![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Information Security Technical Report, Volume 8
Volume 8, Number 1, March 2003
- Chez Ciechanowicz:
Introduction. 5 - Keith Mayes, Konstantinos Markantonakis:
Are we smart about security? 6-16 - Konstantinos Markantonakis, Keith Mayes:
An overview of the GlobalPlatform smart card specification. 17-29 - Daniel Page:
Defending against cache-based side-channel attacks. 30-44 - Paul Aebi, Rudolf Oswald:
Secure SIM lifecycle management. 45-54 - Pierre Girard, Jean-Luc Giraud:
Software attacks on smart cards. 55-66 - Wolfgang Rankl:
Overview about attacks on smart cards. 67-84
Volume 8, Number 2, June 2003
- Chez Ciechanowicz:
Introduction. 5 - Forensic analysis on a Lotus Notes server. 6-17
- Addressing the data problem. 18-31
- Computer forensics: past, present and future. 32-36
- Some stepping stones in computer forensics. 37-41
- A comprehensive approach to digital incident investigation. 42-54
- Management strategies for implementing forensic security measures. 55-64
Volume 8, Number 3, July 2003
- Fred Piper, Geraint Price, Kenny Paterson:
Introduction. 5 - Dick Emery, Stephen Upton, Richard Trevorah:
tScheme - voluntary approval for certificate authority services. 23-35 - Semia Jaweed:
Could there ever be a unitary digital certificate? 36-44 - Kenneth G. Paterson, Geraint Price:
A comparison between traditional public key infrastructures and identity-based cryptography. 57-72 - Chris R. Dalton:
The NHS as a proving ground for cryptosystems. 73-88
Volume 8, Number 4, April 2003
- Chez Ciechanowicz:
Introduction. 5 - Glenn Gunara-Chen:
The art of intrusion testing. 6-13 - Andrew Blyth:
An XML-based architecture to perform data integration and data unification in vulnerability assessments. 14-25 - Gerhard Eschelbeck, Michael T. Krieger
:
Eliminating noise from intrusion detection systems. 26-33 - Andy Gray:
An historical perspective of software vulnerability management. 34-44 - Evangelos Morakis, Stilianos Vidalis, Andrew Blyth:
Measuring vulnerabilities and their exploitation cycle. 45-55 - Neil Barrett:
Penetration testing and social engineering: Hacking the weakest link. 56-64 - Paul Midian:
How to ensure an effective penetration test. 65-77 - Stein Mollerhaug:
Useful vulnerability assessment. 78-84
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.