-
1
-
-
84860422892
-
Network and data security design for telemedicine applications
-
Makris L, Argiriou N, Strintzis M: Network and data security design for telemedicine applications. Med Informatics 22:133-142, 1997
-
(1997)
Med Informatics
, vol.22
, pp. 133-142
-
-
Makris, L.1
Argiriou, N.2
Strintzis, M.3
-
2
-
-
0030917832
-
Strategy for securing medical documents by electronic signature and encryption
-
Willenberg C: Strategy for securing medical documents by electronic signature and encryption. Radiology 37(4):305-312, 1997
-
(1997)
Radiology
, vol.37
, Issue.4
, pp. 305-312
-
-
Willenberg, C.1
-
3
-
-
0021600381
-
An overview of computer security
-
Summers R: An overview of computer security. IBM Systems J 23:309-325, 1984
-
(1984)
IBM Systems J
, vol.23
, pp. 309-325
-
-
Summers, R.1
-
4
-
-
2442764329
-
Designing a safe network using firewalls
-
Wouters P: Designing a safe network using firewalls. Linux J 40:32-38, 1997
-
(1997)
Linux J
, vol.40
, pp. 32-38
-
-
Wouters, P.1
-
5
-
-
2442747817
-
Haunted by the ghost of smurfing
-
Thomas RO: Haunted by the ghost of smurfing. Sys-Admin 7:63-64, 1999
-
(1999)
Sys-Admin
, vol.7
, pp. 63-64
-
-
Thomas, R.O.1
-
6
-
-
2442762112
-
Who is at the door: The SYN denial of service
-
Stewart D, Maginnis P, Simpson T: Who is at the door: The SYN denial of service. Linux J 38:12-16, 1997
-
(1997)
Linux J
, vol.38
, pp. 12-16
-
-
Stewart, D.1
Maginnis, P.2
Simpson, T.3
-
7
-
-
2442768171
-
Wrap a security blanket around your computer
-
Brotzman L: Wrap a security blanket around your computer. Linux J 40:17-23, 1997
-
(1997)
Linux J
, vol.40
, pp. 17-23
-
-
Brotzman, L.1
-
8
-
-
84860077907
-
Smart cards and biomentrics: Your key to PKI
-
Corcoran D, Sims D, Hillhouse B: Smart cards and biomentrics: Your key to PKI. Linux J 59:68-71, 1999
-
(1999)
Linux J
, vol.59
, pp. 68-71
-
-
Corcoran, D.1
Sims, D.2
Hillhouse, B.3
-
10
-
-
0003406372
-
-
Sebastopol, CA, O'Reilly & Associates
-
Scott C, Wolfe P, Erwin M: Virtual Private Networks (ed 2). Sebastopol, CA, O'Reilly & Associates, www.oreilly.com
-
Virtual Private Networks (Ed 2)
-
-
Scott, C.1
Wolfe, P.2
Erwin, M.3
-
13
-
-
0001903688
-
The IDEA encryption algorithm
-
Schneier B: The IDEA encryption algorithm. Dr Dobb's J 18:50-56, 1993
-
(1993)
Dr Dobb's J
, vol.18
, pp. 50-56
-
-
Schneier, B.1
-
14
-
-
2442748576
-
Pretty good privacy
-
Stallings W: Pretty good privacy. ConnecXions 8:2-11, 1994
-
(1994)
ConnecXions
, vol.8
, pp. 2-11
-
-
Stallings, W.1
-
15
-
-
2442752242
-
Encrypted file systems
-
Giles B: Encrypted file systems. Linux J 51:64-67, 1997
-
(1997)
Linux J
, vol.51
, pp. 64-67
-
-
Giles, B.1
-
16
-
-
2442768922
-
TCFS: Transparent cryptographic file system
-
Mauriello E: TCFS: Transparent cryptographic file system. Linux J 40:64-68, 1997
-
(1997)
Linux J
, vol.40
, pp. 64-68
-
-
Mauriello, E.1
-
17
-
-
0039002059
-
A file system for the 21st century: Previewing the Windows NT 5.0 file system
-
November
-
Richter J, Cabrera L: A file system for the 21st century: Previewing the Windows NT 5.0 file system. Microsoft Systems J November 1998
-
(1998)
Microsoft Systems J
-
-
Richter, J.1
Cabrera, L.2
-
18
-
-
2442741208
-
Virtual private networks
-
Whalin G: Virtual private networks. Sys-Admin 7:21-26, 1999
-
(1999)
Sys-Admin
, vol.7
, pp. 21-26
-
-
Whalin, G.1
-
19
-
-
2442735872
-
Kerberos: An Authentication Service for Open Network Systems
-
Dallas, TX, Winter
-
Stein JG, Neuman C, Schiller JL: Kerberos: An Authentication Service for Open Network Systems. USENIX Conference Proceedings, Dallas, TX, Winter 1998
-
(1998)
USENIX Conference Proceedings
-
-
Stein, J.G.1
Neuman, C.2
Schiller, J.L.3
-
21
-
-
2442726360
-
SATAN: Analyzing your network
-
Havelt R: SATAN: Analyzing your network. Linux J 40:77-78, 1997
-
(1997)
Linux J
, vol.40
, pp. 77-78
-
-
Havelt, R.1
-
22
-
-
2442749309
-
Freeware based security
-
Ali S: Freeware based security, Sys-Admin 8:39-44, 1999
-
(1999)
Sys-Admin
, vol.8
, pp. 39-44
-
-
Ali, S.1
-
23
-
-
2442738967
-
Tripping up intruders with tripwire
-
Fenzi K: Tripping up intruders with tripwire. Linux J 40:75-76, 1997
-
(1997)
Linux J
, vol.40
, pp. 75-76
-
-
Fenzi, K.1
-
24
-
-
0008318806
-
NT vs. UNIX: Is one substantially better?
-
Russinovich M: NT vs. UNIX: Is one substantially better? Windows NT 4:121-132, 1998
-
(1998)
Windows NT
, vol.4
, pp. 121-132
-
-
Russinovich, M.1
-
25
-
-
2442744961
-
IT Security coming of age
-
Hare C: IT Security coming of age. Sys-Admin 7:57-64, 1998
-
(1998)
Sys-Admin
, vol.7
, pp. 57-64
-
-
Hare, C.1
-
26
-
-
0031987340
-
Security for the digital information age of medicine: Issues, applications, and implementation
-
Epstein MA, Pasieka MS, Lord WP, et al: Security for the digital information age of medicine: Issues, applications, and implementation. J Digit Imaging 11:33-44, 1998
-
(1998)
J Digit Imaging
, vol.11
, pp. 33-44
-
-
Epstein, M.A.1
Pasieka, M.S.2
Lord, W.P.3
|