


default search action
Computers & Security, Volume 20
Volume 20, Number 1, 31 January 2001
- Bill Hancock:

Y2K & Security A Low Priority Year. 4-5 - Bill Hancock:

Voodoo is Alive and Well on Your Computer. 5-6 - Bill Hancock:

Hand-held Virii On The Way. 6-7 - Bill Hancock:

China Passes Law to Promote Internet Security Supposedly. 7 - Bill Hancock:

Smarter Marines. 7 - Bill Hancock:

E-tailers Batten Down the Hatches. 8 - Bill Hancock:

Information Warfare Highlighted as a Concern by US Government. 8-9 - Bill Hancock:

E-mail Spammers Jailed. 9-10 - Bill Hancock:

The Chief Security Officer's Top Ten List for 2001. 10-14 - Bill Hancock:

'Safe Harbor' Provision Adopters Few and Far Between. 14-15 - Bill Hancock:

The Wireless Great Divide But Getting Smaller. 15-17 - Bill Hancock:

It's a Privacy Thing in 2001. 17-18 - Bill Hancock:

Fighting SPAM in Europe. 18-19 - Bill Hancock:

Privacy Advocates Grow in Europe. 19-20 - Stephen Hinde:

2001: A Privacy Odyssey. 21-27 - August Bequai:

Software Concerns And The Internet. 28-30 - Iain Franklin:

Protecting The Web Server And Applications. 31-35 - Robert Graham:

NIDS Pattern Search vs. Protocol Decode. 37-41 - Andrew Rathmell:

Protecting Critical Information Infrastructures. 43-52 - Steven Philippsohn:

Trends In Cybercrime An Overview Of Current Financial Crimes On The Internet. 53-69 - Jovan Dj. Golic:

How to Construct Cryptographic Primitives from Stream Ciphers. 79-89
Volume 20, Number 2, 1 April 2001
- Bill Hancock:

A Practical Risk. 98-126 - Stephen Hinde:

The Search For Privacy. 127-131 - Richard Barber:

The Evolution of Intrusion Detection Systems The Next Step. 132-145 - Adrian Wright:

Controlling Risks of E-commerce Content. 147-154 - Gurpreet Dhillon

:
Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns. 165-172 - Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic:

Alternative Method for Unique RSA Primes Generation. 173-179
Volume 20, Number 3, 1 May 2001
- Bill Hancock:

Security Views. 188-201 - Stephen Hinde:

The Times They Are A-Changin'. 202-206 - Gerald L. Kovacich:

Protecting 21st Century Information It's Time for a Change. 207-213 - Basie von Solms:

Corporate Governance and Information Security. 215-218 - Ivan Horrocks

:
Security Training: Education For an Emerging Profession? 219-226 - Bob Carter:

Securing Your Brand In Cyberspace. 227-238 - Michael Frantzen, Florian Kerschbaum, E. Eugene Schultz, Sonia Fahmy

:
A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals. 263-270
Volume 20, Number 4, July 2001
- Bill Hancock:

Security Views. 278-294 - Stephen Hinde:

The Weakest Link. 295-301 - Gerald L. Kovacich:

The Corporate Information Assurance Officer (CIAO). 302-307 - Basie von Solms, Rossouw von Solms:

Incremental Information Security Certification. 308-310 - Chris Pounder:

Cyber crime: the backdrop to the Council of Europe Convention. 311-315 - Denis Zenkin:

Fighting Against the Invisible Enemy - Methods for detecting an unknown virus. 316-321
Volume 20, Number 5, 1 July 2001
- Bill Hancock:

Security Views. 348-363 - Stephen Hinde:

Cyberthreats: Perceptions, Reality and Protection. 364-371 - August Bequai:

Proprietary Data: Eldorado in Cyber-Space. 372-373 - Richard Barber:

Security in a Mobile World - is Bluetooth the Answer? 374-379 - Chris Pounder:

The Council of Europe Cyber-Crime Convention. 380-383 - Colette M. Trompeter, Jan H. P. Eloff:

A Framework for the Implementation of Socio-ethical Controls in Information Security. 384-391 - Thomas W. Cusick:

Computer Licence Plates. 392-394 - Paul Evans:

Conference Report - the Global Forum for Law Enforcement and National Security, Edinburgh, 2001. 395-399
Volume 20, Number 6, September 2001
- Bill Hancock:

U.S. DoD Puts Up Blocks to Code Red. Comput. Secur. 20(6): 451-467 (2001) - Stephen Hinde:

Omnia te adversum spectantia, nulla retorsum*. 468-474 - August Bequai:

Organized Crime Goes Cyber. 475-478 - Steve Purser:

A Simple Graphical Tool For Modelling Trust. 479-484 - Steven Philippsohn:

Money Laundering on the Internet. 485-490 - Bruce Schneier:

Managed Security Monitoring: Network Security for the 21st Centur. 491-503 - Basie von Solms:

Information Security - A Multidimensional Discipline. 504-508 - Reinhardt A. Botha

, Jan H. P. Eloff:
Access Control in Document-centric Workflow Systems An Agent-based Approach. 525-532 - Wen-Hung Yeh, Jing-Jang Hwang:

Hiding Digital Information Using a Novel System Scheme. 533-538
Volume 20, Number 7, October 2001
- Bill Hancock:

Security View. 546-560 - Stephen Hinde:

Lessons Learned. 561-567 - Stephen Hinde:

Incalculable potential for damage by cyber-terrorism. 568-572 - Chris Pounder:

The European Union Proposal for a Policy Towards Network and Information Security. 573-576 - Mariana Gerber, Rossouw von Solms:

From Risk Analysis to Security Requirements. 577-584 - David W. Chadwick

, Andrew Basden
:
Evaluating Trust in a Public Key Certification Authority. 592-611 - Chu-Hsing Lin:

Hierarchical key assignment without public-key cryptography. 612-619 - E. Eugene Schultz, Robert W. Proctor, Mei-Ching Lien, Gavriel Salvendy:

Usability and Security An Appraisal of Usability Issues in Information Security Methods. 620-634
Volume 20, Number 8, 1 December 2001
- Bill Hancock:

Security Views. 643-656 - Stephen Hinde:

If you can meet with triumph and disaster and treat those two impostors just the same.... 657-666 - Charles Cresson Wood:

What Do The Recent Terrorist Attacks Mean For The American Information Security Profession? 667-670 - Denis Zenkin:

Guidelines for the Protecting the Corporate against Viruse. 671-675 - E. Biermann, E. Cloete, Lucas M. Venter

:
A comparison of Intrusion Detection systems. 676-683 - Joan L. Aron, Ronald A. Gove, Shiva Azadegan, M. Christina Schneider:

The Benefits of a Notification Process in Addressing the Worsening Computer Virus Problem: Results of a Survey and a Simulation Model. 693-714 - Gurpreet Dhillon

, Steve Moore:
Computer crimes: theorizing about the enemy within. 715-723 - Andres Torrubia, Francisco J. Mora, Luis Marti:

Cryptography Regulations for E-commerce and Digital Rights Management. 724-738

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














