researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
19
, Issue
5
382
--
383
Bill Hancock
.
Security Views
383
--
384
Bill Hancock
.
I Agree Legal Agreements Get Legislated
385
--
387
Bill Hancock
.
The US Government Tells Its Users to Clean Up Their E-mail
387
--
388
Bill Hancock
.
Home PC s Targeted by Hackers (Duh!)
388
--
388
Bill Hancock
.
CIO s Get Serious About Best Security Practices
389
--
391
Bill Hancock
.
Microsoft a Popular Virus Target Due to Ubiquity
389
--
389
Bill Hancock
.
Yahoo Faces Identity Crisis
391
--
392
Bill Hancock
.
UK s RIP Bill Creates Official Snooping
392
--
393
Bill Hancock
.
Extortion Going Online
393
--
393
Bill Hancock
.
Office 2000 Patch Recommended by CERT
393
--
394
Bill Hancock
.
Self-Regulation for Privacy Doesn t Work Says FTC
394
--
395
Bill Hancock
.
...But the Industry Wants Self-Regulation
395
--
396
Bill Hancock
.
US Senate Wakes Up to Need for Cybertools for Law Enforcers
396
--
397
Bill Hancock
.
PGP V5.0 Keys Potentially Insecure
397
--
398
Bill Hancock
.
Canadian Credit Card Conundrum Caused by a Cracker
398
--
400
Bill Hancock
.
Network Solutions Re-evaluates Security
398
--
398
Bill Hancock
.
Suspect Charged in Love Bug Worm has Charges Dropped
400
--
401
Bill Hancock
.
CMU Sets Up a Sister to CERT
401
--
401
Bill Hancock
.
Speedy Response Yields Success at DOE
402
--
403
Bill Hancock
.
Who s to Blame?
402
--
402
Bill Hancock
.
AOL Gets Busted - Again
403
--
403
Bill Hancock
.
Wireless Ubiquity for E-Biz
404
--
404
Bill Hancock
.
And Now, the Bug-in-Your-Site Award Goes To...
404
--
405
Bill Hancock
.
Isn t It Interesting What You Can Buy At An Auction Site? TV s, Computers, Drugs
405
--
407
Bill Hancock
.
G8 Thinks About Cybercrime (It s About Time, Too)
408
--
420
Stephen Hinde
.
Love Conquers All?
421
--
427
Gerald L. Kovacich
.
Netspionage The Global Threat to Information, Part II: Information Collection in the Gray Zon
428
--
441
Stephen M. Matyas
,
Jeff Stapleto
.
A Biometric Standard for Information Management and Security
453
--
465
Yu-Lun Huang
,
Shiuh-Pyng Shieh
,
Fu-Shen Ho
.
A Generic Electronic Payment Model Supporting Multiple Merchant Transactions
466
--
469
Mohammad Peyravian
,
Nevenko Zunic
.
Methods for Protecting Password Transmission