researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Volume
Volume
19
, Issue
8
664
--
665
Bill Hancock
.
From Stones in the Street to Cyberspace - Israeli and Palestinians Continue Their Virtual Battles 24 x 7
665
--
666
Bill Hancock
.
Feeling Sorry for Microsoft?
666
--
667
Bill Hancock
.
However, Microsoft Could Use Some Sympathy - Dutch Hacker Busts Microsoft Web Site - Again
667
--
668
Bill Hancock
.
Wireless Big Brother
668
--
669
Bill Hancock
.
NASA Hacker Pleads Guilty
669
--
670
Bill Hancock
.
Getting the Laws to Help Combat Cybercrime (There s a grand idea)
669
--
669
Bill Hancock
.
Canadian Teen Mafiaboy Pleads Guilty
671
--
673
Bill Hancock
.
Laptop Theft Now Targeted Towards Data and Not Necessarily Hardware
671
--
671
Bill Hancock
.
Internet Biz Group Calls for Cybercrime Treaty Delay
673
--
674
Bill Hancock
.
Hacktivism Increasing
674
--
676
Bill Hancock
.
CIA Chat Room Causes Grief
674
--
674
Bill Hancock
.
US Department of Defense Prepares Cybercrime Database
676
--
677
Bill Hancock
.
Japan Creates Cyberconditions for IT National Revolution
677
--
678
Bill Hancock
.
US Privacy Law Proposals Cause Concerns
679
--
687
Stephen Hinde
.
New Names For Old - A Personal Surf Through Compsec 200
688
--
691
August Bequai
.
America s Internet Commerce and The Threat of Fraud
692
--
697
Andy Clarke
,
Vince Gallo
.
The Software Colander Holes in Messagin
698
--
709
Mariki M. Eloff
,
Sebastiaan H. von Solms
.
Information Security Management: An Approach to Combine Process Certification And Product Evaluation
710
--
719
John Sherwood
.
Opening Up The Enterprise
731
--
746
Stefanos Gritzalis
,
Sokratis K. Katsikas
,
Dimitrios Lekkas
,
Konstantinos Moulinos
,
Eleni Polydoro
.
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture
Volume
19
, Issue
7
570
--
571
Bill Hancock
.
New Classes of Unix/Linux Attacks
571
--
572
Bill Hancock
.
American Express Creates Disposable Credit Card Number
572
--
573
Bill Hancock
.
Baltimore Releases Security Developer Freeware
572
--
572
Bill Hancock
.
Microsoft Releases New IIS Security Tool
573
--
574
Bill Hancock
.
Files Streams Virus Infects in an Old and New Way
574
--
575
Bill Hancock
.
Hacker Insurance Now Part of the Business Risk Management Kit
574
--
574
Bill Hancock
.
Trinity v3, a DDoS Tool, Hits the Streets
575
--
577
Bill Hancock
.
Wireless Crazed? No Security For You!
577
--
578
Bill Hancock
.
White House Supporting Open Source Code
578
--
579
Bill Hancock
.
White House Security Summit Builds Towards a B2B Security Standard
579
--
579
Bill Hancock
.
Cellular Security Hazards
580
--
580
Bill Hancock
.
UK Fuel Taxes Protestor Accused of Mass Hacking
580
--
580
Bill Hancock
.
US Government Board Setting Up Security Metrics
581
--
581
Bill Hancock
.
Privacy Group Wants Web Bugs Disclosures
581
--
583
Bill Hancock
.
Site Spoofing Becomes More Popular
583
--
584
Bill Hancock
.
First PDA Virus Hits the Airwaves
585
--
590
Stephen Hinde
.
Do You Know Your Organization s Achilles Heel?
591
--
595
August Bequai
.
Romancing The Internet And Management s Quagmire
596
--
614
Julie D. Nosworthy
.
A Practical Risk Analysis Approach: Managing BCM Risk
615
--
620
Basie von Solms
.
Information Security - The Third Wave?
645
--
656
Rachael Pond
,
John Podd
,
Julie Bunnell
,
Ron Henderson
.
Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates
Volume
19
, Issue
6
476
--
477
Bill Hancock
.
A Need for a Network Security Czar
477
--
477
Bill Hancock
.
US Government Fighting for Expanded Wiretap Laws
477
--
479
Bill Hancock
.
E-Commerce Paranoia: Flaws in Code
479
--
480
Bill Hancock
.
Truly Certified: Security Certifications Updat
480
--
487
Bill Hancock
.
Digital Certificates Get Creative
482
--
482
Bill Hancock
.
Health Care Security: A Hard Look at a Growing Problem
483
--
483
Bill Hancock
.
Safeway UK s Website Shut Down
483
--
483
Bill Hancock
.
Philippine Government Creates Incident Response Team
483
--
485
Bill Hancock
.
DDoS Defence Gets Regulatory
485
--
486
Bill Hancock
.
Visa s Ten Commandments for E-Security Online
486
--
487
Bill Hancock
.
Porngate ?
487
--
487
Bill Hancock
.
What You Sell Online in France Could Be Restricted...
488
--
488
Bill Hancock
.
Hackers Still Love to Attack the Pentago
488
--
491
Bill Hancock
.
Spying At Home: A New Pastime to Detect Online Romanc
491
--
493
Bill Hancock
.
Is a Convicted Hacker Really Reformed and Should You Hire Them?
493
--
494
Bill Hancock
.
DefCon Recruiting JamFest
494
--
495
Bill Hancock
.
Hacker Target: Mobile Phones
495
--
496
Bill Hancock
.
GeoCities Ordered to Report on Information Poste
495
--
495
Bill Hancock
.
E-Mail Privacy Issues Escalate
496
--
497
Bill Hancock
.
Hackers Breach Firewall
497
--
498
Bill Hancock
.
Lotus Domino Holes Up
499
--
504
Stephen Hinde
.
Fireworks, Beer and Old Halfpennies - The Risks of Assumption
505
--
519
Gerald L. Kovacich
.
Netspionage - Part III: The Black Zone, Who Uses Netspionage, How and Why
520
--
528
Fred Cohen
.
A Mathematical Structure of Simple Defensive Network Deception
529
--
539
Steven Furnell
,
Paul Dowland
,
H. M. Illingworth
,
Paul L. Reynolds
.
Authentication and Supervision: A Survey of User Attitudes
551
--
558
Mohammad Peyravian
,
Stephen M. Matyas
,
Allen Roginsky
,
Nevenko Zunic
.
Ticket and Challenge-Based Protocols for Timestamping
559
--
563
Andres Torrubia
,
Francisco J. Mora
.
Information Security in Multiprocessor Systems Based on the X86 Architecture
Volume
19
, Issue
5
382
--
383
Bill Hancock
.
Security Views
383
--
384
Bill Hancock
.
I Agree Legal Agreements Get Legislated
385
--
387
Bill Hancock
.
The US Government Tells Its Users to Clean Up Their E-mail
387
--
388
Bill Hancock
.
Home PC s Targeted by Hackers (Duh!)
388
--
388
Bill Hancock
.
CIO s Get Serious About Best Security Practices
389
--
391
Bill Hancock
.
Microsoft a Popular Virus Target Due to Ubiquity
389
--
389
Bill Hancock
.
Yahoo Faces Identity Crisis
391
--
392
Bill Hancock
.
UK s RIP Bill Creates Official Snooping
392
--
393
Bill Hancock
.
Extortion Going Online
393
--
393
Bill Hancock
.
Office 2000 Patch Recommended by CERT
393
--
394
Bill Hancock
.
Self-Regulation for Privacy Doesn t Work Says FTC
394
--
395
Bill Hancock
.
...But the Industry Wants Self-Regulation
395
--
396
Bill Hancock
.
US Senate Wakes Up to Need for Cybertools for Law Enforcers
396
--
397
Bill Hancock
.
PGP V5.0 Keys Potentially Insecure
397
--
398
Bill Hancock
.
Canadian Credit Card Conundrum Caused by a Cracker
398
--
400
Bill Hancock
.
Network Solutions Re-evaluates Security
398
--
398
Bill Hancock
.
Suspect Charged in Love Bug Worm has Charges Dropped
400
--
401
Bill Hancock
.
CMU Sets Up a Sister to CERT
401
--
401
Bill Hancock
.
Speedy Response Yields Success at DOE
402
--
403
Bill Hancock
.
Who s to Blame?
402
--
402
Bill Hancock
.
AOL Gets Busted - Again
403
--
403
Bill Hancock
.
Wireless Ubiquity for E-Biz
404
--
404
Bill Hancock
.
And Now, the Bug-in-Your-Site Award Goes To...
404
--
405
Bill Hancock
.
Isn t It Interesting What You Can Buy At An Auction Site? TV s, Computers, Drugs
405
--
407
Bill Hancock
.
G8 Thinks About Cybercrime (It s About Time, Too)
408
--
420
Stephen Hinde
.
Love Conquers All?
421
--
427
Gerald L. Kovacich
.
Netspionage The Global Threat to Information, Part II: Information Collection in the Gray Zon
428
--
441
Stephen M. Matyas
,
Jeff Stapleto
.
A Biometric Standard for Information Management and Security
453
--
465
Yu-Lun Huang
,
Shiuh-Pyng Shieh
,
Fu-Shen Ho
.
A Generic Electronic Payment Model Supporting Multiple Merchant Transactions
466
--
469
Mohammad Peyravian
,
Nevenko Zunic
.
Methods for Protecting Password Transmission
Volume
19
, Issue
4
296
--
297
Bill Hancock
.
Intel Eliminates ID from New Chips
296
--
296
Bill Hancock
.
Suspected Hackers Arrested in Russian Credit-Card Fraud
297
--
298
Bill Hancock
.
DOD Finds Plans Online Reserve Unit Assesses Risk
297
--
297
Bill Hancock
.
European Parliament Doesn t Like Anonymity Online
298
--
298
Bill Hancock
.
Agencies Are Own Worst Enemy
298
--
300
Bill Hancock
.
US Department of Energy Security Criticized - Again
300
--
301
Bill Hancock
.
This is What Happens When You Lose Your Computer With Classified Data On It...
301
--
302
Bill Hancock
.
Not Everyone Wants PKI NSF Opts for Digital Signature Alternativ
302
--
303
Bill Hancock
.
Justice Department Conducting Criminal Probe in Former CIA Director Activities
303
--
305
Bill Hancock
.
Apache Site Defaced
306
--
307
Bill Hancock
.
US and Europe Cybercrime Agreement Problems
307
--
308
Bill Hancock
.
Cyberstalking on the Rise
308
--
309
Bill Hancock
.
Large Child Pornography Ring Busted in Texas
309
--
310
Bill Hancock
.
New Denial of Service Attack on Internet
310
--
310
Bill Hancock
.
US Supreme Court Confirms ISPs Not Liable in E-mail Messages
310
--
311
Bill Hancock
.
Software Scam - 17 Indicted
312
--
320
Stephen Hinde
.
Smurfing, Swamping, Spamming, Spoofing, Squatting, Slandering, Surfing, Scamming and Other Mischiefs of the World Wide Web
321
--
325
Richard Barber
.
Security in a Mobile World Is Bluetooth the Answer?
326
--
336
Gerald L. Kovacich
.
Netspionage The Global Threat to Information, Part I: What is it and Why I Should Care?
337
--
347
Julie D. Nosworthy
.
Implementing Information Security In The 21st Century Do You Have the Balancing Factors?
348
--
356
Petra van Krugten
,
Mark Hoogenboom
.
B2C Security Be Just Secure Enough
369
--
374
Mohammad Peyravian
,
Stephen M. Matyas
,
Allen Roginsky
,
Nevenko Zunic
.
Multiparty Biometric-Based Authentication
Volume
19
, Issue
3
202
--
203
Bill Hancock
.
Security Views
203
--
204
Bill Hancock
.
Network Warfare On The Rise
204
--
205
Bill Hancock
.
FBI Source Convicted of Hackin
205
--
206
Bill Hancock
.
Microsoft Whistler Release Posted to Internet
206
--
207
Bill Hancock
.
US Senate Passes Bill to Tighten Up Government Network
207
--
207
Bill Hancock
.
Cyberpatrol Reverse Engineering: Round 2
208
--
208
Bill Hancock
.
US Army Warns of Cyberattackers Gaining Access to Military Weapons Systems
208
--
208
Bill Hancock
.
First Cybercrime Task Force City - Pittsburgh
209
--
211
Bill Hancock
.
More on the January, 2000, NSA Computer Problems
211
--
212
Bill Hancock
.
Another Insider Job on Wall Stree
211
--
211
Bill Hancock
.
Mexico s President Under Cyberattack - Again
212
--
213
Bill Hancock
.
USDOJ Goes Prime Time With Cybercrime Web Sit
212
--
212
Bill Hancock
.
FBI Identifies Hacker Who Stole More than 485 000 Credit Card Numbers
213
--
214
Bill Hancock
.
EU and US Reach Agreement on Privacy Issues
214
--
215
Bill Hancock
.
Warning from the US Government: Companies Get Secure or..
215
--
215
Bill Hancock
.
China Relaxes Encryption Rules
216
--
216
Bill Hancock
.
French Card Forgery Note Could Work
216
--
217
Bill Hancock
.
US Law Enforcement Needs You!
217
--
218
Bill Hancock
.
UK Law Enforcement Bemoans Criminal Activities on Interne
218
--
219
Bill Hancock
.
Kevin Mitnick Gets His Day in Congres
218
--
218
Bill Hancock
.
Intel Creates New Plans for Notebook Security
219
--
220
Bill Hancock
.
Web Site Owners Seek Security People Apply Now!
220
--
221
Bill Hancock
.
Generation X Hackers?
222
--
229
Stephen Hinde
.
Life Was Simple Then
230
--
233
Richard Barber
.
Implementing Public Key Infrastructures in a Dynamic Business Environment
234
--
242
Thomas Finne
.
Information Systems Risk Management: Key Concepts and Business Processes
243
--
256
Mariki M. Eloff
,
Sebastiaan H. von Solms
.
Information Security Management: A Hierarchical Framework for Various Approaches
267
--
281
Spyros Kokolakis
,
Evangelos A. Kiountouzis
.
Achieving Interoperability in a Multiple-Security- Policies Environment
282
--
288
Mohammad Peyravian
,
Stephen M. Matyas
,
Allen Roginsky
,
Nevenko Zunic
.
Generation of RSA Keys That Are Guaranteed to be Unique for Each User
Volume
19
, Issue
2
108
--
109
Bill Hancock
.
Alliance Formed to Fight Internet Attacks
108
--
108
Bill Hancock
.
Security Views
109
--
110
Bill Hancock
.
Code Paranoia about FBI Offerings to Detect DoS Infiltration
110
--
111
Bill Hancock
.
CIA says Russia and China are Building CyberSpy Organization
111
--
113
Bill Hancock
.
FBI Investigating Copycat Operations in Wake of February, 2000, DDoS Attacks
111
--
111
Bill Hancock
.
The SEC Hires CyberInvestigators to Search for Fraud
113
--
113
Bill Hancock
.
Industry Teaming on ISACs
113
--
114
Bill Hancock
.
In Wake of Attacks, FBI Using Racketeering Laws for Prosecution
114
--
115
Bill Hancock
.
Mafiaboy Hacker Eyed In Attacks
115
--
115
Bill Hancock
.
Japan Web Hackers Use Chinese and US Servers
116
--
116
Bill Hancock
.
Y2Hack Get-Together in Israel Under Political Attack
116
--
117
Bill Hancock
.
US Pentagon Defense Messaging System Shows Deficiencies in Security
117
--
117
Bill Hancock
.
Security Managers Cite Need for Real-Time Security
119
--
127
Stephen Hinde
.
New Millennium, Old Failures
128
--
132
Steve Webb
.
Crimes And Misdemeanours: How to Protect Corporate Information in the Internet Age
133
--
140
Gerald L. Kovacich
,
William C. Boni
.
Internet Targets
141
--
148
Michael Collins
.
Telecommunications Crime - Part 3
149
--
163
Mark Hoogenboom
,
Patrick Steemers
.
Security For Remote Access And Mobile Application
185
--
194
Lynette Barnard
,
Rossouw von Solms
.
A Formalized Approach to the Effective Selection and Evaluation of Information Security Control
Volume
19
, Issue
1
6
--
7
Bill Hancock
.
Mass Network Flooding Attacks (Distributed Denial of Service - DDoS) Surface in the Wild
7
--
8
Bill Hancock
.
Cell Phone Crypto Cracked
8
--
9
Bill Hancock
.
Clinton s Proposed Crypto Regulations Under Attack
9
--
10
Bill Hancock
.
Overhauling the National Security Agency?
10
--
12
Bill Hancock
.
Down Under, Hacking Private Computers by the Government is Legal
12
--
13
Bill Hancock
.
The S in SAP Doesn t Stand for Security
12
--
12
Bill Hancock
.
New York Times Fires Employees for Violating Internal E-mail Policies
13
--
14
Bill Hancock
.
Anonymizing Software Causes Law Enforcement Concerns
13
--
13
Bill Hancock
.
Melissa Virus Creator Pleads Guilty
14
--
16
Bill Hancock
.
Security Problems Go Mobile In Your Next Car
16
--
17
Bill Hancock
.
The L0pht Goes Corporate and becomes @Stake
18
--
20
Chuck Williams
,
Nevenko Zunic
,
Stephen M. Matyas
,
Sarbari Gupta
,
Michael Willett
.
Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction
21
--
27
Michael Smith
,
Paul C. van Oorschot
,
Michael Willett
.
Cryptographic Information Recovery Using Key Recover
28
--
30
Michael Willett
.
Features, Attributes, Characteristics, and Traits (FACTs) of Key Recovery Schemes/Products
31
--
36
John Kennedy
,
Stephen M. Matyas
,
Nevenko Zunic
.
Key Recovery Functional Model
37
--
40
Stephen M. Matyas
,
Nevenko Zunic
.
Additional Key Recovery Function
41
--
47
Sarbari Gupta
.
A Common Key Recovery Block Format: Promoting Interoperability Between Dissimilar Key Recovery Mechanisms
48
--
55
Chuck Williams
,
Nevenko Zunic
.
Global Interoperability for Key Recovery
56
--
68
Sarbari Gupta
,
Stephen M. Matyas
.
Public Key Infrastructure: Analysis of Existing and Needed Protocols and Object Formats for Key Recovery
69
--
81
Abby Maclean
,
Stephen M. Matyas
,
Nevenko Zunic
.
Organization Implementation Guidelines for Recovery of Encrypted Information
82
--
85
Nevenko Zunic
.
Organization Considerations for Retrieval of Stored Data via Key Recovery Methods
86
--
90
Tom Markham
,
Chuck Williams
.
Key Recovery Header for IPSEC
91
--
99
David M. Balenson
,
Tom Markham
.
ISAKMP Key Recovery Extension
100
--
104
Timothy G. Shoriak
.
SSL/TLS Protocol Enablement for Key Recovery