The Community for Technology Leaders
Green Image
Issue No. 02 - March/April (vol. 4)
ISSN: 1540-7993
From the Editors
Book Reviews

Internet War Games: Power of the Masses (HTML)

Mikhael Felker , Carnegie Mellon University
pp. 7

News Briefs (HTML)

Brent Kesler , I3P at Dartmouth College
Heather Drinan , I3P at Dartmouth College
Nancy Fontaine , I3P at Dartmouth College
pp. 8-13
Online Banking Security

Case Study: Online Banking Security (Abstract)

Kjell J. Hole , University of Bergen, Norway
Vebj? Moen , University of Bergen, Norway
Thomas Tj?stheim , University of Bergen, Norway
pp. 14-20
Secure Authentication

Secure Internet Banking Authentication (Abstract)

Alain Hiltgen , UBS AG
Thorsten Kramp , IBM Zurich Research Laboratory
Thomas Weigold , IBM Zurich Research Laboratory
pp. 21-29
Identity Theft

A Contextual Framework for Combating Identity Theft (Abstract)

WenJie Wang , Donghua University
Yufei Yuan , McMaster University
Norm Archer , McMaster University
pp. 30-38
Embedded Systems

Securing Embedded Systems (Abstract)

David D. Hwang , University of California, Los Angeles
Patrick Schaumont , University of California, Los Angeles
Kris Tiri , University of California, Los Angeles
Ingrid Verbauwhede , University of California, Los Angeles
pp. 40-49
Systems Security

Applying the Common Criteria in Systems Engineering (Abstract)

Feisal Keblawi , Federal Aviation Administration
Dick Sullivan , Science Applications International Corporation
pp. 50-55
Industry Trends

A Warning to Industry--Fix It or Lose It (Abstract)

Peter Kuper , Morgan Stanley
pp. 56-60

Who Owns Your Computer? (Abstract)

Matt Bishop , University of California, Davis
Deborah A. Frincke , Pacific Northwest National Laboratory
pp. 61-63
Crypto Corner

Randomness in Cryptography (Abstract)

Rosario Gennaro , IBM T.J. Watson Research Center
pp. 64-67
Basic Training

How to Think about Security (Abstract)

James A. Whittaker , Florida Institute of Technology
Richard Ford , Florida Institute of Technology
pp. 68-71
Attack Trends

New Threats and Attacks on the World Wide Web (Abstract)

Thorsten Holz , University of Mannheim, Germany
Simon Marechal , Thales Security Systems
Fr?d?ric Raynal , EADS Corporate Research Center
pp. 72-75
Secure Systems

The End of End-to-End Security? (Abstract)

Scott Bradner , Harvard University
pp. 76-79
Digital Protection
Building Security In
Emerging Standards

Cryptographic Hash Standards: Where Do We Go from Here? (Abstract)

William E. Burr , US National Institute of Standards and Technology
pp. 88-91
87 ms
(Ver 3.3 (11022016))