default search action
Computers & Security, Volume 21
Volume 21, Number 1, 2002
- E. Eugene Schultz:
Security Views. 5-15 - Stephen Hinde:
2001: A Privacy Odyssey Revisited. 16-34 - Gerald L. Kovacich, Andy Jones:
What InfoSec professionals should know about information warfare tactics by terrorists. 35-41 - Rachel Ecclestone:
In brief. 42-44 - Rachel Ecclestone:
ACSAC 2001 review. 47-60 - George Magklaras, Steven Furnell:
Insider Threat Prediction Tool: Evaluating the probability of IT misuse. 62-73 - Chi-Kwong Chan, Lee-Ming Cheng:
Cryptanalysis of a Timestamp-Based Password Authentication Scheme. 74-76 - Kapali Viswanathan, Colin Boyd, Ed Dawson:
Hybrid Key Escrow: A New Paradigm. 77-92
Volume 21, Number 2, 31 March 2002
- E. Eugene Schultz:
Security Views. 101-112 - Gerald L. Kovacich, Andy Jones:
What InfoSec Professionals Should Know About Information Warfare Tactics by Terrorists. 113-119 - Bob Blakley:
Security Insights. 120-125 - Joan L. Aron, Michael O'Leary, Ronald A. Gove, Shiva Azadegan, M. Christina Schneider:
The Benefits of a Notification Process in Addressing the Worsening Computer Virus Problem: Results of a Survey and a Simulation Model. 142-163 - Victor R. L. Shen, Tzer-Shyong Chen:
A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations. 164-171 - Lech J. Janczewski, Frank Xinli Shi:
Development of Information Security Baselines for Healthcare Information Systems in New Zealand. 172-192
Volume 21, Number 3, 1 June 2002
- E. Eugene Schultz:
Security Views. 201-211 - Stephen Hinde:
It Was Déjá vu all Over Again. 212-21 - Nathan L. Clarke, Steven Furnell, Philip M. Rodwell, Paul L. Reynolds:
Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices. 220-228 - Gary McGraw:
On Bricks and Walls: Why Building Secure Software is Hard. 229-238 - Chris Pounder:
Anti-Terrorism Legislation: The Impact on The Processing of Data. 240-245 - Joris Claessens, Valentin Dem, Danny De Cock, Bart Preneel, Joos Vandewalle:
On the Security of Today's Online Electronic Banking Systems. 253-265 - Elmé Smith, Jan H. P. Eloff:
A Prototype for Assessing Information Technology Risks in Health Care. 266-284
Volume 21, Number 4, 1 August 2002
- E. Eugene Schultz:
The Sorry State of Law Enforcement. 290-292 - E. Eugene Schultz:
Security views. 293-302 - Steve Purser:
Why access control is difficult. 303-309 - Stephen Hinde:
Security surveys spring crop. 310-321 - Andy Nikishin:
The Klez.H worm dissected. 322-327 - Chris Pounder:
The emergence of a comprehensive obligation towards computer security. 328-332 - August Bequai:
Syndicated crime and international terrorism: the lessons of '9-11'. 333-337 - Younghwa Lee, Jintae Lee, Zoonky Lee:
Integrating Software Lifecycle Process Standards with Security Engineering. 345-355 - Peter Ward, Clifton L. Smith:
The Development of Access Control Policies for Information Technology Systems. 356-371 - Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng:
An Efficient and Practical Solution to Remote Authentication: Smart Card. 372-375
Volume 21, Number 5, 1 October 2002
- E. Eugene Schultz:
Taking a stand on hackers. 382-384 - E. Eugene Schultz:
Security Views. 385-396 - Bill Hancock:
Security crisis management the basics. 397-401 - Karin Höne, Jan H. P. Eloff:
Information security policy what do international information security standards say? 402-409 - Andy Nikishin:
Much Ado About Nothing: Win32 Perrun. 410-412 - William J. Caelli:
Trusted ...or... trustworthy: the search for a new paradigm for computer and network security. 413-420 - Brian McKenna:
Enterprise in focus at NetSec 2002. 421-423 - Stephen Hinde:
The perils of privacy. 424-432 - Yihua Liao, V. Rao Vemuri:
Use of K-Nearest Neighbor classifier for intrusion detection. 439-448 - Der-Chyuan Lou, Jiang-Lung Liu:
Steganographic Method for Secure Communications. 449-460 - Marit Hansen, Kristian Köhntopp, Andreas Pfitzmann:
The Open Source approach opportunities and limitations with respect to security and privacy. 461-471
Volume 21, Number 6, 1 October 2002
- E. Eugene Schultz:
Security Views. 481-490 - Stephen Hinde:
The Blue Screen of Death and other deadly bugs. 491-496 - Andy Nikishin:
I-Worm.Lentin (aka Yaha). 497-502 - Chris Pounder:
The US's National Strategy for Homeland Security. 503-505 - Jon David:
Policy enforcement in the workplace. 506-513 - August Bequai:
White collar crime: a handmaiden of international tech terrorism. 514-519 - Sarah Hilley:
Palladium, fraud, and surviving terrorism- Compsec 2002 - Preview of Compsec 2002, 30 Oct-1 Nov, Queen Elizabeth II Conference Centre, Westminster, London, UK. 520-521 - E. Eugene Schultz:
A framework for understanding and predicting insider attacks. 526-531 - Dimitris Gritzali:
Principles and requirements for a secure e-voting system. 539-556 - Virginia E. Rezmierski, Marshall R. Seese Jr., Nathaniel St. Clair II:
University systems security logging: who is doing it and how far can they go? 557-564 - Tzer-Shyong Chen, Yu-Fang Chung:
Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm. 565-570
Volume 21, Number 7, November 2002
- E. Eugene Schultz:
The US Government bigger and better information security? 578-580 - E. Eugene Schultz:
Security Views. 581-590 - Stephen Hinde:
Spam, scams, chains, hoaxes and other junk mail. 592-606 - Andrew Armstrong:
Bugbear. 607-608 - Matt Bishop:
Trends in academic research: vulnerabilities analysis and intrusion detection. 609-612 - Brian McKenna:
Managed Security Services new economy relic or wave of the future? 613-616 - H. S. Venter, Jan H. P. Eloff:
Vulnerabilities categories for intrusion detection system. 617-619 - Chris Pounder:
Security policy update. 620-623 - Babatunde Jayeju-akinsiku:
Technology and Electronic Communications Act 2000. 624-628 - Sarah Gordon, Richard Ford:
Cyberterrorism? 636-647 - Steve Kenny, Larry Korba:
Applying digital rights management systems to privacy rights management. 648-664 - Lei Fan, Jian-Hua Li, HongWen Zhu:
An enhancement of timestamp-based password authentication scheme. 665-667
Volume 21, Number 8, November 2002
- E. Eugene Schultz:
The gap between cryptography and information security. 674-67 - E. Eugene Schultz:
Security Views. 677-688 - Stephen Hinde:
Compsec 2002: the complete security circle. 689-693 - Andrew Armstrong:
KLEZ H. 694-695 - Jon David:
Giga Security. 696-700 - Harry B. DeMaio:
Global Trust, Certification and (ISC)2. 701-704 - Jeffrey Hunker:
Policy challenges in building dependability in global infrastructures. 705-711 - Francesco Bergadano, Davide Cavagnino, Bruno Crispo:
Individual Authentication in Multiparty Communications. 719-735 - S. Holeman, G. Manimaran, James Davis, Anirban Chakrabarti:
Differentially secure multicasting and its implementation methods. 736-749 - Sheng Zhong:
A practical key management scheme for access control in a user hierarchy. 750-759
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.