Volume 19,
Number 1,
1 January 2000
- Bill Hancock:
Mass Network Flooding Attacks (Distributed Denial of Service - DDoS) Surface in the Wild.
6-7 BibTeX
- Bill Hancock:
Cell Phone Crypto Cracked.
7-8 BibTeX
- Bill Hancock:
Clinton's Proposed Crypto Regulations Under Attack.
8-9 BibTeX
- Bill Hancock:
Overhauling the National Security Agency?
9-10 BibTeX
- Bill Hancock:
Down Under, Hacking Private Computers by the Government is Legal.
10-12 BibTeX
- Bill Hancock:
The "S" in SAP Doesn't Stand for Security.
12-13 BibTeX
- Bill Hancock:
New York Times Fires Employees for Violating Internal E-mail Policies.
12-12 BibTeX
- Bill Hancock:
`Anonymizing' Software Causes Law Enforcement Concerns.
13-14 BibTeX
- Bill Hancock:
Melissa Virus Creator Pleads Guilty.
13-13 BibTeX
- Bill Hancock:
Security Problems Go Mobile In Your Next Car.
14-16 BibTeX
- Bill Hancock:
The L0pht Goes Corporate and becomes @Stake.
16-17 BibTeX
- Chuck Williams, Nevenko Zunic, Stephen M. Matyas, Sarbari Gupta, Michael Willett:
Key Recovery Alliance (KRA) Technology Papers, Special Issue Introduction.
18-20 BibTeX
- Michael Smith, Paul C. van Oorschot, Michael Willett:
Cryptographic Information Recovery Using Key Recover.
21-27 BibTeX
- Michael Willett:
Features, Attributes, Characteristics, and Traits (FACTs) of Key Recovery Schemes/Products.
28-30 BibTeX
- John Kennedy, Stephen M. Matyas, Nevenko Zunic:
Key Recovery Functional Model.
31-36 BibTeX
- Stephen M. Matyas, Nevenko Zunic:
Additional Key Recovery Function.
37-40 BibTeX
- Sarbari Gupta:
A Common Key Recovery Block Format: Promoting Interoperability Between Dissimilar Key Recovery Mechanisms.
41-47 BibTeX
- Chuck Williams, Nevenko Zunic:
Global Interoperability for Key Recovery.
48-55 BibTeX
- Sarbari Gupta, Stephen M. Matyas:
Public Key Infrastructure: Analysis of Existing and Needed Protocols and Object Formats for Key Recovery.
56-68 BibTeX
- Abby Maclean, Stephen M. Matyas, Nevenko Zunic:
Organization Implementation Guidelines for Recovery of Encrypted Information.
69-81 BibTeX
- Nevenko Zunic:
Organization Considerations for Retrieval of Stored Data via Key Recovery Methods.
82-85 BibTeX
- Tom Markham, Chuck Williams:
Key Recovery Header for IPSEC.
86-90 BibTeX
- David M. Balenson, Tom Markham:
ISAKMP Key Recovery Extension.
91-99 BibTeX
- Timothy G. Shoriak:
SSL/TLS Protocol Enablement for Key Recovery.
100-104 BibTeX
Volume 19,
Number 2,
February 2000
Volume 19,
Number 3,
1 March 2000
Volume 19,
Number 4,
1 April 2000
- Bill Hancock:
Suspected Hackers Arrested in Russian Credit-Card Fraud.
296-296 BibTeX
- Bill Hancock:
Intel Eliminates ID from New Chips.
296-297 BibTeX
- Bill Hancock:
European Parliament Doesn't Like Anonymity Online.
297-297 BibTeX
- Bill Hancock:
DOD Finds Plans Online Reserve Unit Assesses Risk.
297-298 BibTeX
- Bill Hancock:
Agencies Are "Own Worst Enemy".
298-298 BibTeX
- Bill Hancock:
US Department of Energy Security Criticized - Again.
298-300 BibTeX
- Bill Hancock:
This is What Happens When You Lose Your Computer With Classified Data On It....
300-301 BibTeX
- Bill Hancock:
Not Everyone Wants PKI NSF Opts for Digital Signature Alternativ.
301-302 BibTeX
- Bill Hancock:
Justice Department Conducting Criminal Probe in Former CIA Director Activities.
302-303 BibTeX
- Bill Hancock:
Apache Site Defaced.
303-305 BibTeX
- Bill Hancock:
US and Europe Cybercrime Agreement Problems.
306-307 BibTeX
- Bill Hancock:
Cyberstalking on the Rise.
307-308 BibTeX
- Bill Hancock:
Large Child Pornography Ring Busted in Texas.
308-309 BibTeX
- Bill Hancock:
New Denial of Service Attack on Internet.
309-310 BibTeX
- Bill Hancock:
US Supreme Court Confirms ISPs Not Liable in E-mail Messages.
310-310 BibTeX
- Bill Hancock:
Software Scam - 17 Indicted.
310-311 BibTeX
- Stephen Hinde:
Smurfing, Swamping, Spamming, Spoofing, Squatting, Slandering, Surfing, Scamming and Other Mischiefs of the World Wide Web.
312-320 BibTeX
- Richard Barber:
Security in a Mobile World Is Bluetooth the Answer?
321-325 BibTeX
- Gerald L. Kovacich:
Netspionage The Global Threat to Information, Part I: What is it and Why I Should Care?
326-336 BibTeX
- Julie D. Nosworthy:
Implementing Information Security In The 21st Century Do You Have the Balancing Factors?
337-347 BibTeX
- Petra van Krugten, Mark Hoogenboom:
B2C Security Be Just Secure Enough.
348-356 BibTeX
- Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic:
Multiparty Biometric-Based Authentication.
369-374 BibTeX
Volume 19,
Number 5,
1 July 200
Volume 19,
Number 6,
August 2000
- Bill Hancock:
A Need for a Network Security Czar.
476-477 BibTeX
- Bill Hancock:
US Government Fighting for Expanded Wiretap Laws.
477-477 BibTeX
- Bill Hancock:
E-Commerce Paranoia: Flaws in Code.
477-479 BibTeX
- Bill Hancock:
Truly Certified: Security Certifications Updat.
479-480 BibTeX
- Bill Hancock:
Digital Certificates Get Creative.
480-487 BibTeX
- Bill Hancock:
Health Care Security: A Hard Look at a Growing Problem.
482-482 BibTeX
- Bill Hancock:
Safeway UK's Website Shut Down.
483-483 BibTeX
- Bill Hancock:
Philippine Government Creates Incident Response Team.
483-483 BibTeX
- Bill Hancock:
DDoS Defence Gets Regulatory.
483-485 BibTeX
- Bill Hancock:
Visa's Ten Commandments for E-Security Online.
485-486 BibTeX
- Bill Hancock:
`Porngate'?
486-487 BibTeX
- Bill Hancock:
What You Sell Online in France Could Be Restricted....
487-487 BibTeX
- Bill Hancock:
Hackers Still Love to Attack the Pentago.
488-488 BibTeX
- Bill Hancock:
Spying At Home: A New Pastime to Detect Online Romanc.
488-491 BibTeX
- Bill Hancock:
Is a Convicted Hacker Really Reformed and Should You Hire Them?
491-493 BibTeX
- Bill Hancock:
DefCon Recruiting JamFest.
493-494 BibTeX
- Bill Hancock:
Hacker Target: Mobile Phones.
494-495 BibTeX
- Bill Hancock:
E-Mail Privacy Issues Escalate.
495-495 BibTeX
- Bill Hancock:
GeoCities Ordered to Report on Information Poste.
495-496 BibTeX
- Bill Hancock:
Hackers Breach Firewall.
496-497 BibTeX
- Bill Hancock:
Lotus Domino Holes Up.
497-498 BibTeX
- Stephen Hinde:
Fireworks, Beer and Old Halfpennies - The Risks of Assumption.
499-504 BibTeX
- Gerald L. Kovacich:
Netspionage - Part III: The Black Zone, Who Uses Netspionage, How and Why.
505-519 BibTeX
- Fred Cohen:
A Mathematical Structure of Simple Defensive Network Deception.
520-528 BibTeX
- Steven Furnell, Paul Dowland, H. M. Illingworth, Paul L. Reynolds:
Authentication and Supervision: A Survey of User Attitudes.
529-539 BibTeX
- Mohammad Peyravian, Stephen M. Matyas, Allen Roginsky, Nevenko Zunic:
Ticket and Challenge-Based Protocols for Timestamping.
551-558 BibTeX
- Andres Torrubia, Francisco J. Mora:
Information Security in Multiprocessor Systems Based on the X86 Architecture.
559-563 BibTeX
Volume 19,
Number 7,
1 November 2000
Volume 19,
Number 8,
1 December 2000
Copyright © Sat May 16 23:53:40 2009
by Michael Ley (ley@uni-trier.de)