researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Sec. Techn. Report
Home
Index
Info
Volume
Volume
11
, Issue
4
159
--
0
G. Price
.
Editorial for v.11 n.4 of the Information Security Technical Report: "Windows Security Revisited"
160
--
165
Stephen D. Wolthusen
.
Windows device interface security
166
--
175
A. A. Abimbola
,
J. M. Munoz
,
William J. Buchanan
.
NetHost-sensor: Monitoring a target host's application via system calls
176
--
185
I. Phillips
.
Windows Vista security: First impressions
186
--
192
Brian A. LaMacchia
,
John Manferdelli
.
New Vistas in elliptic curve cryptography
193
--
202
Paul England
,
John Manferdelli
.
Virtual machines for enterprise desktop security
Volume
11
, Issue
3
109
--
110
Scarlet Schwiderski-Grosche
.
Security: An end user perspective
111
--
118
Otto Bernecker
.
Biometrics: security: An end user perspective
119
--
128
Katrin Borcea-Pfitzmann
,
Marit Hansen
,
Katja Liesebach
,
Andreas Pfitzmann
,
Sandra Steinbrecher
.
What user-controlled identity management should learn from communities
129
--
136
Brian Berger
.
Security standards: An end-user perspective
137
--
146
Tim Wright
.
Security considerations for broadcast systems
147
--
153
Keith Mayes
,
Konstantinos Markantonakis
.
On the potential of high density smart cards
154
--
158
Jens RĂ¼dinger
.
The complexity of DPA type side channel attacks and their dependency on the algorithm design
Volume
11
, Issue
2
67
--
0
Michael J. Ganley
.
Introduction - Cryptography
68
--
71
Richard Walton
.
Cryptography and trust
72
--
81
Kenneth G. Paterson
.
A cryptographic tour of the IPsec standards
82
--
88
Matthew J. B. Robshaw
.
An overview of RFID tags and new cryptographic developments
89
--
92
M. Ward
.
EMV card payments - An update
93
--
99
Mike Bond
,
Jolyon Clulow
.
Integrity of intention (a theory of types for security APIs)
100
--
107
Carlos Cid
.
Recent developments in cryptographic hash functions: Security implications and future directions
Volume
11
, Issue
1
1
--
0
Chez Ciechanowicz
.
Editorial
2
--
9
Chris Sundt
.
Information security and the law
10
--
17
Ian Walden
.
Communication service providers: Forensic source and investigatory tool
18
--
25
Stefek Zaba
.
Digital signature legislation: The first 10 years
26
--
31
J. Stuart Broderick
.
ISMS, security standards and security regulations
32
--
38
Phil Pinder
.
Preparing Information Security for legal and regulatory compliance (Sarbanes-Oxley and Basel II)
39
--
45
Richard Walton
.
The Computer Misuse Act
46
--
54
Andrew Charlesworth
.
The future of UK data protection regulation
55
--
61
Gary Hardy
.
Using IT governance and COBIT to deliver value with IT and respond to legal, regulatory and compliance challenges
62
--
65
David Lacey
.
A new institute for a new millennium