researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Sec. Techn. Report
Home
Index
Info
Volume
Volume
4
, Issue
4
1
--
2
Chez Ciechanowicz
.
Introduction
12
--
17
Sean Murphy
.
The Advanced Encryption Standard (AES)
18
--
27
Nick Mansfield
.
Designing a practical Public Key Infrastructure (PKI)
28
--
33
David Naccache
.
Padding attacks on RSA
34
--
39
Peter Landrock
.
Challenging the conventional view of PKI - will it really work?
40
--
46
Stefek Zaba
.
The NSAKEY in microsoft's crypto API: facts, fiction and speculation
47
--
52
Thomas Beth
.
The state of public-key cryptography - not only after the invention of quantum computers
53
--
62
Hans Dobbertin
.
Secure hashing in practice
Volume
4
, Issue
3
1
--
0
Chez Ciechanowicz
.
Introduction
12
--
19
Andy Jones
.
Information warfare - what is it?
20
--
27
Colin L. Nash
,
Cathy K. Piggott
.
Beyond boundary protection devices - The concept of recovery
28
--
42
Andrew Rathmell
.
International CIP policy: Problems and prospects
43
--
53
Andrew Blyth
.
Footprinting for intrusion detection and threat assessment
54
--
62
Paul Zavidniak
,
Anita D'Amico
,
Dennis McCallam
.
Achieving information resiliency
63
--
69
Bill Millar
.
Defensive information warfare
Volume
4
, Issue
2
1
--
0
Chez Ciechanowicz
.
Introduction
13
--
18
Mike Paterson
.
The chip in your wallet - The technology of security in smartcard chip manufacture
19
--
27
Pierre Girard
,
Jean-Louis Lanet
.
New security issues raised by open cards
28
--
41
Markus Kuhn
,
Oliver Kömmerling
.
Physical security of smartcards
42
--
50
D. Cherrill
,
A. Brocklehurst
.
Smartcard certfication
51
--
57
Mike Ward
.
EMV - The ICC specifications for payment systems
58
--
63
Kenneth R. Ayer
.
Mitigating smart card risks
64
--
68
John Beric
.
Mondex security strategy
69
--
77
Constantinos Markantonakis
.
Interfacing with smartcard applications - (ThOpen Card Framework and PC/SC)
Volume
4
, Issue
1
1
--
2
Chez Ciechanowicz
.
Introduction
3
--
15
John Shawe-Taylor
,
Keith Howker
,
Peter Burge
.
Detection of fraud in mobile telecommunications
16
--
28
John Shawe-Taylor
,
Keith Howker
,
Peter Burge
.
Detection of fraud in mobile telecommunications
29
--
37
Gert Roelofsen
.
Cryptographic algorithms in telecommunications systems
38
--
41
Simon Collins
.
How secure are telecoms internetwork communications?
42
--
52
Thomas F. Johnston
.
Security issues in a satellite global GSM network
53
--
60
Michael Walker
.
The direction of telecommunications security