Journal: Inf. Sec. Techn. Report

Volume 4, Issue 4

1 -- 2Chez Ciechanowicz. Introduction
12 -- 17Sean Murphy. The Advanced Encryption Standard (AES)
18 -- 27Nick Mansfield. Designing a practical Public Key Infrastructure (PKI)
28 -- 33David Naccache. Padding attacks on RSA
34 -- 39Peter Landrock. Challenging the conventional view of PKI - will it really work?
40 -- 46Stefek Zaba. The NSAKEY in microsoft's crypto API: facts, fiction and speculation
47 -- 52Thomas Beth. The state of public-key cryptography - not only after the invention of quantum computers
53 -- 62Hans Dobbertin. Secure hashing in practice

Volume 4, Issue 3

1 -- 0Chez Ciechanowicz. Introduction
12 -- 19Andy Jones. Information warfare - what is it?
20 -- 27Colin L. Nash, Cathy K. Piggott. Beyond boundary protection devices - The concept of recovery
28 -- 42Andrew Rathmell. International CIP policy: Problems and prospects
43 -- 53Andrew Blyth. Footprinting for intrusion detection and threat assessment
54 -- 62Paul Zavidniak, Anita D'Amico, Dennis McCallam. Achieving information resiliency
63 -- 69Bill Millar. Defensive information warfare

Volume 4, Issue 2

1 -- 0Chez Ciechanowicz. Introduction
13 -- 18Mike Paterson. The chip in your wallet - The technology of security in smartcard chip manufacture
19 -- 27Pierre Girard, Jean-Louis Lanet. New security issues raised by open cards
28 -- 41Markus Kuhn, Oliver Kömmerling. Physical security of smartcards
42 -- 50D. Cherrill, A. Brocklehurst. Smartcard certfication
51 -- 57Mike Ward. EMV - The ICC specifications for payment systems
58 -- 63Kenneth R. Ayer. Mitigating smart card risks
64 -- 68John Beric. Mondex security strategy
69 -- 77Constantinos Markantonakis. Interfacing with smartcard applications - (ThOpen Card Framework and PC/SC)

Volume 4, Issue 1

1 -- 2Chez Ciechanowicz. Introduction
3 -- 15John Shawe-Taylor, Keith Howker, Peter Burge. Detection of fraud in mobile telecommunications
16 -- 28John Shawe-Taylor, Keith Howker, Peter Burge. Detection of fraud in mobile telecommunications
29 -- 37Gert Roelofsen. Cryptographic algorithms in telecommunications systems
38 -- 41Simon Collins. How secure are telecoms internetwork communications?
42 -- 52Thomas F. Johnston. Security issues in a satellite global GSM network
53 -- 60Michael Walker. The direction of telecommunications security