Journal: Computers & Security

Volume 17, Issue 8

652 -- 653Bill Hancock. From the editor
654 -- 666Bill Hancock. Security views
667 -- 670August Bequai. Employee abuses in cyberspace: Management s legal quagmire
671 -- 681Stephen Hinde. Time, history and war: A personal voyage through Compsec 98
683 -- 692H. S. Venter, Jan H. P. Eloff. Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools
725 -- 732Leong Peng Chor, Hsu Wen Jing, Tan Peng Chong. A geometric approach for shared secrets, a refinement

Volume 17, Issue 7

562 -- 563Bill Hancock. From the editor
564 -- 574Bill Hancock. Windows-98, RIP and my Adrenaline Rush
575 -- 578Richard Ford. May you live in interesting times
579 -- 582August Bequai. A guide to cyber-crime investigations
583 -- 585Stephen Hinde. Corporate governance and disasters
586 -- 588Sarah Gordon. Breaking the chain
589 -- 599Gerald Post, Albert Kagan. The use and effectiveness of anti-virus software
600 -- 612Gerald L. Kovacich. Establishing an Information Systems Security Organization (ISSO)
637 -- 650J. Schwemmlein, Karl C. Posch, Reinhard Posch. RNS-modulo reduction upon a restricted base value set and its applicability to RSA cryptography

Volume 17, Issue 6

460 -- 461Bill Hancock. From the editor
462 -- 474Bill Hancock. Security tradeshows - Good or bad?
475 -- 478Stephen Hinde. Privacy and security - The drivers for growth of E-Commerce
479 -- 482Chris Pounder. The Annual Report of the UK Data Protection Registrar
483 -- 506Fred Cohen. A note on the role of deception in information protection
507 -- 515Nada Kapidzic. Creating security applications based on The Global Certificate Management System
527 -- 542H. J. Jerry Schumacher, Sumit Ghosh. A Fundamental Framework for Network Security Towards Enabling Security on Demand in an ATM Network
543 -- 551Chu-Hsing Lin, Tien-Chi Lee. A confused document encrypting scheme and its implementation

Volume 17, Issue 5

368 -- 369Bill Hancock. From the editor
381 -- 384August Bequai. Techno-crimes: Failings of the legal edifice
385 -- 388Stephen Hinde. Solar radiation is bad for you
389 -- 391J. R. Benton. Physical IT security
392 -- 396Chris Pounder. European commission takes action to secure the internet
397 -- 405Thomas Finne. The three categories of decision-making and information security
417 -- 433Martin Caminada, Reind P. van de Riet, Arjen van Zanten, Leendert van Doorn. Internet security incidents, a survey within Dutch organizations
435 -- 446Sebastiaan H. von Solms. Electronic commerce with secure intelligent trade agents
447 -- 454Birgit Borcherding, Malte Borcherding. Efficient and trustworthy key distribution in webs of trust

Volume 17, Issue 4

278 -- 279Bill Hancock. From the editor
280 -- 292Bill Hancock. Security views
293 -- 298August Bequai. Balancing legal concerns over crime and security in cyberspace
299 -- 302Stephen Hinde. Contingency planning for the millenium
303 -- 307Thomas Finne. A conceptual framework for information security management
308 -- 312Chris Pounder. Further developments in the field of encryption and digital signatures
313 -- 324Pauline Ratnasingham. EDI security: The influences of trust on EDI risks
337 -- 345Sebastiaan H. von Solms, J. H. S. Geldenhuys. Collecting security baggage on the internet
347 -- 357Les Labuschagne, Jan H. P. Eloff. The use of real-time risk analysis to enable dynamic activation of countermeasures

Volume 17, Issue 3

190 -- 191Bill Hancock. From the editor
192 -- 200Bill Hancock. Security Views
201 -- 206Nicky Maddison. Y2000 enters the body politic
207 -- 210Stephen Hinde. Recent security surveys
211 -- 221Fred Cohen, Cynthia A. Phillips, Laura Painton Swiler, Timothy Gaylor, Patricia Leary, Fran Rupley, Richard Isler. A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID
233 -- 252Gert van der Merwe, Jan H. P. Eloff. Software source code, visual risk analysis: an example
253 -- 264Tom Coffey, T. Newe. Realisation of a minimum-knowledge identification and signature scheme
265 -- 272Mike Matyas, Mohammad Peyravian, Allen Roginsky, Nevenko Zunic. Reversible data mixing procedure for efficient public-key encryption

Volume 17, Issue 2

96 -- 97Bill Hancock. From the Editor
99 -- 109Bill Hancock. Who do you call for, CISSP
110 -- 114Richard Ford. What a littledefinution can do
115 -- 118Stephen Hinde. Cyber Wars and other threats
124 -- 128Chris Pounder. Security and the new Data Protection law
129 -- 135Gerald L. Kovacich. Electronic-internet business and security
143 -- 150Sharman Lichtenstein. Internet risks for companies
171 -- 176Mohammad Peyravian, Allen Roginsky, Ajay D. Kshemkalyani. On probabilities of hash value matches
177 -- 184Ed Dawson, Helen Gustafson. A Method for Measuring Entropy of Symmetric Cipher Key Generators

Volume 17, Issue 1

2 -- 4Bill Hancock. From the editor
5 -- 13Bill Hancock. Security goes prime-time
14 -- 18Will Ozier. GSSP preface/overview
19 -- 21August Bequai. High-tech security and the failings of president clinton s commission on critical infrastructure protection
22 -- 26August Bequai. Software pirating and management s quagmire
27 -- 30Chris Pounder. Homeworking: No longer an easy option?
31 -- 33Stephen Hinde. Hot water, icebergs and other disasters
54 -- 56Marius Nacht. The spectrum of modern firewalls
69 -- 89Vesselin Bontchev. Macro virus identification problems