researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Volume
Volume
21
, Issue
8
674
--
67
E. Eugene Schultz
.
The gap between cryptography and information security
677
--
688
E. Eugene Schultz
.
Security Views
689
--
693
Stephen Hinde
.
Compsec 2002: the complete security circle
694
--
695
Andrew Armstrong
.
KLEZ H
696
--
700
Jon David
.
Giga Security
701
--
704
Harry Demaio
.
Global Trust, Certification and (ISC):::2:::
705
--
711
Jeffrey Hunker
.
Policy challenges in building dependability in global infrastructures
719
--
735
Francesco Bergadano
,
Davide Cavagnino
,
Bruno Crispo
.
Individual Authentication in Multiparty Communications
736
--
749
S. Holeman
,
G. Manimaran
,
James Davis
,
Anirban Chakrabarti
.
Differentially secure multicasting and its implementation methods
750
--
759
Sheng Zhong
.
A practical key management scheme for access control in a user hierarchy
Volume
21
, Issue
7
578
--
580
E. Eugene Schultz
.
The US Government bigger and better information security?
581
--
590
E. Eugene Schultz
.
Security Views
592
--
606
Stephen Hinde
.
Spam, scams, chains, hoaxes and other junk mail
607
--
608
Andrew Armstrong
.
Bugbear
609
--
612
Matt Bishop
.
Trends in academic research: vulnerabilities analysis and intrusion detection
613
--
616
Brian McKenna
.
Managed Security Services new economy relic or wave of the future?
617
--
619
H. S. Venter
,
Jan H. P. Eloff
.
Vulnerabilities categories for intrusion detection system
620
--
623
Chris Pounder
.
Security policy update
636
--
647
Sarah Gordon
,
Richard Ford
.
Cyberterrorism?
648
--
664
Steve Kenny
,
Larry Korba
.
Applying digital rights management systems to privacy rights management
665
--
667
Lei Fan
,
Jian-hua Li
,
HongWen Zhu
.
An enhancement of timestamp-based password authentication scheme
Volume
21
, Issue
6
481
--
490
E. Eugene Schultz
.
Security Views
491
--
496
Stephen Hinde
.
The Blue Screen of Death and other deadly bugs
497
--
502
Andy Nikishin
.
I-Worm.Lentin (aka Yaha)
503
--
505
Chris Pounder
.
The US s National Strategy for Homeland Security
506
--
513
Jon David
.
Policy enforcement in the workplace
514
--
519
August Bequai
.
White collar crime: a handmaiden of international tech terrorism
520
--
521
Sarah Hilley
.
Palladium, fraud, and surviving terrorism- Compsec 2002 - Preview of Compsec 2002, 30 Oct-1 Nov, Queen Elizabeth II Conference Centre, Westminster, London, UK
526
--
531
E. Eugene Schultz
.
A framework for understanding and predicting insider attacks
557
--
564
Virginia E. Rezmierski
,
Marshall R. Seese Jr.
,
Nathaniel St. Clair II
.
University systems security logging: who is doing it and how far can they go?
565
--
570
Tzer-Shyong Chen
,
Yu-Fang Chung
.
Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm
Volume
21
, Issue
5
382
--
384
E. Eugene Schultz
.
Taking a stand on hackers
385
--
396
E. Eugene Schultz
.
Security Views
397
--
401
Bill Hancock
.
Security crisis management the basics
402
--
409
Karin Höne
,
Jan H. P. Eloff
.
Information security policy what do international information security standards say?
410
--
412
Andy Nikishin
.
Much Ado About Nothing: Win32 Perrun
413
--
420
William J. Caelli
.
Trusted ...or... trustworthy: the search for a new paradigm for computer and network security
421
--
423
Brian McKenna
.
Enterprise in focus at NetSec 2002
424
--
432
Stephen Hinde
.
The perils of privacy
439
--
448
Yihua Liao
,
V. Rao Vemuri
.
Use of K-Nearest Neighbor classifier for intrusion detection
449
--
460
Der-Chyuan Lou
,
Jiang-Lung Liu
.
Steganographic Method for Secure Communications
461
--
471
Marit Hansen
,
Kristian Köhntopp
,
Andreas Pfitzmann
.
The Open Source approach opportunities and limitations with respect to security and privacy
Volume
21
, Issue
4
290
--
292
E. Eugene Schultz
.
The Sorry State of Law Enforcement
293
--
302
E. Eugene Schultz
.
Security views
303
--
309
Steve Purser
.
Why access control is difficult
310
--
321
Stephen Hinde
.
Security surveys spring crop
322
--
327
Andy Nikishin
.
The Klez.H worm dissected
328
--
332
Chris Pounder
.
The emergence of a comprehensive obligation towards computer security
333
--
337
August Bequai
.
Syndicated crime and international terrorism: the lessons of 9-11
345
--
355
Younghwa Lee
,
Jintae Lee
,
Zoonky Lee
.
Integrating Software Lifecycle Process Standards with Security Engineering
356
--
371
Peter Ward
,
Clifton L. Smith
.
The Development of Access Control Policies for Information Technology Systems
372
--
375
Hung-Yu Chien
,
Jinn-ke Jan
,
Yuh-Min Tseng
.
An Efficient and Practical Solution to Remote Authentication: Smart Card
Volume
21
, Issue
3
201
--
211
E. Eugene Schultz
.
Security Views
212
--
21
Stephen Hinde
.
It Was Déjá vu all Over Again
220
--
228
Nathan L. Clarke
,
Steven Furnell
,
P. M. Rodwell
,
Paul L. Reynolds
.
Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices
229
--
238
Gary McGraw
.
On Bricks and Walls: Why Building Secure Software is Hard
240
--
245
Chris Pounder
.
Anti-Terrorism Legislation: The Impact on The Processing of Data
253
--
265
Joris Claessens
,
Valentin Dem
,
Danny De Cock
,
Bart Preneel
,
Joos Vandewalle
.
On the Security of Today s Online Electronic Banking Systems
266
--
284
Elmé Smith
,
Jan H. P. Eloff
.
A Prototype for Assessing Information Technology Risks in Health Care
Volume
21
, Issue
2
101
--
112
E. Eugene Schultz
.
Security Views
113
--
119
Gerald L. Kovacich
,
Andy Jones
.
What InfoSec Professionals Should Know About Information Warfare Tactics by Terrorists
120
--
125
Bob Blakley
.
Security Insights
142
--
163
Joan L. Aron
,
Michael O Leary
,
Ronald A. Gove
,
Shiva Azadegan
,
M. Christina Schneider
.
The Benefits of a Notification Process in Addressing the Worsening Computer Virus Problem: Results of a Survey and a Simulation Model
164
--
171
Victor R. L. Shen
,
Tzer-Shyong Chen
.
A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations
172
--
192
Lech J. Janczewski
,
Frank Xinli Shi
.
Development of Information Security Baselines for Healthcare Information Systems in New Zealand
Volume
21
, Issue
1
5
--
15
E. Eugene Schultz
.
Security Views
16
--
34
Stephen Hinde
.
2001: A Privacy Odyssey Revisited
35
--
41
Gerald L. Kovacich
,
Andy Jones
.
What InfoSec professionals should know about information warfare tactics by terrorists
62
--
73
G. Magklaras
,
Steven Furnell
.
Insider Threat Prediction Tool: Evaluating the probability of IT misuse
74
--
76
Chi-Kwong Chan
,
Lee-Ming Cheng
.
Cryptanalysis of a Timestamp-Based Password Authentication Scheme
77
--
92
Kapali Viswanathan
,
Colin Boyd
,
Ed Dawson
.
Hybrid Key Escrow: A New Paradigm