researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Sec. Techn. Report
Home
Index
Info
Volume
Volume
8
, Issue
4
5
--
0
Chez Ciechanowicz
.
Introduction
6
--
13
Glenn Gunara-Chen
.
The art of intrusion testing
14
--
25
Andrew Blyth
.
An XML-based architecture to perform data integration and data unification in vulnerability assessments
26
--
33
Gerhard Eschelbeck
,
Michael Krieger
.
Eliminating noise from intrusion detection systems
34
--
44
Andy Gray
.
An historical perspective of software vulnerability management
45
--
55
Evangelos Morakis
,
Stilianos Vidalis
,
Andrew Blyth
.
Measuring vulnerabilities and their exploitation cycle
56
--
64
Neil Barrett
.
Penetration testing and social engineering: Hacking the weakest link
65
--
77
Paul Midian
.
How to ensure an effective penetration test
78
--
84
Stein Mollerhaug
.
Useful vulnerability assessment
Volume
8
, Issue
3
5
--
0
Fred Piper
,
Geraint Price
,
Kenny Paterson
.
Introduction
23
--
35
Dick Emery
,
Stephen Upton
,
Richard Trevorah
.
tScheme - voluntary approval for certificate authority services
36
--
44
Semia Jaweed
.
Could there ever be a unitary digital certificate?
57
--
72
Kenneth G. Paterson
,
Geraint Price
.
A comparison between traditional public key infrastructures and identity-based cryptography
73
--
88
Chris R. Dalton
.
The NHS as a proving ground for cryptosystems
Volume
8
, Issue
2
5
--
0
Chez Ciechanowicz
.
Introduction
6
--
17
.
Forensic analysis on a Lotus Notes server
18
--
31
.
Addressing the data problem
32
--
36
.
Computer forensics: past, present and future
37
--
41
.
Some stepping stones in computer forensics
42
--
54
.
A comprehensive approach to digital incident investigation
55
--
64
.
Management strategies for implementing forensic security measures
Volume
8
, Issue
1
5
--
0
Chez Ciechanowicz
.
Introduction
6
--
16
Keith Mayes
,
Konstantinos Markantonakis
.
Are we smart about security?
17
--
29
Konstantinos Markantonakis
,
Keith Mayes
.
An overview of the GlobalPlatform smart card specification
30
--
44
Daniel Page
.
Defending against cache-based side-channel attacks
45
--
54
Paul Aebi
,
Rudolf Oswald
.
Secure SIM lifecycle management
55
--
66
Pierre Girard
,
Jean-Luc Giraud
.
Software attacks on smart cards
67
--
84
Wolfgang Rankl
.
Overview about attacks on smart cards