


default search action
Computers & Security, Volume 21
Volume 21, Number 1, 2002
- E. Eugene Schultz:

Security Views. 5-15 - Stephen Hinde:

2001: A Privacy Odyssey Revisited. 16-34 - Gerald L. Kovacich, Andy Jones:

What InfoSec professionals should know about information warfare tactics by terrorists. 35-41 - Rachel Ecclestone:

In brief. 42-44 - Rachel Ecclestone:

ACSAC 2001 review. 47-60 - George Magklaras

, Steven Furnell
:
Insider Threat Prediction Tool: Evaluating the probability of IT misuse. 62-73 - Chi-Kwong Chan, Lee-Ming Cheng

:
Cryptanalysis of a Timestamp-Based Password Authentication Scheme. 74-76 - Kapali Viswanathan, Colin Boyd, Ed Dawson

:
Hybrid Key Escrow: A New Paradigm. 77-92
Volume 21, Number 2, 31 March 2002
- E. Eugene Schultz:

Security Views. 101-112 - Gerald L. Kovacich, Andy Jones:

What InfoSec Professionals Should Know About Information Warfare Tactics by Terrorists. 113-119 - Bob Blakley:

Security Insights. 120-125 - Joan L. Aron, Michael O'Leary, Ronald A. Gove, Shiva Azadegan, M. Christina Schneider:

The Benefits of a Notification Process in Addressing the Worsening Computer Virus Problem: Results of a Survey and a Simulation Model. 142-163 - Victor R. L. Shen, Tzer-Shyong Chen

:
A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations. 164-171 - Lech J. Janczewski

, Frank Xinli Shi:
Development of Information Security Baselines for Healthcare Information Systems in New Zealand. 172-192
Volume 21, Number 3, 1 June 2002
- E. Eugene Schultz:

Security Views. 201-211 - Stephen Hinde:

It Was Déjá vu all Over Again. 212-21 - Nathan L. Clarke

, Steven Furnell
, Philip M. Rodwell, Paul L. Reynolds:
Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices. 220-228 - Gary McGraw:

On Bricks and Walls: Why Building Secure Software is Hard. 229-238 - Chris Pounder:

Anti-Terrorism Legislation: The Impact on The Processing of Data. 240-245 - Joris Claessens, Valentin Dem, Danny De Cock, Bart Preneel, Joos Vandewalle:

On the Security of Today's Online Electronic Banking Systems. 253-265 - Elmé Smith, Jan H. P. Eloff:

A Prototype for Assessing Information Technology Risks in Health Care. 266-284
Volume 21, Number 4, 1 August 2002
- E. Eugene Schultz:

The Sorry State of Law Enforcement. 290-292 - E. Eugene Schultz:

Security views. 293-302 - Steve Purser:

Why access control is difficult. 303-309 - Stephen Hinde:

Security surveys spring crop. 310-321 - Andy Nikishin:

The Klez.H worm dissected. 322-327 - Chris Pounder:

The emergence of a comprehensive obligation towards computer security. 328-332 - August Bequai:

Syndicated crime and international terrorism: the lessons of '9-11'. 333-337 - Younghwa Lee, Jintae Lee, Zoonky Lee:

Integrating Software Lifecycle Process Standards with Security Engineering. 345-355 - Peter Ward, Clifton L. Smith:

The Development of Access Control Policies for Information Technology Systems. 356-371 - Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng:

An Efficient and Practical Solution to Remote Authentication: Smart Card. 372-375
Volume 21, Number 5, 1 October 2002
- E. Eugene Schultz:

Taking a stand on hackers. 382-384 - E. Eugene Schultz:

Security Views. 385-396 - Bill Hancock:

Security crisis management the basics. 397-401 - Karin Höne, Jan H. P. Eloff:

Information security policy what do international information security standards say? 402-409 - Andy Nikishin:

Much Ado About Nothing: Win32 Perrun. 410-412 - William J. Caelli:

Trusted ...or... trustworthy: the search for a new paradigm for computer and network security. 413-420 - Brian McKenna:

Enterprise in focus at NetSec 2002. 421-423 - Stephen Hinde:

The perils of privacy. 424-432 - Yihua Liao, V. Rao Vemuri:

Use of K-Nearest Neighbor classifier for intrusion detection. 439-448 - Der-Chyuan Lou

, Jiang-Lung Liu:
Steganographic Method for Secure Communications. 449-460 - Marit Hansen, Kristian Köhntopp, Andreas Pfitzmann:

The Open Source approach opportunities and limitations with respect to security and privacy. 461-471
Volume 21, Number 6, 1 October 2002
- E. Eugene Schultz:

Security Views. 481-490 - Stephen Hinde:

The Blue Screen of Death and other deadly bugs. 491-496 - Andy Nikishin:

I-Worm.Lentin (aka Yaha). 497-502 - Chris Pounder:

The US's National Strategy for Homeland Security. 503-505 - Jon David:

Policy enforcement in the workplace. 506-513 - August Bequai:

White collar crime: a handmaiden of international tech terrorism. 514-519 - Sarah Hilley:

Palladium, fraud, and surviving terrorism- Compsec 2002 - Preview of Compsec 2002, 30 Oct-1 Nov, Queen Elizabeth II Conference Centre, Westminster, London, UK. 520-521 - E. Eugene Schultz:

A framework for understanding and predicting insider attacks. 526-531 - Dimitris Gritzali:

Principles and requirements for a secure e-voting system. 539-556 - Virginia E. Rezmierski, Marshall R. Seese Jr., Nathaniel St. Clair II:

University systems security logging: who is doing it and how far can they go? 557-564 - Tzer-Shyong Chen

, Yu-Fang Chung
:
Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm. 565-570
Volume 21, Number 7, November 2002
- E. Eugene Schultz:

The US Government bigger and better information security? 578-580 - E. Eugene Schultz:

Security Views. 581-590 - Stephen Hinde:

Spam, scams, chains, hoaxes and other junk mail. 592-606 - Andrew Armstrong:

Bugbear. 607-608 - Matt Bishop

:
Trends in academic research: vulnerabilities analysis and intrusion detection. 609-612 - Brian McKenna:

Managed Security Services new economy relic or wave of the future? 613-616 - H. S. Venter

, Jan H. P. Eloff:
Vulnerabilities categories for intrusion detection system. 617-619 - Chris Pounder:

Security policy update. 620-623 - Babatunde Jayeju-akinsiku:

Technology and Electronic Communications Act 2000. 624-628 - Sarah Gordon, Richard Ford:

Cyberterrorism? 636-647 - Steve Kenny, Larry Korba:

Applying digital rights management systems to privacy rights management. 648-664 - Lei Fan, Jianhua Li, HongWen Zhu:

An enhancement of timestamp-based password authentication scheme. 665-667
Volume 21, Number 8, November 2002
- E. Eugene Schultz:

The gap between cryptography and information security. 674-67 - E. Eugene Schultz:

Security Views. 677-688 - Stephen Hinde:

Compsec 2002: the complete security circle. 689-693 - Andrew Armstrong:

KLEZ H. 694-695 - Jon David:

Giga Security. 696-700 - Harry B. DeMaio:

Global Trust, Certification and (ISC)2. 701-704 - Jeffrey Hunker:

Policy challenges in building dependability in global infrastructures. 705-711 - Francesco Bergadano

, Davide Cavagnino, Bruno Crispo:
Individual Authentication in Multiparty Communications. 719-735 - S. Holeman, G. Manimaran, James Davis, Anirban Chakrabarti:

Differentially secure multicasting and its implementation methods. 736-749 - Sheng Zhong:

A practical key management scheme for access control in a user hierarchy. 750-759

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














