Journal: Computers & Security

Volume 21, Issue 8

674 -- 67E. Eugene Schultz. The gap between cryptography and information security
677 -- 688E. Eugene Schultz. Security Views
689 -- 693Stephen Hinde. Compsec 2002: the complete security circle
694 -- 695Andrew Armstrong. KLEZ H
696 -- 700Jon David. Giga Security
701 -- 704Harry Demaio. Global Trust, Certification and (ISC):::2:::
705 -- 711Jeffrey Hunker. Policy challenges in building dependability in global infrastructures
719 -- 735Francesco Bergadano, Davide Cavagnino, Bruno Crispo. Individual Authentication in Multiparty Communications
736 -- 749S. Holeman, G. Manimaran, James Davis, Anirban Chakrabarti. Differentially secure multicasting and its implementation methods
750 -- 759Sheng Zhong. A practical key management scheme for access control in a user hierarchy