Journal: Inf. Sec. Techn. Report

Volume 11, Issue 4

159 -- 0G. Price. Editorial for v.11 n.4 of the Information Security Technical Report: "Windows Security Revisited"
160 -- 165Stephen D. Wolthusen. Windows device interface security
166 -- 175A. A. Abimbola, J. M. Munoz, William J. Buchanan. NetHost-sensor: Monitoring a target host's application via system calls
176 -- 185I. Phillips. Windows Vista security: First impressions
186 -- 192Brian A. LaMacchia, John Manferdelli. New Vistas in elliptic curve cryptography
193 -- 202Paul England, John Manferdelli. Virtual machines for enterprise desktop security

Volume 11, Issue 3

109 -- 110Scarlet Schwiderski-Grosche. Security: An end user perspective
111 -- 118Otto Bernecker. Biometrics: security: An end user perspective
119 -- 128Katrin Borcea-Pfitzmann, Marit Hansen, Katja Liesebach, Andreas Pfitzmann, Sandra Steinbrecher. What user-controlled identity management should learn from communities
129 -- 136Brian Berger. Security standards: An end-user perspective
137 -- 146Tim Wright. Security considerations for broadcast systems
147 -- 153Keith Mayes, Konstantinos Markantonakis. On the potential of high density smart cards
154 -- 158Jens RĂ¼dinger. The complexity of DPA type side channel attacks and their dependency on the algorithm design

Volume 11, Issue 2

67 -- 0Michael J. Ganley. Introduction - Cryptography
68 -- 71Richard Walton. Cryptography and trust
72 -- 81Kenneth G. Paterson. A cryptographic tour of the IPsec standards
82 -- 88Matthew J. B. Robshaw. An overview of RFID tags and new cryptographic developments
89 -- 92M. Ward. EMV card payments - An update
93 -- 99Mike Bond, Jolyon Clulow. Integrity of intention (a theory of types for security APIs)
100 -- 107Carlos Cid. Recent developments in cryptographic hash functions: Security implications and future directions

Volume 11, Issue 1

1 -- 0Chez Ciechanowicz. Editorial
2 -- 9Chris Sundt. Information security and the law
10 -- 17Ian Walden. Communication service providers: Forensic source and investigatory tool
18 -- 25Stefek Zaba. Digital signature legislation: The first 10 years
26 -- 31J. Stuart Broderick. ISMS, security standards and security regulations
32 -- 38Phil Pinder. Preparing Information Security for legal and regulatory compliance (Sarbanes-Oxley and Basel II)
39 -- 45Richard Walton. The Computer Misuse Act
46 -- 54Andrew Charlesworth. The future of UK data protection regulation
55 -- 61Gary Hardy. Using IT governance and COBIT to deliver value with IT and respond to legal, regulatory and compliance challenges
62 -- 65David Lacey. A new institute for a new millennium