default search action
Information Security Technical Report, Volume 4
Volume 4, Number 1, 1999
- Chez Ciechanowicz:
Introduction. 1-2 - John Shawe-Taylor, Keith Howker, Peter Burge:
Detection of fraud in mobile telecommunications. 3-15 - John Shawe-Taylor, Keith Howker, Peter Burge:
Detection of fraud in mobile telecommunications. 16-28 - Gert Roelofsen:
Cryptographic algorithms in telecommunications systems. 29-37 - Simon Collins:
How secure are telecoms internetwork communications? 38-41 - Thomas F. Johnston:
Security issues in a satellite global GSM network. 42-52 - Michael Walker:
The direction of telecommunications security. 53-60
Volume 4, Number 2, 1999
- Chez Ciechanowicz:
Introduction. 1 - Mike Paterson:
The chip in your wallet - The technology of security in smartcard chip manufacture. 13-18 - Pierre Girard, Jean-Louis Lanet:
New security issues raised by open cards. 19-27 - Markus Kuhn, Oliver Kömmerling:
Physical security of smartcards. 28-41 - D. Cherrill, A. Brocklehurst:
Smartcard certfication. 42-50 - Mike Ward:
EMV - The ICC specifications for payment systems. 51-57 - Kenneth R. Ayer:
Mitigating smart card risks. 58-63 - John Beric:
Mondex security strategy. 64-68 - Constantinos Markantonakis:
Interfacing with smartcard applications - (ThOpen Card Framework and PC/SC). 69-77
Volume 4, Number 3, 1999
- Chez Ciechanowicz:
Introduction. 1 - Andy Jones:
Information warfare - what is it? 12-19 - Colin L. Nash, Cathy K. Piggott:
Beyond boundary protection devices - The concept of recovery. 20-27 - Andrew Rathmell:
International CIP policy: Problems and prospects. 28-42 - Andrew Blyth:
Footprinting for intrusion detection and threat assessment. 43-53 - Paul Zavidniak, Anita D'Amico, Dennis McCallam:
Achieving information resiliency. 54-62 - Bill Millar:
Defensive information warfare. 63-69
Volume 4, Number 4, 1999
- Chez Ciechanowicz:
Introduction. 1-2 - Sean Murphy:
The Advanced Encryption Standard (AES). 12-17 - Nick Mansfield:
Designing a practical Public Key Infrastructure (PKI). 18-27 - David Naccache:
Padding attacks on RSA. 28-33 - Peter Landrock:
Challenging the conventional view of PKI - will it really work? 34-39 - Stefek Zaba:
The NSAKEY in microsoft's crypto API: facts, fiction and speculation. 40-46 - Thomas Beth:
The state of public-key cryptography - not only after the invention of quantum computers. 47-52 - Hans Dobbertin:
Secure hashing in practice. 53-62
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.