Journal: Inf. Sec. Techn. Report

Volume 3, Issue 4

1 -- 2Chez Ciechanowicz. Introduction
15 -- 31Phil Venables. Security monitoring in heterogeneous globally distributed environments
32 -- 42Filip Schepers. Network-versus host-based intrusion detection
43 -- 52Glenn Pittaway. Distributed security services in Microsoft Windows 2000 (Windows NT 5.0: Protecting data in the enterprise
53 -- 64Marcus J. Ranum, Kent Landfield, Michael T. Stolarchuk, Mark Sienkiewicz, Andrew Lambeth, Eric Wall. Implementing a generalized tool for network monitoring
65 -- 74Roy McNamara. Networks - Where does the real threat lie?
75 -- 78Jim Bates. Fundamentals of computer forensics
79 -- 86Robin Barker, Gavin Kelly. The Vulnerability Instantiation Methodology prototype

Volume 3, Issue 3

1 -- 2Chez Ciechanowicz. Introduction
15 -- 22John Hayday. Windows NT security architecture
23 -- 30John Hayday. Windows NT - Remote access
31 -- 43Ian White. Developing a Windows NT security policy
44 -- 52Simon Wiseman. Adding security labelling to Windows NT
53 -- 64Glenn Pittaway. Distributed security services in microsoft Windows NT 5.0 - Kerberos and the active directory
65 -- 70Peter Brundrett. Kerberos authentication in Windows NT 5.0 domains

Volume 3, Issue 2

1 -- 2Chez Ciechanowicz. Introduction
18 -- 33Liaquat Khan. Deploying public key infrastructures
34 -- 40Stefek Zaba. Tools and protocols for E-commerce
41 -- 54Mark Stirland. Smartcards in secure Electronic Commerce
55 -- 61Peter Landrock, Torben P. Pedersen. WYSIWYS? - What you see is what you sign?
62 -- 70Dieter Gollmann, Ulrich Lang. Security in CORBA-based electronic commerce systems
71 -- 81Francis Aldhouse. Data protection and Electronic Commerce
82 -- 89Constantinos Markantonakis. Java card technology and security
90 -- 97Keith R. Dennis. Public key network infrastructure: An evolutionary step in the ascent of WAN
98 -- 110T. Dosdale, C. N. Rasmussen. EDI security

Volume 3, Issue 1

1 -- 0Chez Ciechanowicz. Introduction
14 -- 20Judith A. Markowitz. Speaker recognition
21 -- 32Lawrence O'Gorman. An overview of fingerprint verification technologies
33 -- 39John Daugman. Recognizing people by their iris patterns
40 -- 46Jürgen Pampus, Frank Weber. Facial recognition - An overview
47 -- 51Eugene Sweeney. Veincheck - A technical perspective
52 -- 59Michael C. Fairhurst. New perspectives in automatic signature verification
60 -- 69Bob Carter. Implementation implications of biometrics
70 -- 76Tony Mansfield, Gavin Kelly. Measuring and comparing the performance of biometric systems
77 -- 80Marek Rejman-Greene. Security considerations in the use of biometric devices
81 -- 85Ian Chandler. Cardholder verification - Realities at point-of-sale
86 -- 89Stephen Thomas. Will commercial applications for biometric-based solutions really take off in 1998?
90 -- 94Simon Davies. Biometrics - A civil liberties and privacy perspective
95 -- 97Peter Hawkes. Biometrics and Turing's legacy