Publisher: Elsevier

Related content
Volume 31, Number 8, 23 April 1999

< previous issue | all issues | next issue >

Favourites:Add to Favourites

Internet security architecture
pp. 787-804(18)
Authors: Cornwell, I.; McNab, A.; Molva, R.

Favourites:Add to Favourites

Towards a taxonomy of intrusion-detection systems
pp. 805-822(18)
Authors: debar, H.; Dacier, M.; Wespi, A.

Favourites:Add to Favourites

The nature of a useable PKI
pp. 823-830(8)
Author: Ellison, C.M.

Favourites:Add to Favourites

Building a high-performance, programmable secure coprocessor
pp. 831-860(30)
Authors: Smith, S.W.; Weingart, S.

Favourites:Add to Favourites

Authenticating public terminals
pp. 861-870(10)
Authors: Asokan, N.; debar, H.; Steiner, M.; Waidner, M.

Favourites:Add to Favourites

Untraceable mobility or how to travel incognito
pp. 871-884(14)
Authors: Ateniese, G.; Herzberg, A.; Krawczyk, H.; Tsudik, G.

Favourites:Add to Favourites

Lowering security overhead in link state routing
pp. 885-894(10)
Authors: Hauser, R.; Przygienda, T.; Tsudik, G.

Share Content

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
X
Cookie Policy
ingentaconnect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more