harst
{"title":"Principles of Iris Recognition","authors":"M. Negin, Machiel van der Harst","doi":"10.1007/978-0-387-35575-7_15","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_15","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123103889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信