


default search action
Information Security Technical Report, Volume 5
Volume 5, Number 1, January 2000
- Tony Mason:

Platform Security and Common Criteria. 14-25 - Roger R. Schell

, Michael F. Thompson:
Platform Security: What is Lacking? 26-41 - Tim D. Stone, David Miller:

High Security Modules - Still Needed Despite Advances in Platforms. 42-47 - Nicholas Bohm:

How Strong do Platforms Need to be From a Legal Perspective? 48-53 - Boris Balacheff, Liqun Chen

, Siani Pearson
, Graeme Proudler, David Chan:
Computing Platform Security in Cyberspace. 54-63 - Ivan Phillips:

Windows 2000 Security: A Balanced View. 64-82
Volume 5, Number 2, June 2000
- Chez Ciechanowicz:

Introduction. 1 - T. J. Bates:

Computer Evidence - Recent Issues. 15-22 - Peter Yapp:

Who's Bugging You? How Are You Protecting Your Information? 23-33 - Vincent Blake:

PABX Security. 34-42 - Simon Janes:

The Role of Technology in Computer Forensic Investigations. 43-50 - Malcolm Highfield:

The Computer Misuse Act 1990: Understanding and Applying the Law. 51-59 - Tad Dippel:

IT as an Enabler of Computer Fraud. 60-70
Volume 5, Number 3, September 2000
- Chez Ciechanowicz:

Introduction. 1 - Rudy Bakalov:

Introduction to WAP's Wireless Transport Layer Security. 15-22 - Stephen Farrell:

The WAP Forum's Wireless Public Key Infrastructure. 23-31 - Joakim Persson, Ben J. M. Smeets:

Bluetooth Security - An Overview. 32-43 - Gert Roelofsen:

TETRA Security. 44-54 - Colin Blanchard:

Security for the Third Generation (3G) Mobile System. 55-65 - Steve Babbage:

Design of Security Algorithms for Third Generation Mobile Telephony. 66-73 - Scott Cadzow:

Security Concerns in IP-Based Telephony: Covering TIPHON as a Case Study. 74-82
Volume 5, Number 4, December 2000
- Chez Ciechanowicz:

Introduction. 1-2 - Chris J. Mitchell

:
PKI standards. 17-32 - Robert Bickmore:

Implementing a PKI. 33-38 - Robert Carolina, Jamie Lyford, Tarlo Lyons:

The Intersection of Public Key Infrastructures and the Law. 39-52 - Chris Sundt:

PKI - Panacea or Silver Bullet? 53-65 - Steve Matthews:

Authorization Models - PKI Versus the Real World. 66-71 - Vivike Sedov:

Certificate Classes. 72-80 - John Bullard:

Achieving Certainty in an Age of Uncertainty. 81-83 - Mark Stirland:

Identrus - the 'Technical Platform'. 84-89

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














