default search action
IEEE Security & Privacy, Volume 4
Volume 4, Number 1, January/February 2006
- George Cybenko:
Why Johnny Can't Evaluate Security Risk. 5
- Whitfield Diffie:
Chattering about SIGINT. 9
- Laurianne McLaughlin:
Philip Zimmermann on What's Next after PGP. 10-13
- Heather Drinan, Nancy Fontaine, Brent Kesler:
News Briefs. 14-16
- Edward W. Felten, J. Alex Halderman:
Digital Rights Management, Spyware, and Security. 18-23
- John G. Levine, Julian B. Grizzard, Henry L. Owen:
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection. 24-32
- Nir Kshetri:
The Simple Economics of Cybercrimes. 33-39
- Steven Cheung:
Denial of Service against the Domain Name System. 40-45
- John Black, Martin Cochran, Ryan W. Gardner:
A Security Analysis of the Internet Chess Club. 46-52
- Christian Rechberger, Vincent Rijmen, Nicolas Sklavos:
The NIST Cryptographic Workshop on Hash Functions. 54-56
- Timothy Rosenberg, Lance J. Hoffman:
Taking Networks on the Road: Portable Solutions for Security Educators. 57-60
- Virgil D. Gligor, Thomas Haigh, Dick Kemmerer, Carl E. Landwehr, Steven B. Lipner, John D. McLean:
Information Assurance Technology Forecast 2005. 62-69
- Jean-Sébastien Coron:
What Is Cryptography? 70-73
- Robert C. Seacord:
Secure Coding in C and C++: Of Strings and Integers. 74-76
- Dragos Ruiu:
Learning from Information Security History. 77-79
- Jeremy Epstein, Scott R. Matsumoto, Gary McGraw:
Software Security and SOA: Danger, Will Robinson! 80-83
- Ramaswamy Chandramouli, Scott Rose:
Challenges in Securing the Domain Name System. 84-87
- Steven M. Bellovin:
Unconventional Wisdom. 88
Volume 4, Number 2, March/April 2006
- Marc Donner:
The Impending Debate. 4-5
- Mikhael Felker:
Internet War Games: Power of the Masses. 7
- Brent Kesler, Heather Drinan, Nancy Fontaine:
News Briefs. 8-13
- Kjell Jørgen Hole, Vebjørn Moen, Thomas Tjøstheim:
Case Study: Online Banking Security. 14-20
- Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold:
Secure Internet Banking Authentication. 21-29
- Wenjie Wang, Yufei Yuan, Norman P. Archer:
A Contextual Framework for Combating Identity Theft. 30-38
- David Hwang, Patrick Schaumont, Kris Tiri, Ingrid Verbauwhede:
Securing Embedded Systems. 40-49
- Feisal Keblawi, Dick Sullivan:
Applying the Common Criteria in Systems Engineering. 50-55
- Peter Kuper:
A Warning to Industry--Fix It or Lose It. 56-60
- Matt Bishop, Deborah A. Frincke:
Who Owns Your Computer? 61-63
- Rosario Gennaro:
Randomness in Cryptography. 64-67
- James A. Whittaker, Richard Ford:
How to Think about Security. 68-71
- Thorsten Holz, Simon Marechal, Frédéric Raynal:
New Threats and Attacks on the World Wide Web. 72-75
- Scott O. Bradner:
The End of End-to-End Security? 76-79
- Michael E. Lesk:
Should Indexing Be Fair Use? The Battle over Google Book Search. 80-83
- John Steven:
Adopting an Enterprise Software Security Framework. 84-87
- William E. Burr:
Cryptographic Hash Standards: Where Do We Go from Here? 88-91
Volume 4, Number 3, May/June 2006
- Fred B. Schneider:
Here Be Dragons. 3 - Shari Lawrence Pfleeger:
Everything You Wanted to Know about Privacy (But Were Afraid to Ask). 5 - Brent Kesler, Heather Drinan:
News Briefs. 6-10 - Gary McGraw:
Silver Bullet Speaks to Avi Rubin. 11-13 - James X. Dempsey, Ira Rubinstein:
Guest Editors' Introduction: Lawyers and Technologists--Joined at the Hip? 15-19 - Patricia L. Bellia:
The fourth amendment and emerging communications technologies. 20-28 - Albert Gidari:
Designing the right wiretap solution: setting standards under CALEA. 29-36 - Erin Egan, Tim Jucovy:
Building a better filter how to create a safer Internet and avoid the litigation trap. 37-44 - Charles D. Curran:
Combating spam, spyware, and other desktop intrusions: legal considerations in operating trusted intermediary technologies. 45-51 - Gregory P. Schaffer:
Worms and viruses and botnets, oh my! Rational responses to emerging Internet threats. 52-58 - Pinny Sheoran, Oris Friesen, Barbara J. Huffman de Belón:
Developing and sustaining information assurance: the role of community colleges. Part 2. 60-65 - Robin E. Bloomfield, Sofia Guerra, Ann Miller, Marcelo Masera, Charles B. Weinstock:
International Working Group on Assurance Cases (for Security). 66-68 - Kenneth G. Paterson, Arnold K. L. Yau:
Lost in translation: theory and practice in cryptography. 69-72 - Tuomas Aura:
Why you shouldn't study security [security education]. 74-76 - Martin R. Stytz, Sheila B. Banks:
Dynamic software security testing. 77-79 - Pravir Chandra, Brian Chess, John Steven:
Putting the tools to work: how to succeed with source code analysis. 80-83 - Anne Anderson:
Web services policies. 84-87 - Daniel E. Geer Jr.:
Convergence. 88-88
Volume 4, Number 4, July/August 2006
- Carl E. Landwehr:
Speaking of Privacy. 4-5 - Brent Kesler, Heather Drinan:
News Briefs. 6-8 - Charles P. Pfleeger, Shari Lawrence Pfleeger:
Why We Won't Review Books by Hackers. 9-9 - Gary McGraw:
Silver Bullet Speaks with Dan Geer. 10-13 - Mike Andrews:
Guest Editor's Introduction: The State of Web Security. 14-15 - J. D. Meier:
Web application security engineering. 16-24 - John Viega, Jeremy Epstein:
Why applying standards to Web services is not enough. 25-31 - Mark Curphey, Rudolph Arawo:
Web application security assessment tools. 32-41 - Denis Verdon:
Security policies and the software developer. 42-49 - Richard R. Brooks, Christopher N. Vutsinas:
Kafka in the academy: a note on ethics in IA education. 50-53 - Paulo Veríssimo, Nuno Ferreira Neves, Christian Cachin, Jonathan A. Poritz, David Powell, Yves Deswarte, Robert J. Stroud, Ian Welch:
Intrusion-tolerant middleware: the road to automatic security. 54-62 - Roland L. Trope, E. Michael Power:
Lessons for laptops from the 18th century. 64-68 - Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum:
RFID malware: truth vs. myth. 70-72 - Michael A. Howard:
A process for performing security code reviews. 74-79 - Iván Arce:
Voices, I hear voices [VoIP security]. 80-83 - Jonathan Herzog:
Applying protocol analysis to security device interfaces. 84-87 - Gunnar Peterson:
Introduction to identity management risk metrics. 88-91 - Jim Robbins, John T. Sabo:
Managing information privacy: developing a context for security and privacy standards convergence. 92-95 - Steven M. Bellovin:
On the Brittleness of Software and the Infeasibility of Security Metrics. 96-96
Volume 4, Number 5, September/October 2006
- Marc Donner:
Insecurity through Obscurity. 4 - Geraldine MacDonald:
Cross-Border Transaction Liability. 7 - Brandi Ortega:
News Briefs. 8-10 - Gary McGraw:
Interview: Silver Bullet Speaks to Marcus Ranum. 11-14 - Matthew Geiger, Lorrie Faith Cranor:
Scrubbing Stubborn Data: An Evaluation of Counter-Forensic Privacy Tools. 16-25 - Robert Thibadeau:
Trusted Computing for Disk Drives and Other Peripherals. 26-33 - Peng Shaunghe, Han Zhen:
Enhancing PC Security with a U-Key. 34-39 - Grant A. Jacoby, Randy C. Marchany, Nathaniel J. Davis IV:
Using Battery Constraints within Mobile Hosts to Improve Network Security. 40-49 - Brian Randell, Peter Y. A. Ryan:
Voting Technologies and Trust. 50-56 - Stephen A. Weis:
Privacy Enhancing Technologies. 59-59 - Jill Slay, Benjamin P. Turnbull:
Computer Security Education and Research in Australia. 60-63 - Luther Martin:
Fitting Square Pegs into Round Holes. 64-66 - Sarah Gordon:
Understanding the Adversary: Virus Writers and Beyond. 67-70 - Elias Levy:
Worst-Case Scenario. 71-73 - Roland L. Trope:
Immaterial Transfers with Material Consequences. 74-78 - Kenneth R. van Wyk, John Steven:
Essential Factors for Successful Software Security Awareness Training. 80-83 - Doug Montgomery, Sandra Murphy:
Toward Secure Routing Infrastructures. 84-87 - Bruce Schneier:
University Networks and Data Security. 88-88
Volume 4, Number 6, November/December 2006
- George Cybenko:
Weak Links, Strong Ties. 3 - Eugene H. Spafford:
Desert Island Books. 5 - Brandi Ortega:
News. 6-9 - Gary McGraw:
Silver Bullet Speaks with Ed Felten. 10-13 - Simson L. Garfinkel, Michael D. Smith:
Guest Editors' Introduction: Data Surveillance. 15-17 - Robert L. Popp, J. C. Poindexter:
Countering Terrorism through Information and Privacy Protection Technologies. 18-27 - Jeff Jonas:
Threat and Fraud Intelligence, Las Vegas Style. 28-34 - David J. Chaboya, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins:
Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion. 36-43 - Vincent C. S. Lee, Linyi Shao:
Estimating Potential IT Security Losses: An Alternative Quantitative Approach. 44-52 - Janice Y. Tsai, Serge Egelman:
Soups 2006. 53-55 - Bradley S. Rubin, Donald Cheung:
Computer Security Education and Research: Handle with Care. 56-59 - Phillip A. Porras:
Privacy-Enabled Global Threat Monitoring. 60-63 - John P. Tomaszewski:
Are You Sure You Had a Privacy Incident? 64-66 - Vanessa Gratzer, David Naccache:
Cryptography, Law Enforcement, and Mobile Communications. 67-70 - David Ladd:
A Software Procurement and Security Primer. 71-73 - Laree Kiely, Terry V. Benzel:
Systemic Security Management. 74-77 - William Suchan, Edward Sobiesk:
Strengthening the Weakest Link in Digital Protection. 78-80 - Gunnar Peterson, John Steven:
Defining Misuse within the Development Process. 81-84 - Peter Mell, Karen Scarfone, Sasha Romanosky:
Common Vulnerability Scoring System. 85-89 - Daniel E. Geer Jr.:
Evidently Evidentiary. 96
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.