


default search action
Computers & Security, Volume 17
Volume 17, Number 1, 1998
- Bill Hancock:

From the editor. 2-4 - Bill Hancock:

Security goes prime-time. 5-13 - Will Ozier:

GSSP preface/overview. 14-18 - August Bequai:

High-tech security and the failings of president clinton's commission on critical infrastructure protection. 19-21 - August Bequai:

Software pirating and management's quagmire. 22-26 - Chris Pounder:

Homeworking: No longer an easy option? 27-30 - Stephen Hinde:

Hot water, icebergs and other disasters. 31-33 - Keith Osborne:

Auditing the IT security function. 34-41 - Norman Crocker:

Key concerns in a review of CA-ACF2/MVS. 42-53 - Marius Nacht:

The spectrum of modern firewalls. 54-56 - Vesselin Bontchev:

Macro virus identification problems. 69-89
Volume 17, Number 2, 1998
- Bill Hancock:

From the Editor. 96-97 - Bill Hancock:

Who do you call for, CISSP. 99-109 - Richard Ford:

What a littledefinution can do. 110-114 - Stephen Hinde:

Cyber Wars and other threats. 115-118 - Oliver Lau:

The ten commandments of security. 119-123 - Chris Pounder:

Security and the new Data Protection law. 124-128 - Gerald L. Kovacich:

Electronic-internet business and security. 129-135 - Mark Moulton:

Reducing charges of E-comm harassment. 137-142 - Sharman Lichtenstein:

Internet risks for companies. 143-150 - Mohammad Peyravian, Allen Roginsky, Ajay D. Kshemkalyani

:
On probabilities of hash value matches. 171-176 - Ed Dawson

, Helen Gustafson:
A Method for Measuring Entropy of Symmetric Cipher Key Generators. 177-184
Volume 17, Number 3, 1998
- Bill Hancock:

From the editor. 190-191 - Bill Hancock:

Security Views. 192-200 - Nicky Maddison:

Y2000 enters the body politic. 201-206 - Stephen Hinde:

Recent security surveys. 207-210 - Fred Cohen, Cynthia A. Phillips, Laura Painton Swiler, Timothy Gaylor, Patricia Leary, Fran Rupley, Richard Isler:

A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID. 211-221 - Gert van der Merwe, Jan H. P. Eloff:

Software source code, visual risk analysis: an example. 233-252 - Tom Coffey, Thomas Newe

:
Realisation of a minimum-knowledge identification and signature scheme. 253-264 - Mike Matyas, Mohammad Peyravian, Allen Roginsky, Nevenko Zunic:

Reversible data mixing procedure for efficient public-key encryption. 265-272
Volume 17, Number 4, 1998
- Bill Hancock:

From the editor. 278-279 - Bill Hancock:

Security views. 280-292 - August Bequai:

Balancing legal concerns over crime and security in cyberspace. 293-298 - Stephen Hinde:

Contingency planning for the millenium. 299-302 - Thomas Finne:

A conceptual framework for information security management. 303-307 - Chris Pounder:

Further developments in the field of encryption and digital signatures. 308-312 - Pauline Ratnasingham:

EDI security: The influences of trust on EDI risks. 313-324 - Sebastiaan H. von Solms, J. H. S. Geldenhuys:

Collecting security baggage on the internet. 337-345 - Les Labuschagne

, Jan H. P. Eloff:
The use of real-time risk analysis to enable dynamic activation of countermeasures. 347-357
Volume 17, Number 5, 1998
- Bill Hancock:

From the editor. 368-369 - August Bequai:

Techno-crimes: Failings of the legal edifice. 381-384 - Stephen Hinde:

Solar radiation is bad for you. 385-388 - J. R. Benton:

Physical IT security. 389-391 - Chris Pounder:

European commission takes action to secure the internet. 392-396 - Thomas Finne:

The three categories of decision-making and information security. 397-405 - Martin Caminada

, Reind P. van de Riet, Arjen van Zanten, Leendert van Doorn:
Internet security incidents, a survey within Dutch organizations. 417-433 - Sebastiaan H. von Solms:

Electronic commerce with secure intelligent trade agents. 435-446 - Birgit Borcherding, Malte Borcherding:

Efficient and trustworthy key distribution in webs of trust. 447-454
Volume 17, Number 6, 1998
- Bill Hancock:

From the editor. 460-461 - Bill Hancock:

Security tradeshows - Good or bad? 462-474 - Stephen Hinde:

Privacy and security - The drivers for growth of E-Commerce. 475-478 - Chris Pounder:

The Annual Report of the UK Data Protection Registrar. 479-482 - Fred Cohen:

A note on the role of deception in information protection. 483-506 - Nada Kapidzic:

Creating security applications based on The Global Certificate Management System. 507-515 - H. J. Jerry Schumacher, Sumit Ghosh:

A Fundamental Framework for Network Security Towards Enabling Security on Demand in an ATM Network. 527-542 - Chu-Hsing Lin, Tien-Chi Lee:

A confused document encrypting scheme and its implementation. 543-551
Volume 17, Number 7, 1998
- Bill Hancock:

From the editor. 562-563 - Bill Hancock:

Windows-98, RIP and my Adrenaline Rush. 564-574 - Richard Ford:

May you live in interesting times. 575-578 - August Bequai:

A guide to cyber-crime investigations. 579-582 - Stephen Hinde:

Corporate governance and disasters. 583-585 - Sarah Gordon:

Breaking the chain. 586-588 - Gerald Post, Albert Kagan:

The use and effectiveness of anti-virus software. 589-599 - Gerald L. Kovacich:

Establishing an Information Systems Security Organization (ISSO). 600-612 - J. Schwemmlein, Karl C. Posch, Reinhard Posch:

RNS-modulo reduction upon a restricted base value set and its applicability to RSA cryptography. 637-650
Volume 17, Number 8, 1998
- Bill Hancock:

From the editor. 652-653 - Bill Hancock:

Security views. 654-666 - August Bequai:

Employee abuses in cyberspace: Management's legal quagmire. 667-670 - Stephen Hinde:

Time, history and war: A personal voyage through Compsec '98. 671-681 - H. S. Venter

, Jan H. P. Eloff:
Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools. 683-692 - Winn Schwartau:

Time-based security explained: Provable security models and formulas for the practitioner and vendor. 693-714 - Peng-Chor Leong, Wen-Jing Hsu, Peng-Chong Tan:

A geometric approach for shared secrets, a refinement. 725-732

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














