researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Sec. Techn. Report
Home
Index
Info
Volume
Volume
5
, Issue
4
1
--
2
Chez Ciechanowicz
.
Introduction
17
--
32
Chris Mitchell
.
PKI standards
33
--
38
Robert Bickmore
.
Implementing a PKI
39
--
52
Robert Carolina
,
Jamie Lyford
,
Tarlo Lyons
.
The Intersection of Public Key Infrastructures and the Law
53
--
65
Chris Sundt
.
PKI - Panacea or Silver Bullet?
66
--
71
Steve Matthews
.
Authorization Models - PKI Versus the Real World
72
--
80
Vivike Sedov
.
Certificate Classes
81
--
83
John Bullard
.
Achieving Certainty in an Age of Uncertainty
84
--
89
Mark Stirland
.
Identrus - the 'Technical Platform'
Volume
5
, Issue
3
1
--
0
Chez Ciechanowicz
.
Introduction
15
--
22
Rudy Bakalov
.
Introduction to WAP's Wireless Transport Layer Security
23
--
31
Stephen Farrell
.
The WAP Forum's Wireless Public Key Infrastructure
32
--
43
Joakim Persson
,
Ben J. M. Smeets
.
Bluetooth Security - An Overview
44
--
54
Gert Roelofsen
.
TETRA Security
55
--
65
Colin Blanchard
.
Security for the Third Generation (3G) Mobile System
66
--
73
Steve Babbage
.
Design of Security Algorithms for Third Generation Mobile Telephony
74
--
82
Scott Cadzow
.
Security Concerns in IP-Based Telephony: Covering TIPHON as a Case Study
Volume
5
, Issue
2
1
--
0
Chez Ciechanowicz
.
Introduction
15
--
22
T. J. Bates
.
Computer Evidence - Recent Issues
23
--
33
Peter Yapp
.
Who's Bugging You? How Are You Protecting Your Information?
34
--
42
Vincent Blake
.
PABX Security
43
--
50
Simon Janes
.
The Role of Technology in Computer Forensic Investigations
51
--
59
Malcolm Highfield
.
The Computer Misuse Act 1990: Understanding and Applying the Law
60
--
70
Tad Dippel
.
IT as an Enabler of Computer Fraud
Volume
5
, Issue
1
14
--
25
Tony Mason
.
Platform Security and Common Criteria
26
--
41
Roger R. Schell
,
Michael F. Thompson
.
Platform Security: What is Lacking?
42
--
47
Tim D. Stone
,
David Miller
.
High Security Modules - Still Needed Despite Advances in Platforms
48
--
53
Nicholas Bohm
.
How Strong do Platforms Need to be From a Legal Perspective?
54
--
63
Boris Balacheff
,
Liqun Chen
,
Siani Pearson
,
Graeme Proudler
,
David Chan
.
Computing Platform Security in Cyberspace
64
--
82
Ivan Phillips
.
Windows 2000 Security: A Balanced View