Stop the war!
Остановите войну!
for scientists:
default search action
Information Security Technical Report, Volume 2
Volume 2, Number 1, 1997
- Gary Hardy:
Introduction. 1-2 - John Austen:
Can the laws really cut down hacking? 5 - Alistair Kelman:
The regulation of virus research: Prosecution for 'unlawful research'? 5 - William List:
The common criteria - Good, bad or indifferent? 5-6 - Nigel Hickson:
Security evaluation and certification: The future of a national scheme. 6 - Chris Amery:
The European union data protection directive - Where are we? How did we get here? What next? 6-7 - John Woulds:
Information privacy and security - A regulator's priorities. 7 - Jim Blight:
Customer privacy versus customer service. 7 - Christopher Millard:
Impact of the EU data protection directive on transborder data flows. 8 - Chris Sundt:
A commercial view of the OECD recommendations on cryptography policy. 8 - Bill Hancock:
Stop that e-mail! you are probably breaking the law! 8-9 - Robert P. Bigelow:
Encryption controls are US government priority. 9
Volume 2, Number 2, 1997
- Gary Hardy:
Introduction. 1-2 - Fred Piper:
Introduction to cryptology. 10-13 - Donald W. Davies:
A brief history of cryptography. 14-17 - Sean Murphy:
The difficulty of attacking cryptosystems. 18-21 - Don Coppersmith, Chris L. Holloway, Stephen M. Matyas, Nevenko Zunic:
The data encryption standard. 22-24 - Chris J. Mitchell:
Authentication using cryptography. 25-32 - Bart Preneel:
MACs and hash functions: State of the art. 33-43 - Paul Halliden:
The management of symmetric keys. 44-53 - Stefek Zaba:
Cryptographic security in the internet protocol suite: Practice and proposals. 54-73 - Andreas Fuchsberger:
Microsoft CryptoAPI. 74-77 - Scott A. Vanstone:
Elliptic curve cryptosystem - The answer to strong, fast public-key cryptography for securing constrained environments. 78-87 - Simon J. D. Phoenix, Paul D. Townsend:
Quantum cryptography: Protecting our future networks with quantum mechanics. 88-97
Volume 2, Number 3, 1997
- Gary Hardy:
Introduction. 1 - John Sherwood:
Security issues in today's corporate network. 8-17 - Nick Mansfield:
Commercial use of cryptography in the shell companies. 18-20 - John Walker:
Should TTPs be licensed? 21-27 - Christopher W. Klaus:
Network security: Anything but bulletproof. 28-32 - Marcus J. Ranum:
Thinking about firewalls V2.0: Beyond perimeter security. 33-45 - Marcus J. Ranum:
Strategic security for IP networks. 46-52 - Ian White:
Windows NT security. 53-65 - Roy McNamarra:
Unix network security. 66-79 - Gary Hardy:
The relevance of penetration testing to corporate network security. 80-86
Volume 2, Number 4, 1998
- Chez Ciechanowicz:
Introduction. 3-4 - Michael J. Ganley:
Digital signatures. 12-22 - Michael Ward:
Digital certificates and payment systems. 23-31 - Phil Venables:
A commercial future of public key cryptography: Shrink wrapping trust for profit. 32-40 - Keith Martin:
Applying cryptography within the ASPeCT Project. 41-53 - Andreas Fuchsberger:
GSS-API. 54-61 - Charles Pierson:
Network encryption. 62-65 - Charles Brookson:
Cryptography systems: Putting theory into practice. 66-72 - Luc De Clercq:
User security enhancement: A worldwide security project. 73-77
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.