scispace - formally typeset
Search or ask a question

Showing papers in "Computers & Security in 1998"




Journal ArticleDOI
TL;DR: It is shown that distributed-object technology is an enabling technology for intelligent trade agents that are able to roam a network, collect and analyze data from servers on the network and make decisions to buy and sell goods on behalf of a user.

26 citations


Journal ArticleDOI
TL;DR: This paper considers two problems: one of evaluating the probability of no collision at all and one of finding a bound for the probabilities of a collision with a particular hash value.

22 citations



Journal ArticleDOI
TL;DR: If problems of a legal nature are not adequately addressed in the future, the Internet may find its maturation stifled.

20 citations


Journal ArticleDOI
TL;DR: By analysing a communication in real time, it is possible to detect attacks as they are being launched, by analysing the characteristics of the protocol being used and determining the risk values for the components.

18 citations


Journal ArticleDOI
TL;DR: For a modulo reduction scheme in RNS a set of restricted base values is proposed, targeted to optimise themodulo reduction operation on the RNS digit level.

18 citations


Journal ArticleDOI
TL;DR: Emphasis is put on how the difficulties could be exploited by the virus writers and how the anti-virus products should be improved in order to be made resistant to such attacks and to avoid damaging the user's documents when misidentifying the virus in it and attempting to remove the wrong virus variant.

17 citations


Journal ArticleDOI
TL;DR: A data mixing method for encrypting a plaintext block using a block encryption algorithm (such as Elliptic Curve, RSA, etc.) having a block size smaller than that of the Plaintext block is described.

16 citations




Journal ArticleDOI
TL;DR: The shock of a virus episode is needed to force management to commit and allocate the funds to prevent further attacks, and current users are satisfied with their anti-virus software.

Journal ArticleDOI
TL;DR: The major contribution of the paper is in alerting EDI users/practitioners and implementors of a sense of awareness in the trust issues that impact EDI risks.

Journal ArticleDOI
TL;DR: In this article, the authors present the main results of a survey held by de Vrije Universiteit and KPMG EDP Auditors concerning Internet-related security incidents.

Journal ArticleDOI
TL;DR: The US Department of Commerce's first report on the 'Emerging Digital Economy' (E-Commerce to you and me) found that online sales in 1997 exceeded $3.2 billion and could surpass $300 billion by the end of 2002 as more companies go online to conduct business over the Internet.




Journal ArticleDOI
TL;DR: A clinical trial of CIMAvax, the therapeutic lung cancer vaccine developed at Cuba's Molecular Immunology Center, is launched, surely a win-win for the citizens of both countries.

Journal ArticleDOI
TL;DR: Information Security is a young discipline only about one generation in human terms, but about ten or so generations in technological terms according to Moore's Law; bidirectional information flow is a fundamental requirement for modern enterprises today.


Journal ArticleDOI
TL;DR: A new document protection scheme, called Confused Document Encrypting Scheme (CDES), which owns the cheating function, and an unauthorized person cannot know whether the message he receives is the real or the cheating one.



Journal ArticleDOI
TL;DR: Network firewalls have been in existence for a relatively short time, yet during this period the demands made of them have dramatically changed, and their core technology and architecture changed as well.

Journal ArticleDOI
TL;DR: A statistical method will be applied to estimate the entropy of a key generator for a symmetric cipher in the case where the algorithm used to generate the key is unknown, and only the actual keys are required.

Journal ArticleDOI
TL;DR: It is a truism, that even the best of Internet security policies and measures will not suffice to eliminate all potential legal exposures that employers face from employee abuses connected to the Internet.


Journal ArticleDOI
TL;DR: The Internet security problem is examined, and the Internet risks being faced by companies are illustrated via a case study of a large Australian travel organization.