default search action
Information Security Technical Report, Volume 5
Volume 5, Number 1, January 2000
- Tony Mason:
Platform Security and Common Criteria. 14-25 - Roger R. Schell, Michael F. Thompson:
Platform Security: What is Lacking? 26-41 - Tim D. Stone, David Miller:
High Security Modules - Still Needed Despite Advances in Platforms. 42-47 - Nicholas Bohm:
How Strong do Platforms Need to be From a Legal Perspective? 48-53 - Boris Balacheff, Liqun Chen, Siani Pearson, Graeme Proudler, David Chan:
Computing Platform Security in Cyberspace. 54-63 - Ivan Phillips:
Windows 2000 Security: A Balanced View. 64-82
Volume 5, Number 2, June 2000
- Chez Ciechanowicz:
Introduction. 1 - T. J. Bates:
Computer Evidence - Recent Issues. 15-22 - Peter Yapp:
Who's Bugging You? How Are You Protecting Your Information? 23-33 - Vincent Blake:
PABX Security. 34-42 - Simon Janes:
The Role of Technology in Computer Forensic Investigations. 43-50 - Malcolm Highfield:
The Computer Misuse Act 1990: Understanding and Applying the Law. 51-59 - Tad Dippel:
IT as an Enabler of Computer Fraud. 60-70
Volume 5, Number 3, September 2000
- Chez Ciechanowicz:
Introduction. 1 - Rudy Bakalov:
Introduction to WAP's Wireless Transport Layer Security. 15-22 - Stephen Farrell:
The WAP Forum's Wireless Public Key Infrastructure. 23-31 - Joakim Persson, Ben J. M. Smeets:
Bluetooth Security - An Overview. 32-43 - Gert Roelofsen:
TETRA Security. 44-54 - Colin Blanchard:
Security for the Third Generation (3G) Mobile System. 55-65 - Steve Babbage:
Design of Security Algorithms for Third Generation Mobile Telephony. 66-73 - Scott Cadzow:
Security Concerns in IP-Based Telephony: Covering TIPHON as a Case Study. 74-82
Volume 5, Number 4, December 2000
- Chez Ciechanowicz:
Introduction. 1-2 - Chris J. Mitchell:
PKI standards. 17-32 - Robert Bickmore:
Implementing a PKI. 33-38 - Robert Carolina, Jamie Lyford, Tarlo Lyons:
The Intersection of Public Key Infrastructures and the Law. 39-52 - Chris Sundt:
PKI - Panacea or Silver Bullet? 53-65 - Steve Matthews:
Authorization Models - PKI Versus the Real World. 66-71 - Vivike Sedov:
Certificate Classes. 72-80 - John Bullard:
Achieving Certainty in an Age of Uncertainty. 81-83 - Mark Stirland:
Identrus - the 'Technical Platform'. 84-89
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.