Journal: Computers & Security

Volume 19, Issue 1

6 -- 7Bill Hancock. Mass Network Flooding Attacks (Distributed Denial of Service - DDoS) Surface in the Wild
7 -- 8Bill Hancock. Cell Phone Crypto Cracked
8 -- 9Bill Hancock. Clinton s Proposed Crypto Regulations Under Attack
9 -- 10Bill Hancock. Overhauling the National Security Agency?
10 -- 12Bill Hancock. Down Under, Hacking Private Computers by the Government is Legal
12 -- 13Bill Hancock. The S in SAP Doesn t Stand for Security
12 -- 12Bill Hancock. New York Times Fires Employees for Violating Internal E-mail Policies
13 -- 14Bill Hancock. Anonymizing Software Causes Law Enforcement Concerns
13 -- 13Bill Hancock. Melissa Virus Creator Pleads Guilty
14 -- 16Bill Hancock. Security Problems Go Mobile In Your Next Car
16 -- 17Bill Hancock. The L0pht Goes Corporate and becomes @Stake
18 -- 20Chuck Williams, Nevenko Zunic, Stephen M. Matyas, Sarbari Gupta, Michael Willett. Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction
21 -- 27Michael Smith, Paul C. van Oorschot, Michael Willett. Cryptographic Information Recovery Using Key Recover
28 -- 30Michael Willett. Features, Attributes, Characteristics, and Traits (FACTs) of Key Recovery Schemes/Products
31 -- 36John Kennedy, Stephen M. Matyas, Nevenko Zunic. Key Recovery Functional Model
37 -- 40Stephen M. Matyas, Nevenko Zunic. Additional Key Recovery Function
41 -- 47Sarbari Gupta. A Common Key Recovery Block Format: Promoting Interoperability Between Dissimilar Key Recovery Mechanisms
48 -- 55Chuck Williams, Nevenko Zunic. Global Interoperability for Key Recovery
56 -- 68Sarbari Gupta, Stephen M. Matyas. Public Key Infrastructure: Analysis of Existing and Needed Protocols and Object Formats for Key Recovery
69 -- 81Abby Maclean, Stephen M. Matyas, Nevenko Zunic. Organization Implementation Guidelines for Recovery of Encrypted Information
82 -- 85Nevenko Zunic. Organization Considerations for Retrieval of Stored Data via Key Recovery Methods
86 -- 90Tom Markham, Chuck Williams. Key Recovery Header for IPSEC
91 -- 99David M. Balenson, Tom Markham. ISAKMP Key Recovery Extension
100 -- 104Timothy G. Shoriak. SSL/TLS Protocol Enablement for Key Recovery