default search action
Computers & Security, Volume 20
Volume 20, Number 1, 31 January 2001
- Bill Hancock:
Y2K & Security A Low Priority Year. 4-5 - Bill Hancock:
Voodoo is Alive and Well on Your Computer. 5-6 - Bill Hancock:
Hand-held Virii On The Way. 6-7 - Bill Hancock:
China Passes Law to Promote Internet Security Supposedly. 7 - Bill Hancock:
Smarter Marines. 7 - Bill Hancock:
E-tailers Batten Down the Hatches. 8 - Bill Hancock:
Information Warfare Highlighted as a Concern by US Government. 8-9 - Bill Hancock:
E-mail Spammers Jailed. 9-10 - Bill Hancock:
The Chief Security Officer's Top Ten List for 2001. 10-14 - Bill Hancock:
'Safe Harbor' Provision Adopters Few and Far Between. 14-15 - Bill Hancock:
The Wireless Great Divide But Getting Smaller. 15-17 - Bill Hancock:
It's a Privacy Thing in 2001. 17-18 - Bill Hancock:
Fighting SPAM in Europe. 18-19 - Bill Hancock:
Privacy Advocates Grow in Europe. 19-20 - Stephen Hinde:
2001: A Privacy Odyssey. 21-27 - August Bequai:
Software Concerns And The Internet. 28-30 - Iain Franklin:
Protecting The Web Server And Applications. 31-35 - Robert Graham:
NIDS Pattern Search vs. Protocol Decode. 37-41 - Andrew Rathmell:
Protecting Critical Information Infrastructures. 43-52 - Steven Philippsohn:
Trends In Cybercrime An Overview Of Current Financial Crimes On The Internet. 53-69 - Jovan Dj. Golic:
How to Construct Cryptographic Primitives from Stream Ciphers. 79-89
Volume 20, Number 2, 1 April 2001
- Bill Hancock:
A Practical Risk. 98-126 - Stephen Hinde:
The Search For Privacy. 127-131 - Richard Barber:
The Evolution of Intrusion Detection Systems The Next Step. 132-145 - Adrian Wright:
Controlling Risks of E-commerce Content. 147-154 - Gurpreet Dhillon:
Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns. 165-172 - Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic:
Alternative Method for Unique RSA Primes Generation. 173-179
Volume 20, Number 3, 1 May 2001
- Bill Hancock:
Security Views. 188-201 - Stephen Hinde:
The Times They Are A-Changin'. 202-206 - Gerald L. Kovacich:
Protecting 21st Century Information It's Time for a Change. 207-213 - Basie von Solms:
Corporate Governance and Information Security. 215-218 - Ivan Horrocks:
Security Training: Education For an Emerging Profession? 219-226 - Bob Carter:
Securing Your Brand In Cyberspace. 227-238 - Michael Frantzen, Florian Kerschbaum, E. Eugene Schultz, Sonia Fahmy:
A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals. 263-270
Volume 20, Number 4, July 2001
- Bill Hancock:
Security Views. 278-294 - Stephen Hinde:
The Weakest Link. 295-301 - Gerald L. Kovacich:
The Corporate Information Assurance Officer (CIAO). 302-307 - Basie von Solms, Rossouw von Solms:
Incremental Information Security Certification. 308-310 - Chris Pounder:
Cyber crime: the backdrop to the Council of Europe Convention. 311-315 - Denis Zenkin:
Fighting Against the Invisible Enemy - Methods for detecting an unknown virus. 316-321
Volume 20, Number 5, 1 July 2001
- Bill Hancock:
Security Views. 348-363 - Stephen Hinde:
Cyberthreats: Perceptions, Reality and Protection. 364-371 - August Bequai:
Proprietary Data: Eldorado in Cyber-Space. 372-373 - Richard Barber:
Security in a Mobile World - is Bluetooth the Answer? 374-379 - Chris Pounder:
The Council of Europe Cyber-Crime Convention. 380-383 - Colette M. Trompeter, Jan H. P. Eloff:
A Framework for the Implementation of Socio-ethical Controls in Information Security. 384-391 - Thomas W. Cusick:
Computer Licence Plates. 392-394 - Paul Evans:
Conference Report - the Global Forum for Law Enforcement and National Security, Edinburgh, 2001. 395-399
Volume 20, Number 6, September 2001
- Bill Hancock:
U.S. DoD Puts Up Blocks to Code Red. Comput. Secur. 20(6): 451-467 (2001) - Stephen Hinde:
Omnia te adversum spectantia, nulla retorsum*. 468-474 - August Bequai:
Organized Crime Goes Cyber. 475-478 - Steve Purser:
A Simple Graphical Tool For Modelling Trust. 479-484 - Steven Philippsohn:
Money Laundering on the Internet. 485-490 - Bruce Schneier:
Managed Security Monitoring: Network Security for the 21st Centur. 491-503 - Basie von Solms:
Information Security - A Multidimensional Discipline. 504-508 - Reinhardt A. Botha, Jan H. P. Eloff:
Access Control in Document-centric Workflow Systems An Agent-based Approach. 525-532 - Wen-Hung Yeh, Jing-Jang Hwang:
Hiding Digital Information Using a Novel System Scheme. 533-538
Volume 20, Number 7, October 2001
- Bill Hancock:
Security View. 546-560 - Stephen Hinde:
Lessons Learned. 561-567 - Stephen Hinde:
Incalculable potential for damage by cyber-terrorism. 568-572 - Chris Pounder:
The European Union Proposal for a Policy Towards Network and Information Security. 573-576 - Mariana Gerber, Rossouw von Solms:
From Risk Analysis to Security Requirements. 577-584 - David W. Chadwick, Andrew Basden:
Evaluating Trust in a Public Key Certification Authority. 592-611 - Chu-Hsing Lin:
Hierarchical key assignment without public-key cryptography. 612-619 - E. Eugene Schultz, Robert W. Proctor, Mei-Ching Lien, Gavriel Salvendy:
Usability and Security An Appraisal of Usability Issues in Information Security Methods. 620-634
Volume 20, Number 8, 1 December 2001
- Bill Hancock:
Security Views. 643-656 - Stephen Hinde:
If you can meet with triumph and disaster and treat those two impostors just the same.... 657-666 - Charles Cresson Wood:
What Do The Recent Terrorist Attacks Mean For The American Information Security Profession? 667-670 - Denis Zenkin:
Guidelines for the Protecting the Corporate against Viruse. 671-675 - E. Biermann, E. Cloete, Lucas M. Venter:
A comparison of Intrusion Detection systems. 676-683 - Joan L. Aron, Ronald A. Gove, Shiva Azadegan, M. Christina Schneider:
The Benefits of a Notification Process in Addressing the Worsening Computer Virus Problem: Results of a Survey and a Simulation Model. 693-714 - Gurpreet Dhillon, Steve Moore:
Computer crimes: theorizing about the enemy within. 715-723 - Andres Torrubia, Francisco J. Mora, Luis Marti:
Cryptography Regulations for E-commerce and Digital Rights Management. 724-738
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.