Journal: Computers & Security

Volume 20, Issue 2

98 -- 126Bill Hancock. A Practical Risk
127 -- 131Stephen Hinde. The Search For Privacy
132 -- 145Richard Barber. The Evolution of Intrusion Detection Systems The Next Step
147 -- 154Adrian Wright. Controlling Risks of E-commerce Content
165 -- 172Gurpreet Dhillon. Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns
173 -- 179Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic. Alternative Method for Unique RSA Primes Generation