Journal: Computers & Security

Volume 18, Issue 8

660 -- 669Stephen Hinde. Step into a secure new world - Compsec 99 report
671 -- 682Kevin Richards. Network based intrusion detection: A review of technologies
683 -- 692Michael Collins. Telecommunications crime - Part 2
693 -- 704Julie D. Nosworthy. Y2K contingency planning: Taking BCM into the 21:::st::: century
715 -- 726Paul Dowland, Steven Furnell, H. M. Illingworth, Paul L. Reynolds. Computer crime and abuse: A survey of public attitudes and awareness
727 -- 733Wen-Her Yang, Shiuh-Pyng Shieh. Password authentication schemes with smart cards

Volume 18, Issue 7

550 -- 552Bill Hancock. From the editor
553 -- 564Bill Hancock. Security views
565 -- 572Stephen Hinde. The bell tolls for the bell-shaped curve: or how hot magnets, species distribution and things that go bump in the air will change our view of risk
573 -- 576Gerald L. Kovacich. Hackers: Freedom fighters of the 21:::st::: Century
577 -- 586Michael Collins. Telecommunications crime - Part 1
587 -- 592Pauline Ratnasingham. Risks in low trust among trading partners in electronic commerce
619 -- 626Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic. Generating user-based cryptographic keys and random numbers
627 -- 639Diomidis Spinellis, Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas. Trusted third party services for deploying secure telemedical applications over the WWW

Volume 18, Issue 6

456 -- 457Bill Hancock. From the editor
471 -- 478David Robb. Developing firewall technology: Hardwall - White paper
479 -- 518Fred Cohen. Simulating cyber attacks, defences, and consequences
533 -- 543Massimo Bernaschi, Elisabetta d Aiutolo, P. Rughetti. Enforcing network security: a real cease study in a research organization

Volume 18, Issue 5

370 -- 371Bill Hancock. From the editor
391 -- 395Paul Docherty, Peter Simpson. Macro attacks: What next after Melissa?
396 -- 406Stephen Hinde. E-mail can seriously damage your health
409 -- 418Chris Nelms. Internet E-mail risks and concerns
419 -- 422Nick Hawkins. Security within multimedia networked conferencing
423 -- 428Thierry Moreau. The emergence of a legal framework for electronic transactions
429 -- 431Neil Jarvis. E-commerce and encryption: Barriers to growth
445 -- 453R. A. King, T. C. Phipps. Shannon, TESPAR and approximation strategies

Volume 18, Issue 4

276 -- 277Bill Hancock. From the editor
295 -- 299Stephen Hinde. E for exponential growth
300 -- 302Richard Ford. No suprises in Melissa Land
303 -- 306August Bequai. Employers and the internet: Legal woes and concerns
307 -- 311Chris Pounder. The revised version of BS7799 - so what s new?
312 -- 316Garry Bulmer. Encryption - Do or die for UK business
317 -- 321Pauline Ratnasingham. Implicit trust in the risk assessment process of EDI
322 -- 334Keith Buzzard. Computer security - What should you spend your money on?
345 -- 350Mohammad Peyravian, Allen Roginsky, Nevenko Zunic. Hash-based encryption system
351 -- 363Winfried E. Kühnhauser. Policy Groups

Volume 18, Issue 3

182 -- 183Bill Hancock. From the editor
199 -- 203Stephen Hinde. Are you in control?
204 -- 210E. Eugene Schultz. Windows NT security: Kudos, concerns, and prescriptions
211 -- 220Gerald L. Kovacich. I-way robbery: Crime on the internet
221 -- 230John Hughes. Certificate inter-operability - white paper
241 -- 255Vesselin Bontchev. The problems of wordmacro virus upconversion
257 -- 270Sebastiaan H. von Solms, J. H. S. Geldenhuys. Managing multi level security in a military intranet environment

Volume 18, Issue 2

88 -- 89Bill Hancock. From the editor
105 -- 108Richard Ford. Malware: Troy revisited
109 -- 112August Bequai. Monitoring employee communications in cyberspace: The pitfalls facing management
113 -- 119Stephen Hinde. Year 2000 update
120 -- 123Sarah Gordon. Telephone tales
134 -- 147Mohammad Peyravian, Don Coppersmith. A structured symmetric-key block cipher
165 -- 177Brendon Harris, Ray Hunt. Fairwall certification

Volume 18, Issue 1

2 -- 3Bill Hancock. From the editor
4 -- 15Bill Hancock. Elliptical curve cryptography and standards for efficient cryptography group
16 -- 18August Bequai. Cyber-crime the US experience
19 -- 22Stephen Hinde. One down, one to go
23 -- 27Chris Pounder. An initial plan of action for compliance with the UK s Data Protection Act 1998
28 -- 34Steven Furnell, Matthew J. Warren. Computer hacking and cyber terrorism: the real threats in the new millennium?
35 -- 46Mario Devargas. Survival is not compulsory: an introduction to business continuity planning
47 -- 66William J. Caelli, Ed Dawson, Scott A. Rea. PKI, elliptic curve cryptography, and digital signatures
67 -- 74Bart Preneel. State-of-the-art ciphers for commercial applications