1. www.pvib.nl
  2. /Kenniscentrum

PvIB Kenniscentrum

.. (Terug naar bovenliggende map)

Bestanden

User based Policy Control of Attribute Authorities.pdf User based Policy Control of Attribute Authorities.pdf
  User based Policy Control of Attribute Authorities - thesis Marten Lohstroh Download
Analysis of the MIFARE Classic used in the OV-Chipkaart project.pdf Analysis of the MIFARE Classic used in the OV-Chipkaart project.pdf
  Analysis of the MIFARE Classic used in the OV-Chipkaart project - thesis Gerhard de Koning Gans Download
Security analysis of RFID tags.pdf Security analysis of RFID tags.pdf
  Security analysis of RFID tags - thesis Roel Verdult Download
Beware!_PvIB.pdf Beware!_PvIB.pdf
  Beware! Security awareness voor retail banking in Nederland - thesis Jasper A. Essers Download
Biometric Technology in National Identity Management.zip Biometric Technology in National Identity Management.zip
  Risk and Threats attached to the application of Biometric Technology in National Identity Management - Elisabeth de Leeuw-Lecoeur Download
Security Evaluation OV-chipkaart.pdf Security Evaluation OV-chipkaart.pdf
  Security Evaluation of the disposable OV-chipkaart - Siekerman, Pieter en Van der Schee, Maurits Download
Insider threat in IT.pdf Insider threat in IT.pdf
  Insider threat in IT (de factor mens beschouwd) - Referaat Aad Spee Download
bev.zip bev.zip
  Beveiligingsarchitectuur bij Univé - Thesis Matthijs Koot Download
Exploring ways to Model Reputation Loss.pdf Exploring ways to Model Reputation Loss.pdf
  Exploring ways to Model Reputation Loss - Thesis Cas de Bie Download
Risk-Reducing Decision-Making in an E-Government Environment.pdf Risk-Reducing Decision-Making in an E-Government Environment.pdf
  Research on the Relationships between Risk Perception, Risk Propensity and Risk-Reducing Decision-Making in an E-Government Environment - thesis MHLau Download
De Risicoanalyse Voorbij.pdf De Risicoanalyse Voorbij.pdf
  De Risicoanalyse Voorbij - Referaat Arjan de Vries Download
Het Meten van Security - 1.1.pdf Het Meten van Security - 1.1.pdf
  Het Meten van Security - Referaat Pieter van de Wulp Download
It'ers, regels en security awareness (open versie).pdf It'ers, regels en security awareness (open versie).pdf
  It'ers, regels en security awareness - Referaat Caroline Neys Download
Enhanced Security Management.pdf Enhanced Security Management.pdf
  Enhanced Security Management - Referaat André Koot Download
Business Continuity Management _ A maturity model.pdf Business Continuity Management _ A maturity model.pdf
  Business Continuity Management - A maturity model - Referaat Naomi Smit Download