{"title":"Predicting the Performance of Transactional Electronic Commerce Protocols","authors":"Matthem Berry, A. Hutchison, E. Saul","doi":"10.1007/978-0-387-35575-7_13","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_13","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114517538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effective Utilization of Audit Logs in Information Security Management","authors":"W. Olivier, R. V. Solms","doi":"10.1007/978-0-387-35575-7_5","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_5","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134481538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A protocol improvement for High-bandwidth encryption using non-encrypting Smart Cards","authors":"R. Weis","doi":"10.1007/978-0-387-35575-7_1","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_1","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115808448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk analysis on Internet connection","authors":"Marcel E. M. Spruit, P. Samwel","doi":"10.1007/978-0-387-35575-7_8","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_8","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121601290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Station for Network Monitoring and Control","authors":"V. Prevelakis","doi":"10.1007/978-0-387-35575-7_9","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_9","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122598762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Cyber-Posture of the National Information Infrastructure","authors":"W. Ware","doi":"10.1007/978-0-387-35575-7_14","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_14","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127836195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}