Volume 22,
Number 1,
January 2003
Volume 22,
Number 2,
February 2003
Volume 22,
Number 3,
April 2003
- From the editor-in-chief: Virus and worm trends.
174-175
Electronic Edition (link) BibTeX
- E. Eugene Schultz:
Security views.
176-187
Electronic Edition (link) BibTeX
- Stephen Hinde:
Cyber-terrorism in context.
188-192
Electronic Edition (link) BibTeX
- Hank Wolfe:
Evidence acquisition.
193-195
Electronic Edition (link) BibTeX
- Hassan Aljifri, Diego Sánchez Navarro:
International legal aspects of cryptography: Understanding cryptography.
196-203
Electronic Edition (link) BibTeX
- Rolf Moulton, Robert S. Coles:
A contest to evaluate IT security services management.
204-206
Electronic Edition (link) BibTeX
- Chris Pounder:
Governments act to improve security.
207-211
Electronic Edition (link) BibTeX
- Seny Kamara, Sonia Fahmy, E. Eugene Schultz, Florian Kerschbaum, Michael Frantzen:
Analysis of vulnerabilities in Internet firewalls.
214-232
Electronic Edition (link) BibTeX
- Helen van de Haar, Rossouw von Solms:
A model for deriving information security control attribute profiles.
233-244
Electronic Edition (link) BibTeX
- Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang:
Generalization of proxy signature-based on discrete logarithms.
245-255
Electronic Edition (link) BibTeX
- Phillip J. Brooke, Richard F. Paige:
Fault trees for security system design and analysis.
256-264
Electronic Edition (link) BibTeX
Volume 22,
Number 4,
May 2003
Volume 22,
Number 5,
July 2003
Volume 22,
Number 6,
September 2003
- From the editor-in-chief: Gartner's prediction concerning intrusion detection systems: sense or nonsense?
462-463
Electronic Edition (link) BibTeX
- E. Eugene Schultz:
Security views: Online piracy battle heats up in US.
464-473
Electronic Edition (link) BibTeX
- Stephen Hinde:
Spam: the evolution of a nuisance.
474-478
Electronic Edition (link) BibTeX
- Presenting the Evidence Report: Introduction.
479-481
Electronic Edition (link) BibTeX
- John Leach:
Security engineering and security RoI.
482-486
Electronic Edition (link) BibTeX
- Robert S. Coles, Rolf Moulton:
Operationalizing IT Risk Management.
487-493
Electronic Edition (link) BibTeX
- Andrew Blyth, Daniel Cunliffe, Iain Sutherland:
Security analysis of XML usage and XML parsing.
494-505
Electronic Edition (link) BibTeX
- Christopher Kelly, Chris Nelms:
Roadmap to checking data migration.
506-510
Electronic Edition (link) BibTeX
- Elisa Bertino:
RBAC models - concepts and trends.
511-514
Electronic Edition (link) BibTeX
- Brian McKenna:
Web services set to provoke new sthreats: Preview of Compsec 2003, 30 Oct-1 Nov, Queen Elizabeth II Conference Centre, Westminster, London, UK.
515-516
Electronic Edition (link) BibTeX
- Hung-Yu Chien, Jinn-ke Jan:
New hierarchical assignment without Public Key cryptography.
523-526
Electronic Edition (link) BibTeX
- Tzer-Shyong Chen, Yu-Fang Chung, Gwo-Shiuan Huang:
Efficient proxy multisignature schemes based on the elliptic curve cryptosystem.
527-534
Electronic Edition (link) BibTeX
- Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun:
Security middleware for enhancing interoperability of Public Key Infrastructure.
535-546
Electronic Edition (link) BibTeX
- Shyi-Tsong Wu, Bin-Chang Chieu:
A user friendly remote authentication scheme with smart cards.
547-550
Electronic Edition (link) BibTeX
Volume 22,
Number 7,
October 2003
- E. Eugene Schultz:
Patching Pandemonium.
556-558
Electronic Edition (link) BibTeX
- Security Views.
559-569
Electronic Edition (link) BibTeX
- Stephen Hinde:
Nimbyism, dominoes and creaking infrastructure.
570-576
Electronic Edition (link) BibTeX
- Hank Wolfe:
Forensic evidence testimony - some thoughts.
577-579
Electronic Edition (link) BibTeX
- Rolf Moulton, Robert S. Coles:
Applying information security governance.
580-584
Electronic Edition (link) BibTeX
- Nicolas Sklavos, Odysseas G. Koufopavlou:
Data dependent rotations, a trustworthy approach for future encryption systems/ciphers: low cost and high performance.
585-588
Electronic Edition (link) BibTeX
- Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang:
Security enhancement for the timestamp-based password authentication scheme using smart cards.
591-595
Electronic Edition (link) BibTeX
- Sang Hyun Oh, Won Suk Lee:
An anomaly intrusion detection method by clustering normal user behavior.
596-612
Electronic Edition (link) BibTeX
- Sang-Jun Han, Sung-Bae Cho:
Detecting intrusion with rule-based integration of multiple models.
613-623
Electronic Edition (link) BibTeX
- Harold W. Thimbleby:
The reduced Enigma.
624-642
Electronic Edition (link) BibTeX
- Bin Wang, Jian-Hua Li, Zhi-Peng Tong:
Cryptanalysis of an enhanced timestamp-based password authentication scheme.
643-645
Electronic Edition (link) BibTeX
Volume 22,
Number 8,
December 2003
Copyright © Sat May 16 23:53:40 2009
by Michael Ley (ley@uni-trier.de)