


default search action
Information Security Technical Report, Volume 15
Volume 15, Number 1, February 2010
- Chez Ciechanowicz:

Protocols and cryptography. 1 - Chris Sundt:

Cryptography in the real world. 2-7 - Keith Mayes, Carlos Cid:

The MIFARE Classic story. 8-12 - Dimitrios Patsos, Chez Ciechanowicz, Fred Piper:

The status of National PKIs - A European overview. 13-20 - Alexander W. Dent:

Choosing key sizes for cryptography. 21-27 - George French, Mike Bond:

Caveat venditor. 28-32 - Sriramkrishnan Srinivasan:

Identity based encryption: Progress and challenges. 33-40
Volume 15, Number 2, May 2010
- Chez Ciechanowicz:

Identity Theft and Reconstruction. 41 - Steven M. Furnell

:
Online identity: Giving it all away? 42-46 - Karen Lawrence Öqvist:

The art of alchemy. 47-50 - Marc Langheinrich

, Günter Karjoth:
Social networking and the risk to companies and institutions. 51-56 - Allan Tomlinson, Po-Wah Yau, John A. MacDonald:

Privacy threats in a mobile enterprise social network. 57-66 - Andy Jones, Thomas Anthony Martin

:
Digital forensics and the issues of identity. 67-71 - Karen Lawrence Öqvist:

Fool's gold. 72-75
Volume 15, Number 3, August 2010
- John Austen:

Computer crime - A 2011 update. 77-78 - Claire Elliott:

Botnets: To what extent are they a threat to information security? 79-103 - Kim-Kwang Raymond Choo

:
High tech criminal threats to the national information infrastructure. 104-111 - Kuheli Roy Sarkar:

Assessing insider threats to information security using technical, behavioural and organisational measures. 112-133 - William Walker:

Mobile telephony security compromises. 134-136
Volume 15, Number 4, November 2010
- André Mariën:

Matchmaking between PCI-DSS and Security. 137 - Georges Ataya:

PCI DSS audit and compliance. 138-144 - Jeff Tutton:

Incident response and compliance: A case study of the recent attacks. 145-149 - Gunnar Peterson:

From auditor-centric to architecture-centric: SDLC for PCI DSS. 150-153 - J. Andrew Valentine:

Compliance complacency: How 'check-box' compliancy remains a pitfall for many organizations worldwide. 154-159 - Branden R. Williams

:
How tokenization and encryption can enable PCI DSS compliance. 160-165

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














