default search action
Information Security Technical Report, Volume 15
Volume 15, Number 1, February 2010
- Chez Ciechanowicz:
Protocols and cryptography. 1 - Chris Sundt:
Cryptography in the real world. 2-7 - Keith Mayes, Carlos Cid:
The MIFARE Classic story. 8-12 - Dimitrios Patsos, Chez Ciechanowicz, Fred Piper:
The status of National PKIs - A European overview. 13-20 - Alexander W. Dent:
Choosing key sizes for cryptography. 21-27 - George French, Mike Bond:
Caveat venditor. 28-32 - Sriramkrishnan Srinivasan:
Identity based encryption: Progress and challenges. 33-40
Volume 15, Number 2, May 2010
- Chez Ciechanowicz:
Identity Theft and Reconstruction. 41 - Steven M. Furnell:
Online identity: Giving it all away? 42-46 - Karen Lawrence Öqvist:
The art of alchemy. 47-50 - Marc Langheinrich, Günter Karjoth:
Social networking and the risk to companies and institutions. 51-56 - Allan Tomlinson, Po-Wah Yau, John A. MacDonald:
Privacy threats in a mobile enterprise social network. 57-66 - Andy Jones, Thomas Anthony Martin:
Digital forensics and the issues of identity. 67-71 - Karen Lawrence Öqvist:
Fool's gold. 72-75
Volume 15, Number 3, August 2010
- John Austen:
Computer crime - A 2011 update. 77-78 - Claire Elliott:
Botnets: To what extent are they a threat to information security? 79-103 - Kim-Kwang Raymond Choo:
High tech criminal threats to the national information infrastructure. 104-111 - Kuheli Roy Sarkar:
Assessing insider threats to information security using technical, behavioural and organisational measures. 112-133 - William Walker:
Mobile telephony security compromises. 134-136
Volume 15, Number 4, November 2010
- André Mariën:
Matchmaking between PCI-DSS and Security. 137 - Georges Ataya:
PCI DSS audit and compliance. 138-144 - Jeff Tutton:
Incident response and compliance: A case study of the recent attacks. 145-149 - Gunnar Peterson:
From auditor-centric to architecture-centric: SDLC for PCI DSS. 150-153 - J. Andrew Valentine:
Compliance complacency: How 'check-box' compliancy remains a pitfall for many organizations worldwide. 154-159 - Branden R. Williams:
How tokenization and encryption can enable PCI DSS compliance. 160-165
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.