Journal: Inf. Sec. Techn. Report

Volume 5, Issue 4

1 -- 2Chez Ciechanowicz. Introduction
17 -- 32Chris Mitchell. PKI standards
33 -- 38Robert Bickmore. Implementing a PKI
39 -- 52Robert Carolina, Jamie Lyford, Tarlo Lyons. The Intersection of Public Key Infrastructures and the Law
53 -- 65Chris Sundt. PKI - Panacea or Silver Bullet?
66 -- 71Steve Matthews. Authorization Models - PKI Versus the Real World
72 -- 80Vivike Sedov. Certificate Classes
81 -- 83John Bullard. Achieving Certainty in an Age of Uncertainty
84 -- 89Mark Stirland. Identrus - the 'Technical Platform'

Volume 5, Issue 3

1 -- 0Chez Ciechanowicz. Introduction
15 -- 22Rudy Bakalov. Introduction to WAP's Wireless Transport Layer Security
23 -- 31Stephen Farrell. The WAP Forum's Wireless Public Key Infrastructure
32 -- 43Joakim Persson, Ben J. M. Smeets. Bluetooth Security - An Overview
44 -- 54Gert Roelofsen. TETRA Security
55 -- 65Colin Blanchard. Security for the Third Generation (3G) Mobile System
66 -- 73Steve Babbage. Design of Security Algorithms for Third Generation Mobile Telephony
74 -- 82Scott Cadzow. Security Concerns in IP-Based Telephony: Covering TIPHON as a Case Study

Volume 5, Issue 2

1 -- 0Chez Ciechanowicz. Introduction
15 -- 22T. J. Bates. Computer Evidence - Recent Issues
23 -- 33Peter Yapp. Who's Bugging You? How Are You Protecting Your Information?
34 -- 42Vincent Blake. PABX Security
43 -- 50Simon Janes. The Role of Technology in Computer Forensic Investigations
51 -- 59Malcolm Highfield. The Computer Misuse Act 1990: Understanding and Applying the Law
60 -- 70Tad Dippel. IT as an Enabler of Computer Fraud

Volume 5, Issue 1

14 -- 25Tony Mason. Platform Security and Common Criteria
26 -- 41Roger R. Schell, Michael F. Thompson. Platform Security: What is Lacking?
42 -- 47Tim D. Stone, David Miller. High Security Modules - Still Needed Despite Advances in Platforms
48 -- 53Nicholas Bohm. How Strong do Platforms Need to be From a Legal Perspective?
54 -- 63Boris Balacheff, Liqun Chen, Siani Pearson, Graeme Proudler, David Chan. Computing Platform Security in Cyberspace
64 -- 82Ivan Phillips. Windows 2000 Security: A Balanced View