


default search action
Computers & Security, Volume 22
Volume 22, Number 1, January 2003
- E. Eugene Schultz:

Security views. 4-13 - Stephen Hinde:

Time cost$ money. 14-21 - Fred Piper:

Reseacrh in cryptography and security mechanisms. 22-25 - Henry B. Wolfe:

Computer forensics. 26-28 - Jon David:

Security in a Flash. 29-33 - Chris Pounder:

A tangled Web of libel lies? 34-37 - Brian McKenn:

UK police promise charter to guard good names. 38-40 - Mark Fisher:

LIRVA virus. 41-42 - Sung-Bae Cho, Hyuk-Jang Park:

Efficient anomaly detection by modeling privilege flows using hidden Markov model. 45-55 - Danilo Bruschi, A. Curti, Emilia Rosti:

A quantitative study of Public Key Infrastructures. 56-67 - Chun-Li Lin, Tzonelih Hwang:

A password authentication scheme with secure password updating. 68-72
Volume 22, Number 2, February 2003
- E. Eugene Schultz:

Internet security: what's in the future? 78-79 - E. Eugene Schultz:

Security Views. 80-89 - Stephen Hinde:

The law, cybercrime, risk assessment and cyber protection. 90-95 - Henry B. Wolfe:

The circumstances of seizure. 96-98 - Ken Doughty:

Implementing enterprise security: a case study. 99-114 - Chris Pounder:

Security with unfortunate side effect. 115-118 - D. K. Matai:

The economic impact of war with Iraq asymmetric risks. 119-123 - August Bequai:

Safeguards for IT managers and staff under the Sarbanes-Oxley Act. 124-127 - Hassan Aljifri, Marcel Smets, Alexander Perez-Pons

:
IP Traceback using header compression. 136-151 - Jesper M. Johansson, E. Eugene Schultz:

Dealing with contextual vulnerabilities in code: distinguishing between solutions and pseudosolutions. 152-159 - Chin-Chen Chang, Yeu-Pong Lai:

A flexible date-attachment scheme on e-cash. 160-166
Volume 22, Number 3, April 2003
- From the editor-in-chief: Virus and worm trends. 174-175

- E. Eugene Schultz:

Security views. 176-187 - Stephen Hinde:

Cyber-terrorism in context. 188-192 - Hank Wolfe:

Evidence acquisition. 193-195 - Hassan Aljifri, Diego Sánchez Navarro:

International legal aspects of cryptography: Understanding cryptography. 196-203 - Rolf Moulton, Robert S. Coles:

A contest to evaluate IT security services management. 204-206 - Chris Pounder:

Governments act to improve security. 207-211 - Seny Kamara, Sonia Fahmy

, E. Eugene Schultz, Florian Kerschbaum, Michael Frantzen:
Analysis of vulnerabilities in Internet firewalls. 214-232 - Helen van de Haar, Rossouw von Solms:

A model for deriving information security control attribute profiles. 233-244 - Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang:

Generalization of proxy signature-based on discrete logarithms. 245-255 - Phillip J. Brooke, Richard F. Paige:

Fault trees for security system design and analysis. 256-264
Volume 22, Number 4, May 2003
- E. Eugene Schultz:

Why can't Microsoft stay out of the InfoSec headlines? 270-272 - E. Eugene Schultz:

Attackers hit Web hosting servers. 273-283 - Stephen Hinde:

Careless about privacy. 284-288 - Hank Wolfe:

Evidence analysis. 289-291 - Marcus K. Rogers

:
The role of criminal profiling in the computer forensics process. 292-298 - H. S. Venter

, Jan H. P. Eloff:
A taxonomy for information security technologies. 299-307 - James M. Anderson:

Why we need a new definition of information security. 308-313 - Mohammad Peyravian, Allen Roginsky, Nevenko Zunic:

Methods for preventing unauthorized software distribution. 316-321 - Neelam Bhalla:

Is the mouse click mighty enough to bring society to its knees? 322-336 - Denis Trèek:

An integral framework for information systems security management. 337-360
Volume 22, Number 5, July 2003
- E. Eugene Schultz:

Pandora's Box: spyware, adware, autoexecution, and NGSCB. 366-367 - E. Eugene Schultz:

Security Views. 368-377 - Stephen Hinde:

Privacy legislation: a comparison of the US and European approaches. 378-387 - Hank Wolfe:

Encountering encryption. 388-391 - Eve Edelson:

The 419 scam: information warfare on the spam front and a proposal for local filtering. 392-401 - Fred Cohen, Deanna Koike:

Leading attackers through attack graphs with deceptions. 402-411 - Scott A. Vanstone:

Next generation security for wireless: elliptic curve cryptography. 412-415 - Andrew Harding:

SSL Virtual Private Networks. 416-420 - Martin Botha, Rossouw von Solms:

Utilising fuzzy logic and trend analysis for effective intrusion detection. 423-434 - Gonzalo Álvarez

, Slobodan Petrovic:
A new taxonomy of Web attacks suitable for efficient encoding. 435-449 - Sheng Zhong, Tianwen Lin:

A comment on the Chen-Chung scheme for hierarchical access control. 450-452 - Chien-Lung Hsu, Tzong-Sun Wu:

Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy. 453-456
Volume 22, Number 6, September 2003
- From the editor-in-chief: Gartner's prediction concerning intrusion detection systems: sense or nonsense? 462-463

- E. Eugene Schultz:

Security views: Online piracy battle heats up in US. 464-473 - Stephen Hinde:

Spam: the evolution of a nuisance. 474-478 - Presenting the Evidence Report: Introduction. 479-481

- John Leach:

Security engineering and security RoI. 482-486 - Robert S. Coles, Rolf Moulton:

Operationalizing IT Risk Management. 487-493 - Andrew Blyth, Daniel Cunliffe

, Iain Sutherland
:
Security analysis of XML usage and XML parsing. 494-505 - Christopher Kelly

, Chris Nelms:
Roadmap to checking data migration. 506-510 - Elisa Bertino:

RBAC models - concepts and trends. 511-514 - Brian McKenna:

Web services set to provoke new sthreats: Preview of Compsec 2003, 30 Oct-1 Nov, Queen Elizabeth II Conference Centre, Westminster, London, UK. 515-516 - Hung-Yu Chien, Jinn-ke Jan:

New hierarchical assignment without Public Key cryptography. 523-526 - Tzer-Shyong Chen

, Yu-Fang Chung
, Gwo-Shiuan Huang:
Efficient proxy multisignature schemes based on the elliptic curve cryptosystem. 527-534 - Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun:

Security middleware for enhancing interoperability of Public Key Infrastructure. 535-546 - Shyi-Tsong Wu, Bin-Chang Chieu:

A user friendly remote authentication scheme with smart cards. 547-550
Volume 22, Number 7, October 2003
- E. Eugene Schultz:

Patching Pandemonium. 556-558 - Security Views. 559-569

- Stephen Hinde:

Nimbyism, dominoes and creaking infrastructure. 570-576 - Hank Wolfe:

Forensic evidence testimony - some thoughts. 577-579 - Rolf Moulton, Robert S. Coles:

Applying information security governance. 580-584 - Nicolas Sklavos

, Odysseas G. Koufopavlou:
Data dependent rotations, a trustworthy approach for future encryption systems/ciphers: low cost and high performance. 585-588 - Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang:

Security enhancement for the timestamp-based password authentication scheme using smart cards. 591-595 - Sang Hyun Oh, Won Suk Lee:

An anomaly intrusion detection method by clustering normal user behavior. 596-612 - Sang-Jun Han, Sung-Bae Cho:

Detecting intrusion with rule-based integration of multiple models. 613-623 - Harold W. Thimbleby

:
The reduced Enigma. 624-642 - Bin Wang, Jianhua Li, Zhi-Peng Tong:

Cryptanalysis of an enhanced timestamp-based password authentication scheme. 643-645
Volume 22, Number 8, December 2003
- E. Eugene Schultz:

Information security and the media. 652-653 - E. Eugene Schultz:

Security views. 654-663 - Stephen Hinde:

Computer security: Mapping the future. 664-669 - Hank Wolfe:

Setting up an electronic evidence forensics laboratory. 670-672 - Jay G. Heiser:

Beyond cryptography: Bruce Schneier's Beyond Fear: thinking sensibly about security in an uncertain world. 673-674 - J. Johnston, Jan H. P. Eloff, Les Labuschagne

:
Security and human computer interfaces. 675-684 - John Leach:

Improving user security behaviour. 685-692 - Aykut Güven, Ibrahim Sogukpinar

:
Understanding users' keystroke patterns for computer access security. 695-706 - John Reinke, Hossein Saiedian

:
The availability of source code in relation to timely response to security vulnerabilities. 707-724 - Kefei Chen, Sheng Zhong:

Attacks on the (enhanced) Yang-Shieh authentication. 725-727 - Chin-Chen Chang, Ya-Fen Chang:

Efficient anonymous auction protocols with freewheeling bids. 728-734

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














