Viiveke Fåk

According to our database1, Viiveke Fåk authored at least 13 papers between 1979 and 2000.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2000
EWS-A Case Study on Access Control in Workflow Systems.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000

1993
Teaching security basics: The Importance of When and How.
Proceedings of the Computer Security, 1993

1991
Computer verification of human users' identity: A theoretical model and some evaluation criteria.
Comput. Secur., 1991

1988
Are we vulnerable to a virus attack? A report from Sweden.
Comput. Secur., 1988

Network Security and Open Systems Interconnection.
Proceedings of the Information Network and Data Communication, 1988

1987
Report from the working conference on "the Crypto User's Handbook" held in Stockholm, October 22-23, 1986 by IFIP WG 11: 4.
Comput. Secur., 1987

Crypto management made manageable - Demands on crypto equipment design.
Comput. Secur., 1987

1986
Electromagnetic radiation revisited, part II.
Comput. Secur., 1986

Software versus hardware encryption - Is there any difference today?
Comput. Secur., 1986

Activities of IFIP Working Group 11: 4 on Crypto Management.
EUROCRYPT, 1986

1983
Cryptographic Protection of Files in an Automated Office System.
Cryptologia, 1983

1982
On security measures in distributed computer systems.
Comput. Secur., 1982

1979
Repeated use of codes which detect deception (Corresp.).
IEEE Trans. Inf. Theory, 1979


  Loading...