Title | Authors | page |
---|---|---|
Deficiencies of the Traditional Approach to Information Security and the Requirements for a New Methodology | Jean Hitchings | 377~384 |
Dynamic Authentication for Smartcards | Dr. John Leach | 385~390 |
Technologically Enabled Crime: Shifting Paradigms for the Year 2000 | Sarah Gordon | 391~404 |
Design of a network for recognition and classification of computer viruses | Doumas, Mavroudakis, Gritzalis and Katsikas | 435~448 |
RAMeX: a prototype expert system for computer security risk analysis and management | Muninder Kailay and Peter Jarratt | 449~464 |
Applications of smartcards for anonymous and verifiable databases | Thomas Hardjono and Jennifer Seberry | 465~472 |