researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Sec. Techn. Report
Home
Index
Info
Volume
Volume
3
, Issue
4
1
--
2
Chez Ciechanowicz
.
Introduction
15
--
31
Phil Venables
.
Security monitoring in heterogeneous globally distributed environments
32
--
42
Filip Schepers
.
Network-versus host-based intrusion detection
43
--
52
Glenn Pittaway
.
Distributed security services in Microsoft Windows 2000 (Windows NT 5.0: Protecting data in the enterprise
53
--
64
Marcus J. Ranum
,
Kent Landfield
,
Michael T. Stolarchuk
,
Mark Sienkiewicz
,
Andrew Lambeth
,
Eric Wall
.
Implementing a generalized tool for network monitoring
65
--
74
Roy McNamara
.
Networks - Where does the real threat lie?
75
--
78
Jim Bates
.
Fundamentals of computer forensics
79
--
86
Robin Barker
,
Gavin Kelly
.
The Vulnerability Instantiation Methodology prototype
Volume
3
, Issue
3
1
--
2
Chez Ciechanowicz
.
Introduction
15
--
22
John Hayday
.
Windows NT security architecture
23
--
30
John Hayday
.
Windows NT - Remote access
31
--
43
Ian White
.
Developing a Windows NT security policy
44
--
52
Simon Wiseman
.
Adding security labelling to Windows NT
53
--
64
Glenn Pittaway
.
Distributed security services in microsoft Windows NT 5.0 - Kerberos and the active directory
65
--
70
Peter Brundrett
.
Kerberos authentication in Windows NT 5.0 domains
Volume
3
, Issue
2
1
--
2
Chez Ciechanowicz
.
Introduction
18
--
33
Liaquat Khan
.
Deploying public key infrastructures
34
--
40
Stefek Zaba
.
Tools and protocols for E-commerce
41
--
54
Mark Stirland
.
Smartcards in secure Electronic Commerce
55
--
61
Peter Landrock
,
Torben P. Pedersen
.
WYSIWYS? - What you see is what you sign?
62
--
70
Dieter Gollmann
,
Ulrich Lang
.
Security in CORBA-based electronic commerce systems
71
--
81
Francis Aldhouse
.
Data protection and Electronic Commerce
82
--
89
Constantinos Markantonakis
.
Java card technology and security
90
--
97
Keith R. Dennis
.
Public key network infrastructure: An evolutionary step in the ascent of WAN
98
--
110
T. Dosdale
,
C. N. Rasmussen
.
EDI security
Volume
3
, Issue
1
1
--
0
Chez Ciechanowicz
.
Introduction
14
--
20
Judith A. Markowitz
.
Speaker recognition
21
--
32
Lawrence O'Gorman
.
An overview of fingerprint verification technologies
33
--
39
John Daugman
.
Recognizing people by their iris patterns
40
--
46
Jürgen Pampus
,
Frank Weber
.
Facial recognition - An overview
47
--
51
Eugene Sweeney
.
Veincheck - A technical perspective
52
--
59
Michael C. Fairhurst
.
New perspectives in automatic signature verification
60
--
69
Bob Carter
.
Implementation implications of biometrics
70
--
76
Tony Mansfield
,
Gavin Kelly
.
Measuring and comparing the performance of biometric systems
77
--
80
Marek Rejman-Greene
.
Security considerations in the use of biometric devices
81
--
85
Ian Chandler
.
Cardholder verification - Realities at point-of-sale
86
--
89
Stephen Thomas
.
Will commercial applications for biometric-based solutions really take off in 1998?
90
--
94
Simon Davies
.
Biometrics - A civil liberties and privacy perspective
95
--
97
Peter Hawkes
.
Biometrics and Turing's legacy