default search action
Information Security Technical Report, Volume 11
Volume 11, Number 1, 2006
- Chez Ciechanowicz:
Editorial. 1 - Chris Sundt:
Information security and the law. 2-9 - Ian Walden:
Communication service providers: Forensic source and investigatory tool. 10-17 - Stefek Zaba:
Digital signature legislation: The first 10 years. 18-25 - J. Stuart Broderick:
ISMS, security standards and security regulations. 26-31 - Phil Pinder:
Preparing Information Security for legal and regulatory compliance (Sarbanes-Oxley and Basel II). 32-38 - Richard Walton:
The Computer Misuse Act. 39-45 - Andrew Charlesworth:
The future of UK data protection regulation. 46-54 - Gary Hardy:
Using IT governance and COBIT to deliver value with IT and respond to legal, regulatory and compliance challenges. 55-61 - David Lacey:
A new institute for a new millennium. 62-65
Volume 11, Number 2, 2006
- Michael J. Ganley:
Introduction - Cryptography. 67 - Richard Walton:
Cryptography and trust. 68-71 - Kenneth G. Paterson:
A cryptographic tour of the IPsec standards. 72-81 - Matthew J. B. Robshaw:
An overview of RFID tags and new cryptographic developments. 82-88 - Michael Ward:
EMV card payments - An update. 89-92 - Mike Bond, Jolyon Clulow:
Integrity of intention (a theory of types for security APIs). 93-99 - Carlos Cid:
Recent developments in cryptographic hash functions: Security implications and future directions. 100-107
Volume 11, Number 3, 2006
- Scarlet Schwiderski-Grosche:
Security: An end user perspective. 109-110 - Otto Bernecker:
Biometrics: security: An end user perspective. 111-118 - Katrin Borcea-Pfitzmann, Marit Hansen, Katja Liesebach, Andreas Pfitzmann, Sandra Steinbrecher:
What user-controlled identity management should learn from communities. 119-128 - Brian Berger:
Security standards: An end-user perspective. 129-136 - Tim Wright:
Security considerations for broadcast systems. 137-146 - Keith Mayes, Konstantinos Markantonakis:
On the potential of high density smart cards. 147-153 - Jens Rüdinger:
The complexity of DPA type side channel attacks and their dependency on the algorithm design. 154-158
Volume 11, Number 4, 2006
- Geraint Price:
Editorial for v.11 n.4 of the Information Security Technical Report: "Windows Security Revisited". 159 - Stephen D. Wolthusen:
Windows device interface security. 160-165 - A. A. Abimbola, J. M. Munoz, William J. Buchanan:
NetHost-sensor: Monitoring a target host's application via system calls. 166-175 - I. Phillips:
Windows Vista security: First impressions. 176-185 - Brian A. LaMacchia, John Manferdelli:
New Vistas in elliptic curve cryptography. 186-192 - Paul England, John Manferdelli:
Virtual machines for enterprise desktop security. 193-202
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.