default search action
Computers & Security, Volume 22
Volume 22, Number 1, January 2003
- E. Eugene Schultz:
Security views. 4-13 - Stephen Hinde:
Time cost$ money. 14-21 - Fred Piper:
Reseacrh in cryptography and security mechanisms. 22-25 - Henry B. Wolfe:
Computer forensics. 26-28 - Jon David:
Security in a Flash. 29-33 - Chris Pounder:
A tangled Web of libel lies? 34-37 - Brian McKenn:
UK police promise charter to guard good names. 38-40 - Mark Fisher:
LIRVA virus. 41-42 - Sung-Bae Cho, Hyuk-Jang Park:
Efficient anomaly detection by modeling privilege flows using hidden Markov model. 45-55 - Danilo Bruschi, A. Curti, Emilia Rosti:
A quantitative study of Public Key Infrastructures. 56-67 - Chun-Li Lin, Tzonelih Hwang:
A password authentication scheme with secure password updating. 68-72
Volume 22, Number 2, February 2003
- E. Eugene Schultz:
Internet security: what's in the future? 78-79 - E. Eugene Schultz:
Security Views. 80-89 - Stephen Hinde:
The law, cybercrime, risk assessment and cyber protection. 90-95 - Henry B. Wolfe:
The circumstances of seizure. 96-98 - Ken Doughty:
Implementing enterprise security: a case study. 99-114 - Chris Pounder:
Security with unfortunate side effect. 115-118 - D. K. Matai:
The economic impact of war with Iraq asymmetric risks. 119-123 - August Bequai:
Safeguards for IT managers and staff under the Sarbanes-Oxley Act. 124-127 - Hassan Aljifri, Marcel Smets, Alexander Perez-Pons:
IP Traceback using header compression. 136-151 - Jesper M. Johansson, E. Eugene Schultz:
Dealing with contextual vulnerabilities in code: distinguishing between solutions and pseudosolutions. 152-159 - Chin-Chen Chang, Yeu-Pong Lai:
A flexible date-attachment scheme on e-cash. 160-166
Volume 22, Number 3, April 2003
- From the editor-in-chief: Virus and worm trends. 174-175
- E. Eugene Schultz:
Security views. 176-187 - Stephen Hinde:
Cyber-terrorism in context. 188-192 - Hank Wolfe:
Evidence acquisition. 193-195 - Hassan Aljifri, Diego Sánchez Navarro:
International legal aspects of cryptography: Understanding cryptography. 196-203 - Rolf Moulton, Robert S. Coles:
A contest to evaluate IT security services management. 204-206 - Chris Pounder:
Governments act to improve security. 207-211 - Seny Kamara, Sonia Fahmy, E. Eugene Schultz, Florian Kerschbaum, Michael Frantzen:
Analysis of vulnerabilities in Internet firewalls. 214-232 - Helen van de Haar, Rossouw von Solms:
A model for deriving information security control attribute profiles. 233-244 - Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang:
Generalization of proxy signature-based on discrete logarithms. 245-255 - Phillip J. Brooke, Richard F. Paige:
Fault trees for security system design and analysis. 256-264
Volume 22, Number 4, May 2003
- E. Eugene Schultz:
Why can't Microsoft stay out of the InfoSec headlines? 270-272 - E. Eugene Schultz:
Attackers hit Web hosting servers. 273-283 - Stephen Hinde:
Careless about privacy. 284-288 - Hank Wolfe:
Evidence analysis. 289-291 - Marcus K. Rogers:
The role of criminal profiling in the computer forensics process. 292-298 - H. S. Venter, Jan H. P. Eloff:
A taxonomy for information security technologies. 299-307 - James M. Anderson:
Why we need a new definition of information security. 308-313 - Mohammad Peyravian, Allen Roginsky, Nevenko Zunic:
Methods for preventing unauthorized software distribution. 316-321 - Neelam Bhalla:
Is the mouse click mighty enough to bring society to its knees? 322-336 - Denis Trèek:
An integral framework for information systems security management. 337-360
Volume 22, Number 5, July 2003
- E. Eugene Schultz:
Pandora's Box: spyware, adware, autoexecution, and NGSCB. 366-367 - E. Eugene Schultz:
Security Views. 368-377 - Stephen Hinde:
Privacy legislation: a comparison of the US and European approaches. 378-387 - Hank Wolfe:
Encountering encryption. 388-391 - Eve Edelson:
The 419 scam: information warfare on the spam front and a proposal for local filtering. 392-401 - Fred Cohen, Deanna Koike:
Leading attackers through attack graphs with deceptions. 402-411 - Scott A. Vanstone:
Next generation security for wireless: elliptic curve cryptography. 412-415 - Andrew Harding:
SSL Virtual Private Networks. 416-420 - Martin Botha, Rossouw von Solms:
Utilising fuzzy logic and trend analysis for effective intrusion detection. 423-434 - Gonzalo Álvarez, Slobodan Petrovic:
A new taxonomy of Web attacks suitable for efficient encoding. 435-449 - Sheng Zhong, Tianwen Lin:
A comment on the Chen-Chung scheme for hierarchical access control. 450-452 - Chien-Lung Hsu, Tzong-Sun Wu:
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy. 453-456
Volume 22, Number 6, September 2003
- From the editor-in-chief: Gartner's prediction concerning intrusion detection systems: sense or nonsense? 462-463
- E. Eugene Schultz:
Security views: Online piracy battle heats up in US. 464-473 - Stephen Hinde:
Spam: the evolution of a nuisance. 474-478 - Presenting the Evidence Report: Introduction. 479-481
- John Leach:
Security engineering and security RoI. 482-486 - Robert S. Coles, Rolf Moulton:
Operationalizing IT Risk Management. 487-493 - Andrew Blyth, Daniel Cunliffe, Iain Sutherland:
Security analysis of XML usage and XML parsing. 494-505 - Christopher Kelly, Chris Nelms:
Roadmap to checking data migration. 506-510 - Elisa Bertino:
RBAC models - concepts and trends. 511-514 - Brian McKenna:
Web services set to provoke new sthreats: Preview of Compsec 2003, 30 Oct-1 Nov, Queen Elizabeth II Conference Centre, Westminster, London, UK. 515-516 - Hung-Yu Chien, Jinn-ke Jan:
New hierarchical assignment without Public Key cryptography. 523-526 - Tzer-Shyong Chen, Yu-Fang Chung, Gwo-Shiuan Huang:
Efficient proxy multisignature schemes based on the elliptic curve cryptosystem. 527-534 - Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun:
Security middleware for enhancing interoperability of Public Key Infrastructure. 535-546 - Shyi-Tsong Wu, Bin-Chang Chieu:
A user friendly remote authentication scheme with smart cards. 547-550
Volume 22, Number 7, October 2003
- E. Eugene Schultz:
Patching Pandemonium. 556-558 - Security Views. 559-569
- Stephen Hinde:
Nimbyism, dominoes and creaking infrastructure. 570-576 - Hank Wolfe:
Forensic evidence testimony - some thoughts. 577-579 - Rolf Moulton, Robert S. Coles:
Applying information security governance. 580-584 - Nicolas Sklavos, Odysseas G. Koufopavlou:
Data dependent rotations, a trustworthy approach for future encryption systems/ciphers: low cost and high performance. 585-588 - Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang:
Security enhancement for the timestamp-based password authentication scheme using smart cards. 591-595 - Sang Hyun Oh, Won Suk Lee:
An anomaly intrusion detection method by clustering normal user behavior. 596-612 - Sang-Jun Han, Sung-Bae Cho:
Detecting intrusion with rule-based integration of multiple models. 613-623 - Harold W. Thimbleby:
The reduced Enigma. 624-642 - Bin Wang, Jian-Hua Li, Zhi-Peng Tong:
Cryptanalysis of an enhanced timestamp-based password authentication scheme. 643-645
Volume 22, Number 8, December 2003
- E. Eugene Schultz:
Information security and the media. 652-653 - E. Eugene Schultz:
Security views. 654-663 - Stephen Hinde:
Computer security: Mapping the future. 664-669 - Hank Wolfe:
Setting up an electronic evidence forensics laboratory. 670-672 - Jay G. Heiser:
Beyond cryptography: Bruce Schneier's Beyond Fear: thinking sensibly about security in an uncertain world. 673-674 - J. Johnston, Jan H. P. Eloff, Les Labuschagne:
Security and human computer interfaces. 675-684 - John Leach:
Improving user security behaviour. 685-692 - Aykut Güven, Ibrahim Sogukpinar:
Understanding users' keystroke patterns for computer access security. 695-706 - John Reinke, Hossein Saiedian:
The availability of source code in relation to timely response to security vulnerabilities. 707-724 - Kefei Chen, Sheng Zhong:
Attacks on the (enhanced) Yang-Shieh authentication. 725-727 - Chin-Chen Chang, Ya-Fen Chang:
Efficient anonymous auction protocols with freewheeling bids. 728-734
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.