PROCEEDINGS VOLUME 2616
PHOTONICS EAST '95 | 22-26 OCTOBER 1995
Information Protection and Network Security
Editor(s): Viktor E. Hampel, Clifford B. Neuman, John Perry Barlow
Editor Affiliations +
PHOTONICS EAST '95
22-26 October 1995
Philadelphia, PA, United States
Standards for the Protection of Sensitive Data and Networks
William S. Rohland
Proceedings Volume Information Protection and Network Security, (1996) https://doi.org/10.1117/12.232257
Edward M. Scheidt, Jon L. Roberts
Proceedings Volume Information Protection and Network Security, (1996) https://doi.org/10.1117/12.232262
Products for the Protection of Sensitive Data and Networks
Peter E. Rothschild, James P. Craft, Sherry Yokim, David Warnke, Rob Shafer, Dennis Edwards
Proceedings Volume Information Protection and Network Security, (1996) https://doi.org/10.1117/12.232266
Innovative Techniques for Authentication and Security in Electronic Commerce
Peter V. Radatti
Proceedings Volume Information Protection and Network Security, (1996) https://doi.org/10.1117/12.232267
Products for the Protection of Sensitive Data and Networks
Richard Feingold, Harry R. Bruestle, Tony Bartoletti, R. Allyn Saroyan, John M. Fisher
Proceedings Volume Information Protection and Network Security, (1996) https://doi.org/10.1117/12.232268
Keith Ker
Proceedings Volume Information Protection and Network Security, (1996) https://doi.org/10.1117/12.232269
Bruce Wilner
Proceedings Volume Information Protection and Network Security, (1996) https://doi.org/10.1117/12.232270
Additional Papers
Paul Joyal
Proceedings Volume Information Protection and Network Security, (1996) https://doi.org/10.1117/12.234727
Industrial Espionage and Information Wars
Winn Schwartau
Proceedings Volume Information Protection and Network Security, (1996) https://doi.org/10.1117/12.232255
Additional Papers
John C. Droge
Proceedings Volume Information Protection and Network Security, (1996) https://doi.org/10.1117/12.234728
Standards for the Protection of Sensitive Data and Networks
Lisa J. Carnahan
Proceedings Volume Information Protection and Network Security, (1996) https://doi.org/10.1117/12.232256
Additional Papers
Proceedings Volume Information Protection and Network Security, (1996) https://doi.org/10.1117/12.232258
Standards for the Protection of Sensitive Data and Networks
Jeffrey B. Ritter
Proceedings Volume Information Protection and Network Security, (1996) https://doi.org/10.1117/12.232259
Privacy, Security, and Information Wars
Ralph V. Pagano
Proceedings Volume Information Protection and Network Security, (1996) https://doi.org/10.1117/12.232260
Simson L. Garfinkel
Proceedings Volume Information Protection and Network Security, (1996) https://doi.org/10.1117/12.232261
Products for the Protection of Sensitive Data and Networks
Gerald S. Lang
Proceedings Volume Information Protection and Network Security, (1996) https://doi.org/10.1117/12.232263
Innovative Techniques for Authentication and Security in Electronic Commerce
Sharon Flank, David Garfield, Deborah Norkin
Proceedings Volume Information Protection and Network Security, (1996) https://doi.org/10.1117/12.232264
Industrial Espionage and Information Wars
Donn B. Parker
Proceedings Volume Information Protection and Network Security, (1996) https://doi.org/10.1117/12.232265
Back to Top