


default search action
Computers & Security, Volume 19
Volume 19, Number 1, 1 January 2000
- Bill Hancock:

Mass Network Flooding Attacks (Distributed Denial of Service - DDoS) Surface in the Wild. Comput. Secur. 19(1): 6-7 (2000) - Bill Hancock:

Cell Phone Crypto Cracked. Comput. Secur. 19(1): 7-8 (2000) - Bill Hancock:

Clinton's Proposed Crypto Regulations Under Attack. Comput. Secur. 19(1): 8-9 (2000) - Bill Hancock:

Overhauling the National Security Agency? Comput. Secur. 19(1): 9-10 (2000) - Bill Hancock:

Down Under, Hacking Private Computers by the Government is Legal. Comput. Secur. 19(1): 10-12 (2000) - Bill Hancock:

The "S" in SAP Doesn't Stand for Security. Comput. Secur. 19(1): 12-13 (2000) - Bill Hancock:

New York Times Fires Employees for Violating Internal E-mail Policies. Comput. Secur. 19(1): 12 (2000) - Bill Hancock:

'Anonymizing' Software Causes Law Enforcement Concerns. Comput. Secur. 19(1): 13-14 (2000) - Bill Hancock:

Melissa Virus Creator Pleads Guilty. Comput. Secur. 19(1): 13 (2000) - Bill Hancock:

Security Problems Go Mobile In Your Next Car. Comput. Secur. 19(1): 14-16 (2000) - Bill Hancock:

The L0pht Goes Corporate and becomes @Stake. Comput. Secur. 19(1): 16-17 (2000) - Chuck Williams, Nevenko Zunic, Stephen M. Matyas, Sarbari Gupta, Michael Willett:

Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction. 18-20 - Michael Smith, Paul C. van Oorschot, Michael Willett:

Cryptographic Information Recovery Using Key Recover. 21-27 - Michael Willett:

Features, Attributes, Characteristics, and Traits (FACTs) of Key Recovery Schemes/Products. 28-30 - John Kennedy, Stephen M. Matyas, Nevenko Zunic:

Key Recovery Functional Model. 31-36 - Stephen M. Matyas, Nevenko Zunic:

Additional Key Recovery Function. 37-40 - Sarbari Gupta:

A Common Key Recovery Block Format: Promoting Interoperability Between Dissimilar Key Recovery Mechanisms. 41-47 - Chuck Williams, Nevenko Zunic:

Global Interoperability for Key Recovery. 48-55 - Sarbari Gupta, Stephen M. Matyas:

Public Key Infrastructure: Analysis of Existing and Needed Protocols and Object Formats for Key Recovery. 56-68 - Abby Maclean, Stephen M. Matyas, Nevenko Zunic:

Organization Implementation Guidelines for Recovery of Encrypted Information. 69-81 - Nevenko Zunic:

Organization Considerations for Retrieval of Stored Data via Key Recovery Methods. 82-85 - Tom Markham, Chuck Williams:

Key Recovery Header for IPSEC. 86-90 - David M. Balenson

, Tom Markham:
ISAKMP Key Recovery Extension. 91-99 - Timothy G. Shoriak:

SSL/TLS Protocol Enablement for Key Recovery. 100-104
Volume 19, Number 2, February 2000
- Bill Hancock:

Alliance Formed to Fight Internet Attacks. Comput. Secur. 19(2): 108-109 (2000) - Bill Hancock:

Security Views. 108 - Bill Hancock:

Code Paranoia about FBI Offerings to Detect DoS Infiltration. Comput. Secur. 19(2): 109-110 (2000) - Bill Hancock:

CIA says Russia and China are Building CyberSpy Organization. Comput. Secur. 19(2): 110-111 (2000) - Bill Hancock:

The SEC Hires CyberInvestigators to Search for Fraud. Comput. Secur. 19(2): 111 (2000) - Bill Hancock:

FBI Investigating Copycat Operations in Wake of February, 2000, DDoS Attacks. Comput. Secur. 19(2): 111-113 (2000) - Bill Hancock:

Industry Teaming on ISACs. Comput. Secur. 19(2): 113 (2000) - Bill Hancock:

In Wake of Attacks, FBI Using Racketeering Laws for Prosecution. Comput. Secur. 19(2): 113-114 (2000) - Bill Hancock:

Mafiaboy Hacker Eyed In Attacks. Comput. Secur. 19(2): 114-115 (2000) - Bill Hancock:

Japan Web Hackers Use Chinese and US Servers. Comput. Secur. 19(2): 115 (2000) - Bill Hancock:

US Pentagon Defense Messaging System Shows Deficiencies in Security. Comput. Secur. 19(2): 116-117 (2000) - Bill Hancock:

Y2Hack Get-Together in Israel Under Political Attack. Comput. Secur. 19(2): 116 (2000) - Bill Hancock:

Security Managers Cite Need for Real-Time Security. Comput. Secur. 19(2): 117 (2000) - Stephen Hinde:

New Millennium, Old Failures. 119-127 - Steve Webb:

Crimes And Misdemeanours: How to Protect Corporate Information in the Internet Age. 128-132 - Gerald L. Kovacich, William C. Boni:

Internet Targets. 133-140 - Michael Collins:

Telecommunications Crime - Part 3. 141-148 - Mark Hoogenboom, Patrick Steemers:

Security For Remote Access And Mobile Application. 149-163 - Lynette Barnard, Rossouw von Solms:

A Formalized Approach to the Effective Selection and Evaluation of Information Security Control. 185-194
Volume 19, Number 3, 1 March 2000
- Bill Hancock:

Security Views. 202-203 - Bill Hancock:

Network Warfare On The Rise. Comput. Secur. 19(3): 203-204 (2000) - Bill Hancock:

FBI Source Convicted of Hackin. Comput. Secur. 19(3): 204-205 (2000) - Bill Hancock:

Microsoft "Whistler" Release Posted to Internet. Comput. Secur. 19(3): 205-206 (2000) - Bill Hancock:

US Senate Passes Bill to Tighten Up Government Network. Comput. Secur. 19(3): 206-207 (2000) - Bill Hancock:

Cyberpatrol Reverse Engineering: Round 2. Comput. Secur. 19(3): 207 (2000) - Bill Hancock:

First Cybercrime Task Force City - Pittsburgh. Comput. Secur. 19(3): 208 (2000) - Bill Hancock:

US Army Warns of Cyberattackers Gaining Access to Military Weapons Systems. Comput. Secur. 19(3): 208 (2000) - Bill Hancock:

More on the January, 2000, NSA Computer Problems. Comput. Secur. 19(3): 209-211 (2000) - Bill Hancock:

Mexico's President Under Cyberattack - Again. Comput. Secur. 19(3): 211 (2000) - Bill Hancock:

Another Insider Job on Wall Stree. Comput. Secur. 19(3): 211-212 (2000) - Bill Hancock:

FBI Identifies Hacker Who Stole More than 485 000 Credit Card Numbers. Comput. Secur. 19(3): 212 (2000) - Bill Hancock:

USDOJ Goes Prime Time With Cybercrime Web Sit. Comput. Secur. 19(3): 212-213 (2000) - Bill Hancock:

EU and US Reach Agreement on Privacy Issues. Comput. Secur. 19(3): 213-214 (2000) - Bill Hancock:

Warning from the US Government: Companies Get Secure or... Comput. Secur. 19(3): 214-215 (2000) - Bill Hancock:

China Relaxes Encryption Rules. Comput. Secur. 19(3): 215 (2000) - Bill Hancock:

French Card Forgery Note Could Work. Comput. Secur. 19(3): 216 (2000) - Bill Hancock:

US Law Enforcement Needs You! Comput. Secur. 19(3): 216-217 (2000) - Bill Hancock:

UK Law Enforcement Bemoans Criminal Activities on Interne. Comput. Secur. 19(3): 217-218 (2000) - Bill Hancock:

Intel Creates New Plans for Notebook Security. Comput. Secur. 19(3): 218 (2000) - Bill Hancock:

Kevin Mitnick Gets His Day in Congres. Comput. Secur. 19(3): 218-219 (2000) - Bill Hancock:

Web Site Owners Seek Security People Apply Now! Comput. Secur. 19(3): 219-220 (2000) - Bill Hancock:

Generation X Hackers? Comput. Secur. 19(3): 220-221 (2000) - Stephen Hinde:

Life Was Simple Then. 222-229 - Richard Barber:

Implementing Public Key Infrastructures in a Dynamic Business Environment. 230-233 - Thomas Finne:

Information Systems Risk Management: Key Concepts and Business Processes. 234-242 - Mariki M. Eloff

, Sebastiaan H. von Solms:
Information Security Management: A Hierarchical Framework for Various Approaches. 243-256 - Spyros Kokolakis, Evangelos A. Kiountouzis:

Achieving Interoperability in a Multiple-Security- Policies Environment. 267-281 - Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic:

Generation of RSA Keys That Are Guaranteed to be Unique for Each User. 282-288
Volume 19, Number 4, 1 April 2000
- Bill Hancock:

Suspected Hackers Arrested in Russian Credit-Card Fraud. 296 - Bill Hancock:

Intel Eliminates ID from New Chips. 296-297 - Bill Hancock:

European Parliament Doesn't Like Anonymity Online. 297 - Bill Hancock:

DOD Finds Plans Online Reserve Unit Assesses Risk. 297-298 - Bill Hancock:

Agencies Are "Own Worst Enemy". 298 - Bill Hancock:

US Department of Energy Security Criticized - Again. 298-300 - Bill Hancock:

This is What Happens When You Lose Your Computer With Classified Data On It.... 300-301 - Bill Hancock:

Not Everyone Wants PKI NSF Opts for Digital Signature Alternativ. 301-302 - Bill Hancock:

Justice Department Conducting Criminal Probe in Former CIA Director Activities. 302-303 - Bill Hancock:

Apache Site Defaced. 303-305 - Bill Hancock:

US and Europe Cybercrime Agreement Problems. 306-307 - Bill Hancock:

Cyberstalking on the Rise. 307-308 - Bill Hancock:

Large Child Pornography Ring Busted in Texas. 308-309 - Bill Hancock:

New Denial of Service Attack on Internet. 309-310 - Bill Hancock:

US Supreme Court Confirms ISPs Not Liable in E-mail Messages. 310 - Bill Hancock:

Software Scam - 17 Indicted. 310-311 - Stephen Hinde:

Smurfing, Swamping, Spamming, Spoofing, Squatting, Slandering, Surfing, Scamming and Other Mischiefs of the World Wide Web. 312-320 - Richard Barber:

Security in a Mobile World Is Bluetooth the Answer? 321-325 - Gerald L. Kovacich:

Netspionage The Global Threat to Information, Part I: What is it and Why I Should Care? 326-336 - Julie D. Nosworthy:

Implementing Information Security In The 21st Century Do You Have the Balancing Factors? 337-347 - Petra van Krugten, Mark Hoogenboom:

B2C Security Be Just Secure Enough. 348-356 - Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic:

Multiparty Biometric-Based Authentication. 369-374
Volume 19, Number 5, 1 July 2000
- Bill Hancock:

Security Views. 382-383 - Bill Hancock:

"I Agree" Legal Agreements Get Legislated. 383-384 - Bill Hancock:

The US Government Tells Its Users to Clean Up Their E-mail. 385-387 - Bill Hancock:

Home PC's Targeted by Hackers (Duh!). 387-388 - Bill Hancock:

CIO's Get Serious About Best Security Practices. 388 - Bill Hancock:

Yahoo Faces Identity Crisis. 389 - Bill Hancock:

Microsoft a Popular Virus Target Due to Ubiquity. 389-391 - Bill Hancock:

UK's RIP Bill Creates Official Snooping. 391-392 - Bill Hancock:

Extortion Going Online. 392-393 - Bill Hancock:

Office 2000 Patch Recommended by CERT. 393 - Bill Hancock:

Self-Regulation for Privacy Doesn't Work Says FTC. 393-394 - Bill Hancock:

...But the Industry Wants Self-Regulation. 394-395 - Bill Hancock:

US Senate Wakes Up to Need for Cybertools for Law Enforcers. 395-396 - Bill Hancock:

PGP V5.0 Keys Potentially Insecure. 396-397 - Bill Hancock:

Canadian Credit Card Conundrum Caused by a Cracker. 397-398 - Bill Hancock:

Suspect Charged in 'Love Bug' Worm has Charges Dropped. 398 - Bill Hancock:

Network Solutions Re-evaluates Security. 398-400 - Bill Hancock:

CMU Sets Up a Sister to CERT. 400-401 - Bill Hancock:

Speedy Response Yields Success at DOE. 401 - Bill Hancock:

AOL Gets Busted - Again. 402 - Bill Hancock:

Who's to Blame? 402-403 - Bill Hancock:

Wireless Ubiquity for E-Biz. 403 - Bill Hancock:

And Now, the Bug-in-Your-Site Award Goes To.... 404 - Bill Hancock:

Isn't It Interesting What You Can Buy At An Auction Site? TV's, Computers, Drugs. 404-405 - Bill Hancock:

G8 Thinks About Cybercrime (It's About Time, Too). 405-407 - Stephen Hinde:

Love Conquers All? 408-420 - Gerald L. Kovacich:

Netspionage The Global Threat to Information, Part II: Information Collection in the Gray Zon. 421-427 - Stephen M. Matyas, Jeff Stapleto:

A Biometric Standard for Information Management and Security. 428-441 - Yu-Lun Huang, Shiuh-Pyng Shieh, Fu-Shen Ho:

A Generic Electronic Payment Model Supporting Multiple Merchant Transactions. 453-465 - Mohammad Peyravian, Nevenko Zunic:

Methods for Protecting Password Transmission. 466-469
Volume 19, Number 6, August 2000
- Bill Hancock:

A Need for a Network Security Czar. 476-477 - Bill Hancock:

US Government Fighting for Expanded Wiretap Laws. 477 - Bill Hancock:

E-Commerce Paranoia: Flaws in Code. 477-479 - Bill Hancock:

Truly Certified: Security Certifications Updat. 479-480 - Bill Hancock:

Digital Certificates Get Creative. 480-487 - Bill Hancock:

Health Care Security: A Hard Look at a Growing Problem. 482 - Bill Hancock:

Safeway UK's Website Shut Down. 483 - Bill Hancock:

Philippine Government Creates Incident Response Team. 483 - Bill Hancock:

DDoS Defence Gets Regulatory. 483-485 - Bill Hancock:

Visa's Ten Commandments for E-Security Online. 485-486 - Bill Hancock:

'Porngate'? 486-487 - Bill Hancock:

What You Sell Online in France Could Be Restricted.... 487 - Bill Hancock:

Hackers Still Love to Attack the Pentago. 488 - Bill Hancock:

Spying At Home: A New Pastime to Detect Online Romanc. 488-491 - Bill Hancock:

Is a Convicted Hacker Really Reformed and Should You Hire Them? 491-493 - Bill Hancock:

DefCon Recruiting JamFest. 493-494 - Bill Hancock:

Hacker Target: Mobile Phones. 494-495 - Bill Hancock:

E-Mail Privacy Issues Escalate. 495 - Bill Hancock:

GeoCities Ordered to Report on Information Poste. 495-496 - Bill Hancock:

Hackers Breach Firewall. 496-497 - Bill Hancock:

Lotus Domino Holes Up. 497-498 - Stephen Hinde:

Fireworks, Beer and Old Halfpennies - The Risks of Assumption. 499-504 - Gerald L. Kovacich:

Netspionage - Part III: The Black Zone, Who Uses Netspionage, How and Why. 505-519 - Fred Cohen:

A Mathematical Structure of Simple Defensive Network Deception. 520-528 - Steven Furnell, Paul Dowland

, H. M. Illingworth, Paul L. Reynolds:
Authentication and Supervision: A Survey of User Attitudes. 529-539 - Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic:

Ticket and Challenge-Based Protocols for Timestamping. 551-558 - Andres Torrubia, Francisco J. Mora:

Information Security in Multiprocessor Systems Based on the X86 Architecture. 559-563
Volume 19, Number 7, 1 November 2000
- Bill Hancock:

New Classes of Unix/Linux Attacks. 570-571 - Bill Hancock:

American Express Creates Disposable Credit Card Number. 571-572 - Bill Hancock:

Microsoft Releases New IIS Security Tool. 572 - Bill Hancock:

Baltimore Releases Security Developer Freeware. 572-573 - Bill Hancock:

'Files Streams' Virus Infects in an Old and New Way. 573-574 - Bill Hancock:

Trinity v3, a DDoS Tool, Hits the Streets. 574 - Bill Hancock:

Hacker Insurance Now Part of the Business Risk Management Kit. 574-575 - Bill Hancock:

Wireless Crazed? No Security For You! 575-577 - Bill Hancock:

White House Supporting Open Source Code. 577-578 - Bill Hancock:

White House Security Summit Builds Towards a B2B Security Standard. 578-579 - Bill Hancock:

Cellular Security Hazards. 579 - Bill Hancock:

UK Fuel Taxes Protestor Accused of Mass Hacking. 580 - Bill Hancock:

US Government Board Setting Up Security Metrics. 580 - Bill Hancock:

Privacy Group Wants 'Web Bugs' Disclosures. 581 - Bill Hancock:

Site Spoofing Becomes More Popular. 581-583 - Bill Hancock:

First PDA Virus Hits the Airwaves. 583-584 - Stephen Hinde:

Do You Know Your Organization's Achilles Heel? 585-590 - August Bequai:

Romancing The Internet And Management's Quagmire. 591-595 - Julie D. Nosworthy:

A Practical Risk Analysis Approach: Managing BCM Risk. 596-614 - Basie von Solms:

Information Security - The Third Wave? 615-620 - Rachael Pond

, John Podd, Julie Bunnell, Ron Henderson:
Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates. 645-656
Volume 19, Number 8, 1 December 2000
- Bill Hancock:

From Stones in the Street to Cyberspace - Israeli and Palestinians Continue Their Virtual Battles 24 x 7. 664-665 - Bill Hancock:

Feeling Sorry for Microsoft? 665-666 - Bill Hancock:

However, Microsoft Could Use Some Sympathy - Dutch Hacker Busts Microsoft Web Site - Again. 666-667 - Bill Hancock:

Wireless Big Brother. 667-668 - Bill Hancock:

NASA Hacker Pleads Guilty. 668-669 - Bill Hancock:

Canadian Teen Mafiaboy Pleads Guilty. 669 - Bill Hancock:

Getting the Laws to Help Combat Cybercrime (There's a grand idea). 669-670 - Bill Hancock:

Internet Biz Group Calls for Cybercrime Treaty Delay. 671 - Bill Hancock:

Laptop Theft Now Targeted Towards Data and Not Necessarily Hardware. 671-673 - Bill Hancock:

Hacktivism Increasing. 673-674 - Bill Hancock:

US Department of Defense Prepares Cybercrime Database. 674 - Bill Hancock:

CIA Chat Room Causes Grief. 674-676 - Bill Hancock:

Japan Creates Cyberconditions for IT National Revolution. 676-677 - Bill Hancock:

US Privacy Law Proposals Cause Concerns. 677-678 - Stephen Hinde:

New Names For Old - A Personal Surf Through Compsec 200. 679-687 - August Bequai:

America's Internet Commerce and The Threat of Fraud. 688-691 - Andy Clarke, Vince Gallo:

The Software Colander Holes in Messagin. 692-697 - Mariki M. Eloff

, Sebastiaan H. von Solms:
Information Security Management: An Approach to Combine Process Certification And Product Evaluation. 698-709 - John Sherwood:

Opening Up The Enterprise. 710-719 - Stefanos Gritzalis

, Sokratis K. Katsikas, Dimitrios Lekkas, Konstantinos Moulinos, Eleni Polydoro:
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture. 731-746

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














