default search action
Information Security Technical Report, Volume 3
Volume 3, Number 1, 1998
- Chez Ciechanowicz:
Introduction. 1 - Judith A. Markowitz:
Speaker recognition. 14-20 - Lawrence O'Gorman:
An overview of fingerprint verification technologies. 21-32 - John Daugman:
Recognizing people by their iris patterns. 33-39 - Jürgen Pampus, Frank Weber:
Facial recognition - An overview. 40-46 - Eugene Sweeney:
Veincheck - A technical perspective. 47-51 - Michael C. Fairhurst:
New perspectives in automatic signature verification. 52-59 - Bob Carter:
Implementation implications of biometrics. 60-69 - Tony Mansfield, Gavin Kelly:
Measuring and comparing the performance of biometric systems. 70-76 - Marek Rejman-Greene:
Security considerations in the use of biometric devices. 77-80 - Ian Chandler:
Cardholder verification - Realities at point-of-sale. 81-85 - Stephen Thomas:
Will commercial applications for biometric-based solutions really take off in 1998? 86-89 - Simon Davies:
Biometrics - A civil liberties and privacy perspective. 90-94 - Peter Hawkes:
Biometrics and Turing's legacy. 95-97
Volume 3, Number 2, 1998
- Chez Ciechanowicz:
Introduction. 1-2 - Liaquat Khan:
Deploying public key infrastructures. 18-33 - Stefek Zaba:
Tools and protocols for E-commerce. 34-40 - Mark Stirland:
Smartcards in secure Electronic Commerce. 41-54 - Peter Landrock, Torben P. Pedersen:
WYSIWYS? - What you see is what you sign? 55-61 - Dieter Gollmann, Ulrich Lang:
Security in CORBA-based electronic commerce systems. 62-70 - Francis Aldhouse:
Data protection and Electronic Commerce. 71-81 - Constantinos Markantonakis:
Java card technology and security. 82-89 - Keith R. Dennis:
Public key network infrastructure: An evolutionary step in the ascent of WAN. 90-97 - T. Dosdale, C. N. Rasmussen:
EDI security. 98-110
Volume 3, Number 3, 1998
- Chez Ciechanowicz:
Introduction. 1-2 - John Hayday:
Windows NT security architecture. 15-22 - John Hayday:
Windows NT - Remote access. 23-30 - Ian White:
Developing a Windows NT security policy. 31-43 - Simon R. Wiseman:
Adding security labelling to Windows NT. 44-52 - Glenn Pittaway:
Distributed security services in microsoft Windows NT 5.0 - Kerberos and the active directory. 53-64 - Peter Brundrett:
Kerberos authentication in Windows NT 5.0 domains. 65-70
Volume 3, Number 4, 1998
- Chez Ciechanowicz:
Introduction. 1-2 - Phil Venables:
Security monitoring in heterogeneous globally distributed environments. 15-31 - Filip Schepers:
Network-versus host-based intrusion detection. 32-42 - Glenn Pittaway:
Distributed security services in Microsoft Windows 2000 (Windows NT 5.0: Protecting data in the enterprise. 43-52 - Marcus J. Ranum, Kent Landfield, Michael T. Stolarchuk, Mark Sienkiewicz, Andrew Lambeth, Eric Wall:
Implementing a generalized tool for network monitoring. 53-64 - Roy McNamara:
Networks - Where does the real threat lie? 65-74 - Jim Bates:
Fundamentals of computer forensics. 75-78 - Robin Barker, Gavin Kelly:
The Vulnerability Instantiation Methodology prototype. 79-86
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.