Journal: Computers & Security

Volume 18, Issue 1

2 -- 3Bill Hancock. From the editor
4 -- 15Bill Hancock. Elliptical curve cryptography and standards for efficient cryptography group
16 -- 18August Bequai. Cyber-crime the US experience
19 -- 22Stephen Hinde. One down, one to go
23 -- 27Chris Pounder. An initial plan of action for compliance with the UK s Data Protection Act 1998
28 -- 34Steven Furnell, Matthew J. Warren. Computer hacking and cyber terrorism: the real threats in the new millennium?
35 -- 46Mario Devargas. Survival is not compulsory: an introduction to business continuity planning
47 -- 66William J. Caelli, Ed Dawson, Scott A. Rea. PKI, elliptic curve cryptography, and digital signatures
67 -- 74Bart Preneel. State-of-the-art ciphers for commercial applications