<?xml version="1.0"?>
<dblpperson name="Viiveke F&#229;k" pid="02/6937" n="13">
<person key="homepages/02/6937" mdate="2009-06-10">
<author pid="02/6937">Viiveke F&#229;k</author>
</person>
<r><inproceedings key="conf/wetice/HagstromFV00" mdate="2023-03-23">
<author pid="51/2849">&#197;sa Hagstr&#246;m</author>
<author pid="02/6937">Viiveke F&#229;k</author>
<author pid="53/4135">Mark Vandenwauver</author>
<title>EWS-A Case Study on Access Control in Workflow Systems.</title>
<pages>213-218</pages>
<year>2000</year>
<crossref>conf/wetice/2000</crossref>
<booktitle>WETICE</booktitle>
<ee>https://doi.org/10.1109/ENABL.2000.883731</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ENABL.2000.883731</ee>
<url>db/conf/wetice/wetice2000.html#HagstromFV00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/FakH93" mdate="2002-02-20">
<author pid="02/6937">Viiveke F&#229;k</author>
<author pid="21/923">Amund Hunstad</author>
<title>Teaching security basics: The Importance of When and How.</title>
<pages>23-30</pages>
<year>1993</year>
<crossref>conf/sec/1993</crossref>
<booktitle>SEC</booktitle>
<url>db/conf/sec/sec1993.html#FakH93</url>
</inproceedings>
</r>
<r><article key="journals/compsec/Fak91" mdate="2023-08-28">
<author pid="02/6937">Viiveke F&#229;k</author>
<title>Computer verification of human users' identity: A theoretical model and some evaluation criteria.</title>
<pages>626-636</pages>
<year>1991</year>
<volume>10</volume>
<journal>Comput. Secur.</journal>
<number>7</number>
<ee>https://doi.org/10.1016/0167-4048(91)90120-3</ee>
<ee>https://www.wikidata.org/entity/Q115118126</ee>
<url>db/journals/compsec/compsec10.html#Fak91</url>
</article>
</r>
<r><article key="journals/compsec/Fak88" mdate="2023-08-28">
<author pid="02/6937">Viiveke F&#229;k</author>
<title>Are we vulnerable to a virus attack? A report from Sweden.</title>
<pages>151-155</pages>
<year>1988</year>
<volume>7</volume>
<journal>Comput. Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.1016/0167-4048(88)90329-X</ee>
<ee>https://www.wikidata.org/entity/Q115122234</ee>
<url>db/journals/compsec/compsec7.html#Fak88</url>
</article>
</r>
<r><inproceedings key="conf/indc/Fak88" mdate="2002-01-03">
<author pid="02/6937">Viiveke F&#229;k</author>
<title>Network Security and Open Systems Interconnection.</title>
<pages>45-55</pages>
<year>1988</year>
<crossref>conf/indc/1988</crossref>
<booktitle>INDC</booktitle>
<url>db/conf/indc/indc1988.html#Fak88</url>
</inproceedings>
</r>
<r><article key="journals/compsec/Fak87" mdate="2023-08-28">
<author pid="02/6937">Viiveke F&#229;k</author>
<title>Crypto management made manageable - Demands on crypto equipment design.</title>
<pages>36-40</pages>
<year>1987</year>
<volume>6</volume>
<journal>Comput. Secur.</journal>
<number>1</number>
<ee>https://doi.org/10.1016/0167-4048(87)90123-4</ee>
<ee>https://www.wikidata.org/entity/Q115124922</ee>
<url>db/journals/compsec/compsec6.html#Fak87</url>
</article>
</r>
<r><article key="journals/compsec/Fak87a" mdate="2023-08-28">
<author pid="02/6937">Viiveke F&#229;k</author>
<title>Report from the working conference on &#34;the Crypto User's Handbook&#34; held in Stockholm, October 22-23, 1986 by IFIP WG 11: 4.</title>
<pages>351</pages>
<year>1987</year>
<volume>6</volume>
<journal>Comput. Secur.</journal>
<number>4</number>
<ee>https://doi.org/10.1016/0167-4048(87)90071-X</ee>
<ee>https://www.wikidata.org/entity/Q115125736</ee>
<url>db/journals/compsec/compsec6.html#Fak87a</url>
</article>
</r>
<r><article key="journals/compsec/Fak86" mdate="2022-08-16">
<author pid="02/6937">Viiveke F&#229;k</author>
<title>Software versus hardware encryption - Is there any difference today?</title>
<pages>167</pages>
<year>1986</year>
<volume>5</volume>
<journal>Comput. Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.1016/0167-4048(86)90143-4</ee>
<ee>https://www.wikidata.org/entity/Q113443799</ee>
<url>db/journals/compsec/compsec5.html#Fak86</url>
</article>
</r>
<r><article key="journals/compsec/HighlandF86" mdate="2023-08-28">
<author pid="87/5822">Harold Joseph Highland</author>
<author pid="02/6937">Viiveke F&#229;k</author>
<title>Electromagnetic radiation revisited, part II.</title>
<pages>181-184</pages>
<year>1986</year>
<volume>5</volume>
<journal>Comput. Secur.</journal>
<number>3</number>
<ee>https://doi.org/10.1016/0167-4048(86)90002-7</ee>
<ee>https://www.wikidata.org/entity/Q115126374</ee>
<url>db/journals/compsec/compsec5.html#HighlandF86</url>
</article>
</r>
<r><inproceedings publtype="informal" key="conf/eurocrypt/Fak86" mdate="2017-06-08">
<author pid="02/6937">Viiveke F&#229;k</author>
<title>Activities of IFIP Working Group 11: 4 on Crypto Management.</title>
<pages>14</pages>
<year>1986</year>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt86.html#Fak86</url>
</inproceedings>
</r>
<r><article key="journals/cryptologia/Fak83" mdate="2017-05-28">
<author pid="02/6937">Viiveke F&#229;k</author>
<title>Cryptographic Protection of Files in an Automated Office System.</title>
<pages>49-62</pages>
<year>1983</year>
<volume>7</volume>
<journal>Cryptologia</journal>
<number>1</number>
<ee>https://doi.org/10.1080/0161-118391857784</ee>
<url>db/journals/cryptologia/cryptologia7.html#Fak83</url>
</article>
</r>
<r><article key="journals/compsec/BlomBFA82" mdate="2023-08-28">
<author pid="06/4307">Rolf Blom</author>
<author pid="139/7535">Jan-Olof Br&#252;er</author>
<author pid="02/6937">Viiveke F&#229;k</author>
<author pid="139/7484">S. Ingvar &#197;kersten</author>
<title>On security measures in distributed computer systems.</title>
<pages>113-122</pages>
<year>1982</year>
<volume>1</volume>
<journal>Comput. Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.1016/0167-4048(82)90004-9</ee>
<ee>https://www.wikidata.org/entity/Q115127801</ee>
<url>db/journals/compsec/compsec1.html#BlomBFA82</url>
</article>
</r>
<r><article key="journals/tit/Fak79" mdate="2020-03-10">
<author pid="02/6937">Viiveke F&#229;k</author>
<title>Repeated use of codes which detect deception (Corresp.).</title>
<pages>233-234</pages>
<year>1979</year>
<volume>25</volume>
<journal>IEEE Trans. Inf. Theory</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TIT.1979.1056011</ee>
<url>db/journals/tit/tit25.html#Fak79</url>
</article>
</r>
<coauthors n="7" nc="2">
<co c="0"><na f="=/=Aring=kersten:S=_Ingvar" pid="139/7484">S. Ingvar &#197;kersten</na></co>
<co c="0"><na f="b/Blom:Rolf" pid="06/4307">Rolf Blom</na></co>
<co c="0"><na f="b/Br=uuml=er:Jan=Olof" pid="139/7535">Jan-Olof Br&#252;er</na></co>
<co c="1"><na f="h/Hagstr=ouml=m:=Aring=sa" pid="51/2849">&#197;sa Hagstr&#246;m</na></co>
<co c="-1"><na f="h/Highland:Harold_Joseph" pid="87/5822">Harold Joseph Highland</na></co>
<co c="-1"><na f="h/Hunstad:Amund" pid="21/923">Amund Hunstad</na></co>
<co c="1"><na f="v/Vandenwauver:Mark" pid="53/4135">Mark Vandenwauver</na></co>
</coauthors>
</dblpperson>

