


Остановите войну!
for scientists:


default search action
Computers & Security, Volume 19
Volume 19, Number 1, 1 January 2000
- Bill Hancock:
Mass Network Flooding Attacks (Distributed Denial of Service - DDoS) Surface in the Wild. Comput. Secur. 19(1): 6-7 (2000) - Bill Hancock:
Cell Phone Crypto Cracked. Comput. Secur. 19(1): 7-8 (2000) - Bill Hancock:
Clinton's Proposed Crypto Regulations Under Attack. Comput. Secur. 19(1): 8-9 (2000) - Bill Hancock:
Overhauling the National Security Agency? Comput. Secur. 19(1): 9-10 (2000) - Bill Hancock:
Down Under, Hacking Private Computers by the Government is Legal. Comput. Secur. 19(1): 10-12 (2000) - Bill Hancock:
The "S" in SAP Doesn't Stand for Security. Comput. Secur. 19(1): 12-13 (2000) - Bill Hancock:
New York Times Fires Employees for Violating Internal E-mail Policies. Comput. Secur. 19(1): 12 (2000) - Bill Hancock:
'Anonymizing' Software Causes Law Enforcement Concerns. Comput. Secur. 19(1): 13-14 (2000) - Bill Hancock:
Melissa Virus Creator Pleads Guilty. Comput. Secur. 19(1): 13 (2000) - Bill Hancock:
Security Problems Go Mobile In Your Next Car. Comput. Secur. 19(1): 14-16 (2000) - Bill Hancock:
The L0pht Goes Corporate and becomes @Stake. Comput. Secur. 19(1): 16-17 (2000) - Chuck Williams, Nevenko Zunic, Stephen M. Matyas, Sarbari Gupta, Michael Willett:
Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction. 18-20 - Michael Smith, Paul C. van Oorschot, Michael Willett:
Cryptographic Information Recovery Using Key Recover. 21-27 - Michael Willett:
Features, Attributes, Characteristics, and Traits (FACTs) of Key Recovery Schemes/Products. 28-30 - John Kennedy, Stephen M. Matyas, Nevenko Zunic:
Key Recovery Functional Model. 31-36 - Stephen M. Matyas, Nevenko Zunic:
Additional Key Recovery Function. 37-40 - Sarbari Gupta:
A Common Key Recovery Block Format: Promoting Interoperability Between Dissimilar Key Recovery Mechanisms. 41-47 - Chuck Williams, Nevenko Zunic:
Global Interoperability for Key Recovery. 48-55 - Sarbari Gupta, Stephen M. Matyas:
Public Key Infrastructure: Analysis of Existing and Needed Protocols and Object Formats for Key Recovery. 56-68 - Abby Maclean, Stephen M. Matyas, Nevenko Zunic:
Organization Implementation Guidelines for Recovery of Encrypted Information. 69-81 - Nevenko Zunic:
Organization Considerations for Retrieval of Stored Data via Key Recovery Methods. 82-85 - Tom Markham, Chuck Williams:
Key Recovery Header for IPSEC. 86-90 - David M. Balenson, Tom Markham:
ISAKMP Key Recovery Extension. 91-99 - Timothy G. Shoriak:
SSL/TLS Protocol Enablement for Key Recovery. 100-104
Volume 19, Number 2, February 2000
- Bill Hancock:
Alliance Formed to Fight Internet Attacks. Comput. Secur. 19(2): 108-109 (2000) - Bill Hancock:
Security Views. 108 - Bill Hancock:
Code Paranoia about FBI Offerings to Detect DoS Infiltration. Comput. Secur. 19(2): 109-110 (2000) - Bill Hancock:
CIA says Russia and China are Building CyberSpy Organization. Comput. Secur. 19(2): 110-111 (2000) - Bill Hancock:
The SEC Hires CyberInvestigators to Search for Fraud. Comput. Secur. 19(2): 111 (2000) - Bill Hancock:
FBI Investigating Copycat Operations in Wake of February, 2000, DDoS Attacks. Comput. Secur. 19(2): 111-113 (2000) - Bill Hancock:
Industry Teaming on ISACs. Comput. Secur. 19(2): 113 (2000) - Bill Hancock:
In Wake of Attacks, FBI Using Racketeering Laws for Prosecution. Comput. Secur. 19(2): 113-114 (2000) - Bill Hancock:
Mafiaboy Hacker Eyed In Attacks. Comput. Secur. 19(2): 114-115 (2000) - Bill Hancock:
Japan Web Hackers Use Chinese and US Servers. Comput. Secur. 19(2): 115 (2000) - Bill Hancock:
US Pentagon Defense Messaging System Shows Deficiencies in Security. Comput. Secur. 19(2): 116-117 (2000) - Bill Hancock:
Y2Hack Get-Together in Israel Under Political Attack. Comput. Secur. 19(2): 116 (2000) - Bill Hancock:
Security Managers Cite Need for Real-Time Security. Comput. Secur. 19(2): 117 (2000) - Stephen Hinde:
New Millennium, Old Failures. 119-127 - Steve Webb:
Crimes And Misdemeanours: How to Protect Corporate Information in the Internet Age. 128-132 - Gerald L. Kovacich, William C. Boni:
Internet Targets. 133-140 - Michael Collins:
Telecommunications Crime - Part 3. 141-148 - Mark Hoogenboom, Patrick Steemers:
Security For Remote Access And Mobile Application. 149-163 - Lynette Barnard, Rossouw von Solms:
A Formalized Approach to the Effective Selection and Evaluation of Information Security Control. 185-194
Volume 19, Number 3, 1 March 2000
- Bill Hancock:
Security Views. 202-203 - Bill Hancock:
Network Warfare On The Rise. Comput. Secur. 19(3): 203-204 (2000) - Bill Hancock:
FBI Source Convicted of Hackin. Comput. Secur. 19(3): 204-205 (2000) - Bill Hancock:
Microsoft "Whistler" Release Posted to Internet. Comput. Secur. 19(3): 205-206 (2000) - Bill Hancock:
US Senate Passes Bill to Tighten Up Government Network. Comput. Secur. 19(3): 206-207 (2000) - Bill Hancock:
Cyberpatrol Reverse Engineering: Round 2. Comput. Secur. 19(3): 207 (2000) - Bill Hancock:
First Cybercrime Task Force City - Pittsburgh. Comput. Secur. 19(3): 208 (2000) - Bill Hancock:
US Army Warns of Cyberattackers Gaining Access to Military Weapons Systems. Comput. Secur. 19(3): 208 (2000) - Bill Hancock:
More on the January, 2000, NSA Computer Problems. Comput. Secur. 19(3): 209-211 (2000) - Bill Hancock:
Mexico's President Under Cyberattack - Again. Comput. Secur. 19(3): 211 (2000) - Bill Hancock:
Another Insider Job on Wall Stree. Comput. Secur. 19(3): 211-212 (2000) - Bill Hancock:
FBI Identifies Hacker Who Stole More than 485 000 Credit Card Numbers. Comput. Secur. 19(3): 212 (2000) - Bill Hancock:
USDOJ Goes Prime Time With Cybercrime Web Sit. Comput. Secur. 19(3): 212-213 (2000) - Bill Hancock:
EU and US Reach Agreement on Privacy Issues. Comput. Secur. 19(3): 213-214 (2000) - Bill Hancock:
Warning from the US Government: Companies Get Secure or... Comput. Secur. 19(3): 214-215 (2000) - Bill Hancock:
China Relaxes Encryption Rules. Comput. Secur. 19(3): 215 (2000) - Bill Hancock:
French Card Forgery Note Could Work. Comput. Secur. 19(3): 216 (2000) - Bill Hancock:
US Law Enforcement Needs You! Comput. Secur. 19(3): 216-217 (2000) - Bill Hancock:
UK Law Enforcement Bemoans Criminal Activities on Interne. Comput. Secur. 19(3): 217-218 (2000) - Bill Hancock:
Intel Creates New Plans for Notebook Security. Comput. Secur. 19(3): 218 (2000) - Bill Hancock:
Kevin Mitnick Gets His Day in Congres. Comput. Secur. 19(3): 218-219 (2000) - Bill Hancock:
Web Site Owners Seek Security People Apply Now! Comput. Secur. 19(3): 219-220 (2000) - Bill Hancock:
Generation X Hackers? Comput. Secur. 19(3): 220-221 (2000) - Stephen Hinde:
Life Was Simple Then. 222-229 - Richard Barber:
Implementing Public Key Infrastructures in a Dynamic Business Environment. 230-233 - Thomas Finne:
Information Systems Risk Management: Key Concepts and Business Processes. 234-242 - Mariki M. Eloff
, Sebastiaan H. von Solms:
Information Security Management: A Hierarchical Framework for Various Approaches. 243-256 - Spyros Kokolakis, Evangelos A. Kiountouzis:
Achieving Interoperability in a Multiple-Security- Policies Environment. 267-281 - Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic:
Generation of RSA Keys That Are Guaranteed to be Unique for Each User. 282-288
Volume 19, Number 4, 1 April 2000
- Bill Hancock:
Suspected Hackers Arrested in Russian Credit-Card Fraud. 296 - Bill Hancock:
Intel Eliminates ID from New Chips. 296-297 - Bill Hancock:
European Parliament Doesn't Like Anonymity Online. 297 - Bill Hancock:
DOD Finds Plans Online Reserve Unit Assesses Risk. 297-298 - Bill Hancock:
Agencies Are "Own Worst Enemy". 298 - Bill Hancock:
US Department of Energy Security Criticized - Again. 298-300 - Bill Hancock:
This is What Happens When You Lose Your Computer With Classified Data On It.... 300-301 - Bill Hancock:
Not Everyone Wants PKI NSF Opts for Digital Signature Alternativ. 301-302 - Bill Hancock:
Justice Department Conducting Criminal Probe in Former CIA Director Activities. 302-303 - Bill Hancock:
Apache Site Defaced. 303-305 - Bill Hancock:
US and Europe Cybercrime Agreement Problems. 306-307 - Bill Hancock:
Cyberstalking on the Rise. 307-308 - Bill Hancock:
Large Child Pornography Ring Busted in Texas. 308-309 - Bill Hancock:
New Denial of Service Attack on Internet. 309-310 - Bill Hancock:
US Supreme Court Confirms ISPs Not Liable in E-mail Messages. 310 - Bill Hancock:
Software Scam - 17 Indicted. 310-311 - Stephen Hinde:
Smurfing, Swamping, Spamming, Spoofing, Squatting, Slandering, Surfing, Scamming and Other Mischiefs of the World Wide Web. 312-320 - Richard Barber:
Security in a Mobile World Is Bluetooth the Answer? 321-325 - Gerald L. Kovacich:
Netspionage The Global Threat to Information, Part I: What is it and Why I Should Care? 326-336 - Julie D. Nosworthy:
Implementing Information Security In The 21st Century Do You Have the Balancing Factors? 337-347 - Petra van Krugten, Mark Hoogenboom:
B2C Security Be Just Secure Enough. 348-356 - Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic:
Multiparty Biometric-Based Authentication. 369-374
Volume 19, Number 5, 1 July 2000
- Bill Hancock:
Security Views. 382-383 - Bill Hancock:
"I Agree" Legal Agreements Get Legislated. 383-384 - Bill Hancock:
The US Government Tells Its Users to Clean Up Their E-mail. 385-387 - Bill Hancock:
Home PC's Targeted by Hackers (Duh!). 387-388 - Bill Hancock:
CIO's Get Serious About Best Security Practices. 388 - Bill Hancock:
Yahoo Faces Identity Crisis. 389 - Bill Hancock:
Microsoft a Popular Virus Target Due to Ubiquity. 389-391 - Bill Hancock:
UK's RIP Bill Creates Official Snooping. 391-392 - Bill Hancock:
Extortion Going Online. 392-393 - Bill Hancock:
Office 2000 Patch Recommended by CERT. 393 - Bill Hancock:
Self-Regulation for Privacy Doesn't Work Says FTC. 393-394 - Bill Hancock:
...But the Industry Wants Self-Regulation. 394-395 - Bill Hancock:
US Senate Wakes Up to Need for Cybertools for Law Enforcers. 395-396 - Bill Hancock:
PGP V5.0 Keys Potentially Insecure. 396-397 - Bill Hancock:
Canadian Credit Card Conundrum Caused by a Cracker. 397-398 - Bill Hancock:
Suspect Charged in 'Love Bug' Worm has Charges Dropped. 398 - Bill Hancock:
Network Solutions Re-evaluates Security. 398-400 - Bill Hancock:
CMU Sets Up a Sister to CERT. 400-401 - Bill Hancock:
Speedy Response Yields Success at DOE. 401 - Bill Hancock:
AOL Gets Busted - Again. 402 - Bill Hancock:
Who's to Blame? 402-403 - Bill Hancock:
Wireless Ubiquity for E-Biz. 403 - Bill Hancock:
And Now, the Bug-in-Your-Site Award Goes To.... 404 - Bill Hancock:
Isn't It Interesting What You Can Buy At An Auction Site? TV's, Computers, Drugs. 404-405 - Bill Hancock:
G8 Thinks About Cybercrime (It's About Time, Too). 405-407 - Stephen Hinde:
Love Conquers All? 408-420 - Gerald L. Kovacich:
Netspionage The Global Threat to Information, Part II: Information Collection in the Gray Zon. 421-427 - Stephen M. Matyas, Jeff Stapleto:
A Biometric Standard for Information Management and Security. 428-441 - Yu-Lun Huang, Shiuh-Pyng Shieh, Fu-Shen Ho:
A Generic Electronic Payment Model Supporting Multiple Merchant Transactions. 453-465 - Mohammad Peyravian, Nevenko Zunic:
Methods for Protecting Password Transmission. 466-469
Volume 19, Number 6, August 2000
- Bill Hancock:
A Need for a Network Security Czar. 476-477 - Bill Hancock:
US Government Fighting for Expanded Wiretap Laws. 477 - Bill Hancock:
E-Commerce Paranoia: Flaws in Code. 477-479 - Bill Hancock:
Truly Certified: Security Certifications Updat. 479-480 - Bill Hancock:
Digital Certificates Get Creative. 480-487 - Bill Hancock:
Health Care Security: A Hard Look at a Growing Problem. 482 - Bill Hancock:
Safeway UK's Website Shut Down. 483 - Bill Hancock:
Philippine Government Creates Incident Response Team. 483