


default search action
Information Security Technical Report, Volume 4
Volume 4, Number 1, 1999
- Chez Ciechanowicz:

Introduction. 1-2 - John Shawe-Taylor, Keith Howker, Peter Burge:

Detection of fraud in mobile telecommunications. 3-15 - John Shawe-Taylor, Keith Howker, Peter Burge:

Detection of fraud in mobile telecommunications. 16-28 - Gert Roelofsen:

Cryptographic algorithms in telecommunications systems. 29-37 - Simon Collins:

How secure are telecoms internetwork communications? 38-41 - Thomas F. Johnston:

Security issues in a satellite global GSM network. 42-52 - Michael Walker:

The direction of telecommunications security. 53-60
Volume 4, Number 2, 1999
- Chez Ciechanowicz:

Introduction. 1 - Mike Paterson:

The chip in your wallet - The technology of security in smartcard chip manufacture. 13-18 - Pierre Girard, Jean-Louis Lanet:

New security issues raised by open cards. 19-27 - Markus Kuhn

, Oliver Kömmerling:
Physical security of smartcards. 28-41 - D. Cherrill, A. Brocklehurst:

Smartcard certfication. 42-50 - Mike Ward:

EMV - The ICC specifications for payment systems. 51-57 - Kenneth R. Ayer:

Mitigating smart card risks. 58-63 - John Beric:

Mondex security strategy. 64-68 - Constantinos Markantonakis:

Interfacing with smartcard applications - (ThOpen Card Framework and PC/SC). 69-77
Volume 4, Number 3, 1999
- Chez Ciechanowicz:

Introduction. 1 - Andy Jones:

Information warfare - what is it? 12-19 - Colin L. Nash, Cathy K. Piggott:

Beyond boundary protection devices - The concept of recovery. 20-27 - Andrew Rathmell:

International CIP policy: Problems and prospects. 28-42 - Andrew Blyth:

Footprinting for intrusion detection and threat assessment. 43-53 - Paul Zavidniak, Anita D'Amico, Dennis McCallam:

Achieving information resiliency. 54-62 - Bill Millar:

Defensive information warfare. 63-69
Volume 4, Number 4, 1999
- Chez Ciechanowicz:

Introduction. 1-2 - Sean Murphy:

The Advanced Encryption Standard (AES). 12-17 - Nick Mansfield:

Designing a practical Public Key Infrastructure (PKI). 18-27 - David Naccache:

Padding attacks on RSA. 28-33 - Peter Landrock:

Challenging the conventional view of PKI - will it really work? 34-39 - Stefek Zaba:

The NSAKEY in microsoft's crypto API: facts, fiction and speculation. 40-46 - Thomas Beth:

The state of public-key cryptography - not only after the invention of quantum computers. 47-52 - Hans Dobbertin:

Secure hashing in practice. 53-62

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














