


default search action
Computers & Security, Volume 18
Volume 18, Number 1, 1999
- Bill Hancock:

From the editor. 2-3 - Bill Hancock:

Elliptical curve cryptography and standards for efficient cryptography group. 4-15 - August Bequai:

Cyber-crime the US experience. 16-18 - Stephen Hinde:

One down, one to go. 19-22 - Chris Pounder:

An initial plan of action for compliance with the UK's Data Protection Act 1998. 23-27 - Steven Furnell, Matthew J. Warren

:
Computer hacking and cyber terrorism: the real threats in the new millennium? 28-34 - Mario Devargas:

Survival is not compulsory: an introduction to business continuity planning. 35-46 - William J. Caelli, Ed Dawson

, Scott A. Rea:
PKI, elliptic curve cryptography, and digital signatures. 47-66 - Bart Preneel:

State-of-the-art ciphers for commercial applications. 67-74
Volume 18, Number 2, 1999
- Bill Hancock:

From the editor. 88-89 - Richard Ford:

Malware: Troy revisited. 105-108 - August Bequai:

Monitoring employee communications in cyberspace: The pitfalls facing management. 109-112 - Stephen Hinde:

Year 2000 update. 113-119 - Sarah Gordon:

Telephone tales. 120-123 - Winn Schwartau:

Surviving denial of service. 124-133 - Mohammad Peyravian, Don Coppersmith:

A structured symmetric-key block cipher. 134-147 - Brendon Harris, Ray Hunt:

Fairwall certification. 165-177
Volume 18, Number 3, 1999
- Bill Hancock:

From the editor. 182-183 - Stephen Hinde:

Are you in control? 199-203 - E. Eugene Schultz:

Windows NT security: Kudos, concerns, and prescriptions. 204-210 - Gerald L. Kovacich:

I-way robbery: Crime on the internet. 211-220 - John Hughes:

Certificate inter-operability - white paper. 221-230 - Vesselin Bontchev:

The problems of wordmacro virus upconversion. 241-255 - Sebastiaan H. von Solms, J. H. S. Geldenhuys:

Managing multi level security in a military intranet environment. 257-270
Volume 18, Number 4, 1999
- Bill Hancock:

From the editor. 276-277 - Stephen Hinde:

E for exponential growth. 295-299 - Richard Ford:

No suprises in Melissa Land. 300-302 - August Bequai:

Employers and the internet: Legal woes and concerns. 303-306 - Chris Pounder:

The revised version of BS7799 - so what's new? 307-311 - Garry Bulmer:

Encryption - Do or die for UK business. 312-316 - Pauline Ratnasingham:

Implicit trust in the risk assessment process of EDI. 317-321 - Keith Buzzard:

Computer security - What should you spend your money on? 322-334 - Mohammad Peyravian, Allen Roginsky, Nevenko Zunic:

Hash-based encryption system. 345-350 - Winfried E. Kühnhauser:

Policy Groups. 351-363
Volume 18, Number 5, 1999
- Bill Hancock:

From the editor. 370-371 - Paul Docherty, Peter Simpson:

Macro attacks: What next after Melissa? 391-395 - Stephen Hinde:

E-mail can seriously damage your health. 396-406 - Chris Nelms:

Internet E-mail risks and concerns. 409-418 - Nick Hawkins:

Security within multimedia networked conferencing. 419-422 - Thierry Moreau:

The emergence of a legal framework for electronic transactions. 423-428 - Neil Jarvis:

E-commerce and encryption: Barriers to growth. 429-431 - R. A. King, T. C. Phipps:

Shannon, TESPAR and approximation strategies. 445-453
Volume 18, Number 6, 1999
- Bill Hancock:

From the editor. 456-457 - David Robb:

Developing firewall technology: Hardwall - White paper. 471-478 - Fred Cohen:

Simulating cyber attacks, defences, and consequences. 479-518 - Massimo Bernaschi, Elisabetta d'Aiutolo, P. Rughetti:

Enforcing network security: a real cease study in a research organization. 533-543
Volume 18, Number 7, 1999
- Bill Hancock:

From the editor. 550-552 - Bill Hancock:

Security views. 553-564 - Stephen Hinde:

The bell tolls for the bell-shaped curve: or how hot magnets, species distribution and things that go bump in the air will change our view of risk. 565-572 - Gerald L. Kovacich:

Hackers: Freedom fighters of the 21st Century. 573-576 - Michael Collins:

Telecommunications crime - Part 1. 577-586 - Pauline Ratnasingham:

Risks in low trust among trading partners in electronic commerce. 587-592 - Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic:

Generating user-based cryptographic keys and random numbers. 619-626 - Diomidis Spinellis, Stefanos Gritzalis

, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas:
Trusted third party services for deploying secure telemedical applications over the WWW. 627-639
Volume 18, Number 8, 1999
- Stephen Hinde:

Step into a secure new world - Compsec '99 report. 660-669 - Kevin Richards:

Network based intrusion detection: A review of technologies. 671-682 - Michael Collins:

Telecommunications crime - Part 2. 683-692 - Julie D. Nosworthy:

Y2K contingency planning: Taking BCM into the 21st century. 693-704 - Paul Dowland

, Steven Furnell
, H. M. Illingworth, Paul L. Reynolds:
Computer crime and abuse: A survey of public attitudes and awareness. 715-726 - Wen-Her Yang, Shiuh-Pyng Shieh:

Password authentication schemes with smart cards. 727-733

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














