default search action
Computers & Security, Volume 18
Volume 18, Number 1, 1999
- Bill Hancock:
From the editor. 2-3 - Bill Hancock:
Elliptical curve cryptography and standards for efficient cryptography group. 4-15 - August Bequai:
Cyber-crime the US experience. 16-18 - Stephen Hinde:
One down, one to go. 19-22 - Chris Pounder:
An initial plan of action for compliance with the UK's Data Protection Act 1998. 23-27 - Steven Furnell, Matthew J. Warren:
Computer hacking and cyber terrorism: the real threats in the new millennium? 28-34 - Mario Devargas:
Survival is not compulsory: an introduction to business continuity planning. 35-46 - William J. Caelli, Ed Dawson, Scott A. Rea:
PKI, elliptic curve cryptography, and digital signatures. 47-66 - Bart Preneel:
State-of-the-art ciphers for commercial applications. 67-74
Volume 18, Number 2, 1999
- Bill Hancock:
From the editor. 88-89 - Richard Ford:
Malware: Troy revisited. 105-108 - August Bequai:
Monitoring employee communications in cyberspace: The pitfalls facing management. 109-112 - Stephen Hinde:
Year 2000 update. 113-119 - Sarah Gordon:
Telephone tales. 120-123 - Winn Schwartau:
Surviving denial of service. 124-133 - Mohammad Peyravian, Don Coppersmith:
A structured symmetric-key block cipher. 134-147 - Brendon Harris, Ray Hunt:
Fairwall certification. 165-177
Volume 18, Number 3, 1999
- Bill Hancock:
From the editor. 182-183 - Stephen Hinde:
Are you in control? 199-203 - E. Eugene Schultz:
Windows NT security: Kudos, concerns, and prescriptions. 204-210 - Gerald L. Kovacich:
I-way robbery: Crime on the internet. 211-220 - John Hughes:
Certificate inter-operability - white paper. 221-230 - Vesselin Bontchev:
The problems of wordmacro virus upconversion. 241-255 - Sebastiaan H. von Solms, J. H. S. Geldenhuys:
Managing multi level security in a military intranet environment. 257-270
Volume 18, Number 4, 1999
- Bill Hancock:
From the editor. 276-277 - Stephen Hinde:
E for exponential growth. 295-299 - Richard Ford:
No suprises in Melissa Land. 300-302 - August Bequai:
Employers and the internet: Legal woes and concerns. 303-306 - Chris Pounder:
The revised version of BS7799 - so what's new? 307-311 - Garry Bulmer:
Encryption - Do or die for UK business. 312-316 - Pauline Ratnasingham:
Implicit trust in the risk assessment process of EDI. 317-321 - Keith Buzzard:
Computer security - What should you spend your money on? 322-334 - Mohammad Peyravian, Allen Roginsky, Nevenko Zunic:
Hash-based encryption system. 345-350 - Winfried E. Kühnhauser:
Policy Groups. 351-363
Volume 18, Number 5, 1999
- Bill Hancock:
From the editor. 370-371 - Paul Docherty, Peter Simpson:
Macro attacks: What next after Melissa? 391-395 - Stephen Hinde:
E-mail can seriously damage your health. 396-406 - Chris Nelms:
Internet E-mail risks and concerns. 409-418 - Nick Hawkins:
Security within multimedia networked conferencing. 419-422 - Thierry Moreau:
The emergence of a legal framework for electronic transactions. 423-428 - Neil Jarvis:
E-commerce and encryption: Barriers to growth. 429-431 - R. A. King, T. C. Phipps:
Shannon, TESPAR and approximation strategies. 445-453
Volume 18, Number 6, 1999
- Bill Hancock:
From the editor. 456-457 - David Robb:
Developing firewall technology: Hardwall - White paper. 471-478 - Fred Cohen:
Simulating cyber attacks, defences, and consequences. 479-518 - Massimo Bernaschi, Elisabetta d'Aiutolo, P. Rughetti:
Enforcing network security: a real cease study in a research organization. 533-543
Volume 18, Number 7, 1999
- Bill Hancock:
From the editor. 550-552 - Bill Hancock:
Security views. 553-564 - Stephen Hinde:
The bell tolls for the bell-shaped curve: or how hot magnets, species distribution and things that go bump in the air will change our view of risk. 565-572 - Gerald L. Kovacich:
Hackers: Freedom fighters of the 21st Century. 573-576 - Michael Collins:
Telecommunications crime - Part 1. 577-586 - Pauline Ratnasingham:
Risks in low trust among trading partners in electronic commerce. 587-592 - Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic:
Generating user-based cryptographic keys and random numbers. 619-626 - Diomidis Spinellis, Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas:
Trusted third party services for deploying secure telemedical applications over the WWW. 627-639
Volume 18, Number 8, 1999
- Stephen Hinde:
Step into a secure new world - Compsec '99 report. 660-669 - Kevin Richards:
Network based intrusion detection: A review of technologies. 671-682 - Michael Collins:
Telecommunications crime - Part 2. 683-692 - Julie D. Nosworthy:
Y2K contingency planning: Taking BCM into the 21st century. 693-704 - Paul Dowland, Steven Furnell, H. M. Illingworth, Paul L. Reynolds:
Computer crime and abuse: A survey of public attitudes and awareness. 715-726 - Wen-Her Yang, Shiuh-Pyng Shieh:
Password authentication schemes with smart cards. 727-733
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.