default search action
Computers & Security, Volume 19
Volume 19, Number 1, 1 January 2000
- Bill Hancock:
Mass Network Flooding Attacks (Distributed Denial of Service - DDoS) Surface in the Wild. Comput. Secur. 19(1): 6-7 (2000) - Bill Hancock:
Cell Phone Crypto Cracked. Comput. Secur. 19(1): 7-8 (2000) - Bill Hancock:
Clinton's Proposed Crypto Regulations Under Attack. Comput. Secur. 19(1): 8-9 (2000) - Bill Hancock:
Overhauling the National Security Agency? Comput. Secur. 19(1): 9-10 (2000) - Bill Hancock:
Down Under, Hacking Private Computers by the Government is Legal. Comput. Secur. 19(1): 10-12 (2000) - Bill Hancock:
The "S" in SAP Doesn't Stand for Security. Comput. Secur. 19(1): 12-13 (2000) - Bill Hancock:
New York Times Fires Employees for Violating Internal E-mail Policies. Comput. Secur. 19(1): 12 (2000) - Bill Hancock:
'Anonymizing' Software Causes Law Enforcement Concerns. Comput. Secur. 19(1): 13-14 (2000) - Bill Hancock:
Melissa Virus Creator Pleads Guilty. Comput. Secur. 19(1): 13 (2000) - Bill Hancock:
Security Problems Go Mobile In Your Next Car. Comput. Secur. 19(1): 14-16 (2000) - Bill Hancock:
The L0pht Goes Corporate and becomes @Stake. Comput. Secur. 19(1): 16-17 (2000) - Chuck Williams, Nevenko Zunic, Stephen M. Matyas, Sarbari Gupta, Michael Willett:
Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction. 18-20 - Michael Smith, Paul C. van Oorschot, Michael Willett:
Cryptographic Information Recovery Using Key Recover. 21-27 - Michael Willett:
Features, Attributes, Characteristics, and Traits (FACTs) of Key Recovery Schemes/Products. 28-30 - John Kennedy, Stephen M. Matyas, Nevenko Zunic:
Key Recovery Functional Model. 31-36 - Stephen M. Matyas, Nevenko Zunic:
Additional Key Recovery Function. 37-40 - Sarbari Gupta:
A Common Key Recovery Block Format: Promoting Interoperability Between Dissimilar Key Recovery Mechanisms. 41-47 - Chuck Williams, Nevenko Zunic:
Global Interoperability for Key Recovery. 48-55 - Sarbari Gupta, Stephen M. Matyas:
Public Key Infrastructure: Analysis of Existing and Needed Protocols and Object Formats for Key Recovery. 56-68 - Abby Maclean, Stephen M. Matyas, Nevenko Zunic:
Organization Implementation Guidelines for Recovery of Encrypted Information. 69-81 - Nevenko Zunic:
Organization Considerations for Retrieval of Stored Data via Key Recovery Methods. 82-85 - Tom Markham, Chuck Williams:
Key Recovery Header for IPSEC. 86-90 - David M. Balenson, Tom Markham:
ISAKMP Key Recovery Extension. 91-99 - Timothy G. Shoriak:
SSL/TLS Protocol Enablement for Key Recovery. 100-104
Volume 19, Number 2, February 2000
- Bill Hancock:
Alliance Formed to Fight Internet Attacks. Comput. Secur. 19(2): 108-109 (2000) - Bill Hancock:
Security Views. 108 - Bill Hancock:
Code Paranoia about FBI Offerings to Detect DoS Infiltration. Comput. Secur. 19(2): 109-110 (2000) - Bill Hancock:
CIA says Russia and China are Building CyberSpy Organization. Comput. Secur. 19(2): 110-111 (2000) - Bill Hancock:
The SEC Hires CyberInvestigators to Search for Fraud. Comput. Secur. 19(2): 111 (2000) - Bill Hancock:
FBI Investigating Copycat Operations in Wake of February, 2000, DDoS Attacks. Comput. Secur. 19(2): 111-113 (2000) - Bill Hancock:
Industry Teaming on ISACs. Comput. Secur. 19(2): 113 (2000) - Bill Hancock:
In Wake of Attacks, FBI Using Racketeering Laws for Prosecution. Comput. Secur. 19(2): 113-114 (2000) - Bill Hancock:
Mafiaboy Hacker Eyed In Attacks. Comput. Secur. 19(2): 114-115 (2000) - Bill Hancock:
Japan Web Hackers Use Chinese and US Servers. Comput. Secur. 19(2): 115 (2000) - Bill Hancock:
US Pentagon Defense Messaging System Shows Deficiencies in Security. Comput. Secur. 19(2): 116-117 (2000) - Bill Hancock:
Y2Hack Get-Together in Israel Under Political Attack. Comput. Secur. 19(2): 116 (2000) - Bill Hancock:
Security Managers Cite Need for Real-Time Security. Comput. Secur. 19(2): 117 (2000) - Stephen Hinde:
New Millennium, Old Failures. 119-127 - Steve Webb:
Crimes And Misdemeanours: How to Protect Corporate Information in the Internet Age. 128-132 - Gerald L. Kovacich, William C. Boni:
Internet Targets. 133-140 - Michael Collins:
Telecommunications Crime - Part 3. 141-148 - Mark Hoogenboom, Patrick Steemers:
Security For Remote Access And Mobile Application. 149-163 - Lynette Barnard, Rossouw von Solms:
A Formalized Approach to the Effective Selection and Evaluation of Information Security Control. 185-194
Volume 19, Number 3, 1 March 2000
- Bill Hancock:
Security Views. 202-203 - Bill Hancock:
Network Warfare On The Rise. Comput. Secur. 19(3): 203-204 (2000) - Bill Hancock:
FBI Source Convicted of Hackin. Comput. Secur. 19(3): 204-205 (2000) - Bill Hancock:
Microsoft "Whistler" Release Posted to Internet. Comput. Secur. 19(3): 205-206 (2000) - Bill Hancock:
US Senate Passes Bill to Tighten Up Government Network. Comput. Secur. 19(3): 206-207 (2000) - Bill Hancock:
Cyberpatrol Reverse Engineering: Round 2. Comput. Secur. 19(3): 207 (2000) - Bill Hancock:
First Cybercrime Task Force City - Pittsburgh. Comput. Secur. 19(3): 208 (2000) - Bill Hancock:
US Army Warns of Cyberattackers Gaining Access to Military Weapons Systems. Comput. Secur. 19(3): 208 (2000) - Bill Hancock:
More on the January, 2000, NSA Computer Problems. Comput. Secur. 19(3): 209-211 (2000) - Bill Hancock:
Mexico's President Under Cyberattack - Again. Comput. Secur. 19(3): 211 (2000) - Bill Hancock:
Another Insider Job on Wall Stree. Comput. Secur. 19(3): 211-212 (2000) - Bill Hancock:
FBI Identifies Hacker Who Stole More than 485 000 Credit Card Numbers. Comput. Secur. 19(3): 212 (2000) - Bill Hancock:
USDOJ Goes Prime Time With Cybercrime Web Sit. Comput. Secur. 19(3): 212-213 (2000) - Bill Hancock:
EU and US Reach Agreement on Privacy Issues. Comput. Secur. 19(3): 213-214 (2000) - Bill Hancock:
Warning from the US Government: Companies Get Secure or... Comput. Secur. 19(3): 214-215 (2000) - Bill Hancock:
China Relaxes Encryption Rules. Comput. Secur. 19(3): 215 (2000) - Bill Hancock:
French Card Forgery Note Could Work. Comput. Secur. 19(3): 216 (2000) - Bill Hancock:
US Law Enforcement Needs You! Comput. Secur. 19(3): 216-217 (2000) - Bill Hancock:
UK Law Enforcement Bemoans Criminal Activities on Interne. Comput. Secur. 19(3): 217-218 (2000) - Bill Hancock:
Intel Creates New Plans for Notebook Security. Comput. Secur. 19(3): 218 (2000) - Bill Hancock:
Kevin Mitnick Gets His Day in Congres. Comput. Secur. 19(3): 218-219 (2000) - Bill Hancock:
Web Site Owners Seek Security People Apply Now! Comput. Secur. 19(3): 219-220 (2000) - Bill Hancock:
Generation X Hackers? Comput. Secur. 19(3): 220-221 (2000) - Stephen Hinde:
Life Was Simple Then. 222-229 - Richard Barber:
Implementing Public Key Infrastructures in a Dynamic Business Environment. 230-233 - Thomas Finne:
Information Systems Risk Management: Key Concepts and Business Processes. 234-242 - Mariki M. Eloff, Sebastiaan H. von Solms:
Information Security Management: A Hierarchical Framework for Various Approaches. 243-256 - Spyros Kokolakis, Evangelos A. Kiountouzis:
Achieving Interoperability in a Multiple-Security- Policies Environment. 267-281 - Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic:
Generation of RSA Keys That Are Guaranteed to be Unique for Each User. 282-288
Volume 19, Number 4, 1 April 2000
- Bill Hancock:
Suspected Hackers Arrested in Russian Credit-Card Fraud. 296 - Bill Hancock:
Intel Eliminates ID from New Chips. 296-297 - Bill Hancock:
European Parliament Doesn't Like Anonymity Online. 297 - Bill Hancock:
DOD Finds Plans Online Reserve Unit Assesses Risk. 297-298 - Bill Hancock:
Agencies Are "Own Worst Enemy". 298 - Bill Hancock:
US Department of Energy Security Criticized - Again. 298-300 - Bill Hancock:
This is What Happens When You Lose Your Computer With Classified Data On It.... 300-301 - Bill Hancock:
Not Everyone Wants PKI NSF Opts for Digital Signature Alternativ. 301-302 - Bill Hancock:
Justice Department Conducting Criminal Probe in Former CIA Director Activities. 302-303 - Bill Hancock:
Apache Site Defaced. 303-305 - Bill Hancock:
US and Europe Cybercrime Agreement Problems. 306-307 - Bill Hancock:
Cyberstalking on the Rise. 307-308 - Bill Hancock:
Large Child Pornography Ring Busted in Texas. 308-309 - Bill Hancock:
New Denial of Service Attack on Internet. 309-310 - Bill Hancock:
US Supreme Court Confirms ISPs Not Liable in E-mail Messages. 310 - Bill Hancock:
Software Scam - 17 Indicted. 310-311 - Stephen Hinde:
Smurfing, Swamping, Spamming, Spoofing, Squatting, Slandering, Surfing, Scamming and Other Mischiefs of the World Wide Web. 312-320 - Richard Barber:
Security in a Mobile World Is Bluetooth the Answer? 321-325 - Gerald L. Kovacich:
Netspionage The Global Threat to Information, Part I: What is it and Why I Should Care? 326-336 - Julie D. Nosworthy:
Implementing Information Security In The 21st Century Do You Have the Balancing Factors? 337-347 - Petra van Krugten, Mark Hoogenboom:
B2C Security Be Just Secure Enough. 348-356 - Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic:
Multiparty Biometric-Based Authentication. 369-374
Volume 19, Number 5, 1 July 2000
- Bill Hancock:
Security Views. 382-383 - Bill Hancock:
"I Agree" Legal Agreements Get Legislated. 383-384 - Bill Hancock:
The US Government Tells Its Users to Clean Up Their E-mail. 385-387 - Bill Hancock:
Home PC's Targeted by Hackers (Duh!). 387-388 - Bill Hancock:
CIO's Get Serious About Best Security Practices. 388 - Bill Hancock:
Yahoo Faces Identity Crisis. 389 - Bill Hancock:
Microsoft a Popular Virus Target Due to Ubiquity. 389-391 - Bill Hancock:
UK's RIP Bill Creates Official Snooping. 391-392 - Bill Hancock:
Extortion Going Online. 392-393 - Bill Hancock:
Office 2000 Patch Recommended by CERT. 393 - Bill Hancock:
Self-Regulation for Privacy Doesn't Work Says FTC. 393-394 - Bill Hancock:
...But the Industry Wants Self-Regulation. 394-395 - Bill Hancock:
US Senate Wakes Up to Need for Cybertools for Law Enforcers. 395-396 - Bill Hancock:
PGP V5.0 Keys Potentially Insecure. 396-397 - Bill Hancock:
Canadian Credit Card Conundrum Caused by a Cracker. 397-398 - Bill Hancock:
Suspect Charged in 'Love Bug' Worm has Charges Dropped. 398 - Bill Hancock:
Network Solutions Re-evaluates Security. 398-400 - Bill Hancock:
CMU Sets Up a Sister to CERT. 400-401 - Bill Hancock:
Speedy Response Yields Success at DOE. 401 - Bill Hancock:
AOL Gets Busted - Again. 402 - Bill Hancock:
Who's to Blame? 402-403 - Bill Hancock:
Wireless Ubiquity for E-Biz. 403 - Bill Hancock:
And Now, the Bug-in-Your-Site Award Goes To.... 404 - Bill Hancock:
Isn't It Interesting What You Can Buy At An Auction Site? TV's, Computers, Drugs. 404-405 - Bill Hancock:
G8 Thinks About Cybercrime (It's About Time, Too). 405-407 - Stephen Hinde:
Love Conquers All? 408-420 - Gerald L. Kovacich:
Netspionage The Global Threat to Information, Part II: Information Collection in the Gray Zon. 421-427 - Stephen M. Matyas, Jeff Stapleto:
A Biometric Standard for Information Management and Security. 428-441 - Yu-Lun Huang, Shiuh-Pyng Shieh, Fu-Shen Ho:
A Generic Electronic Payment Model Supporting Multiple Merchant Transactions. 453-465 - Mohammad Peyravian, Nevenko Zunic:
Methods for Protecting Password Transmission. 466-469
Volume 19, Number 6, August 2000
- Bill Hancock:
A Need for a Network Security Czar. 476-477 - Bill Hancock:
US Government Fighting for Expanded Wiretap Laws. 477 - Bill Hancock:
E-Commerce Paranoia: Flaws in Code. 477-479 - Bill Hancock:
Truly Certified: Security Certifications Updat. 479-480 - Bill Hancock:
Digital Certificates Get Creative. 480-487 - Bill Hancock:
Health Care Security: A Hard Look at a Growing Problem. 482 - Bill Hancock:
Safeway UK's Website Shut Down. 483 - Bill Hancock:
Philippine Government Creates Incident Response Team. 483 - Bill Hancock:
DDoS Defence Gets Regulatory. 483-485 - Bill Hancock:
Visa's Ten Commandments for E-Security Online. 485-486 - Bill Hancock:
'Porngate'? 486-487 - Bill Hancock:
What You Sell Online in France Could Be Restricted.... 487 - Bill Hancock:
Hackers Still Love to Attack the Pentago. 488 - Bill Hancock:
Spying At Home: A New Pastime to Detect Online Romanc. 488-491 - Bill Hancock:
Is a Convicted Hacker Really Reformed and Should You Hire Them? 491-493 - Bill Hancock:
DefCon Recruiting JamFest. 493-494 - Bill Hancock:
Hacker Target: Mobile Phones. 494-495 - Bill Hancock:
E-Mail Privacy Issues Escalate. 495 - Bill Hancock:
GeoCities Ordered to Report on Information Poste. 495-496 - Bill Hancock:
Hackers Breach Firewall. 496-497 - Bill Hancock:
Lotus Domino Holes Up. 497-498 - Stephen Hinde:
Fireworks, Beer and Old Halfpennies - The Risks of Assumption. 499-504 - Gerald L. Kovacich:
Netspionage - Part III: The Black Zone, Who Uses Netspionage, How and Why. 505-519 - Fred Cohen:
A Mathematical Structure of Simple Defensive Network Deception. 520-528 - Steven Furnell, Paul Dowland, H. M. Illingworth, Paul L. Reynolds:
Authentication and Supervision: A Survey of User Attitudes. 529-539 - Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic:
Ticket and Challenge-Based Protocols for Timestamping. 551-558 - Andres Torrubia, Francisco J. Mora:
Information Security in Multiprocessor Systems Based on the X86 Architecture. 559-563
Volume 19, Number 7, 1 November 2000
- Bill Hancock:
New Classes of Unix/Linux Attacks. 570-571 - Bill Hancock:
American Express Creates Disposable Credit Card Number. 571-572 - Bill Hancock:
Microsoft Releases New IIS Security Tool. 572 - Bill Hancock:
Baltimore Releases Security Developer Freeware. 572-573 - Bill Hancock:
'Files Streams' Virus Infects in an Old and New Way. 573-574 - Bill Hancock:
Trinity v3, a DDoS Tool, Hits the Streets. 574 - Bill Hancock:
Hacker Insurance Now Part of the Business Risk Management Kit. 574-575 - Bill Hancock:
Wireless Crazed? No Security For You! 575-577 - Bill Hancock:
White House Supporting Open Source Code. 577-578 - Bill Hancock:
White House Security Summit Builds Towards a B2B Security Standard. 578-579 - Bill Hancock:
Cellular Security Hazards. 579 - Bill Hancock:
UK Fuel Taxes Protestor Accused of Mass Hacking. 580 - Bill Hancock:
US Government Board Setting Up Security Metrics. 580 - Bill Hancock:
Privacy Group Wants 'Web Bugs' Disclosures. 581 - Bill Hancock:
Site Spoofing Becomes More Popular. 581-583 - Bill Hancock:
First PDA Virus Hits the Airwaves. 583-584 - Stephen Hinde:
Do You Know Your Organization's Achilles Heel? 585-590 - August Bequai:
Romancing The Internet And Management's Quagmire. 591-595 - Julie D. Nosworthy:
A Practical Risk Analysis Approach: Managing BCM Risk. 596-614 - Basie von Solms:
Information Security - The Third Wave? 615-620 - Rachael Pond, John Podd, Julie Bunnell, Ron Henderson:
Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates. 645-656
Volume 19, Number 8, 1 December 2000
- Bill Hancock:
From Stones in the Street to Cyberspace - Israeli and Palestinians Continue Their Virtual Battles 24 x 7. 664-665 - Bill Hancock:
Feeling Sorry for Microsoft? 665-666 - Bill Hancock:
However, Microsoft Could Use Some Sympathy - Dutch Hacker Busts Microsoft Web Site - Again. 666-667 - Bill Hancock:
Wireless Big Brother. 667-668 - Bill Hancock:
NASA Hacker Pleads Guilty. 668-669 - Bill Hancock:
Canadian Teen Mafiaboy Pleads Guilty. 669 - Bill Hancock:
Getting the Laws to Help Combat Cybercrime (There's a grand idea). 669-670 - Bill Hancock:
Internet Biz Group Calls for Cybercrime Treaty Delay. 671 - Bill Hancock:
Laptop Theft Now Targeted Towards Data and Not Necessarily Hardware. 671-673 - Bill Hancock:
Hacktivism Increasing. 673-674 - Bill Hancock:
US Department of Defense Prepares Cybercrime Database. 674 - Bill Hancock:
CIA Chat Room Causes Grief. 674-676 - Bill Hancock:
Japan Creates Cyberconditions for IT National Revolution. 676-677 - Bill Hancock:
US Privacy Law Proposals Cause Concerns. 677-678 - Stephen Hinde:
New Names For Old - A Personal Surf Through Compsec 200. 679-687 - August Bequai:
America's Internet Commerce and The Threat of Fraud. 688-691 - Andy Clarke, Vince Gallo:
The Software Colander Holes in Messagin. 692-697 - Mariki M. Eloff, Sebastiaan H. von Solms:
Information Security Management: An Approach to Combine Process Certification And Product Evaluation. 698-709 - John Sherwood:
Opening Up The Enterprise. 710-719 - Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrios Lekkas, Konstantinos Moulinos, Eleni Polydoro:
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture. 731-746
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.