default search action
IEEE Security & Privacy, Volume 2
Volume 2, Number 1, January-February 2004
- Fred B. Schneider:
From the Editors: The Next Digital Divide. 5 - Reviewer Thanks. 6
- Letters to the Editors. 7-9
- Charles C. Palmer:
Can We Win the Security Game? 10-12
- Greg Goth, Pam Frost Gorder, Scott L. Andresen:
News. 14-19
- Martin R. Stytz:
Book Reviews. 20-21
- David L. Dill, Aviel D. Rubin:
Guest Editors' Introduction: E-Voting Security. 22-23 - David Evans, Nathanael Paul:
Election Security: Perception and Reality. 24-31 - Jonathan Bannet, David W. Price, Algis Rudys, Justin Singer, Dan S. Wallach:
Hack-a-Vote: Security Issues with Electronic Voting Systems. 32-37 - David Chaum:
Secret-Ballot Receipts: True Voter-Verifiable Elections. 38-47
- Nicolas Sklavos, Nick A. Moldovyan, Vladimir Gorodetsky, Odysseas G. Koufopavlou:
Computer Network Security: Report from MMM-ACNS. 49-52
- Marc Donner:
Die Gedanken Sind Frei. 53-55
- Michael R. Grimaila:
Maximizing Business Information Security's Educational Value. 56-60
- Michael Lesk:
Micropayments: An Idea Whose Time Has Passed Twice? 61-63
- Jim Hearn:
Does the Common Criteria Paradigm Have a Future? 64-65
- Iván Arce:
More Bang For the Bug: An Account of 2003's Attack Trends. 66-68
- Sean W. Smith, Eugene H. Spafford:
Grand Challenges in Information Security: Process and Output. 69-71
- Martin R. Stytz:
Considering Defense in Depth for Software Applications. 72-75
- Neal Krawetz:
Anti-Honeypot Technology. 76-79
- Michael A. Caloyannides:
Online Monitoring: Security or Social Control? 81-83
- Bruce Schneier:
Voting Security and Technology. 84
Volume 2, Number 2, March-April 2004
- George Cybenko:
From the Editors: Don't Bring a Knife to a Gunfight. 5
- Letters to the Editor. 6-7
- Martin R. Stytz:
Book Reviews. 8
- Greg Goth, Benjamin Alfonsi, Scott L. Andresen:
News. 9-15
- Kanta Jiwnani, Marvin V. Zelkowitz:
Susceptibility Matrix: A New Aid to Software Auditing. 16-21 - Simon D. Byers:
Information Leakage Caused by Hidden Data in Published Documents. 23-27 - Marco Gruteser, Xuan Liu:
Protecting Privacy in Continuous Location-Tracking Applications. 28-34 - Annie I. Antón, Julia Brande Earp, Qingfeng He, William H. Stufflebeam, Davide Bolchini, Carlos Jensen:
Financial Privacy Policies and the Need for Standardization. 36-45
- Ashish Popli:
ACM Computer and Communication Security Conference. 46-47 - Stephen A. Weis:
RFID Privacy Workshop: Concerns, Consensus, and Questions. 48-50
- Marc Donner:
Hacking the Best-Seller List. 51-53
- Matt Bishop, Deborah A. Frincke:
Teaching Robust Programming. 54-57
- Jeffery E. Payne:
Regulation and Information Security: Can Y2K Lessons Help Us? 58-61
- Michael Lesk:
Shedding Light on Creativity: The History of Photography. 62-64
- Elias Levy:
Criminals Become Tech Savvy. 65-68
- Peter C. Wayner:
The Power of Candy-Coated Bits. 69-72
- Roland L. Trope:
A Warranty of Cyberworthiness. 73-76
- George Chamales:
The Honeywall CD-ROM. 77-79
- Gary McGraw:
Software Security. 80-83
- Michael A. Caloyannides:
The Cost of Convenience: A Faustian Deal. 84-87
Volume 2, Number 3, May-June 2004
- Marc Donner:
From the Editors: Whose Data Are These, Anyway? 5-6
- Shari Lawrence Pfleeger:
Book Reviews. 7
- Letters to the Editor. 8-9
- Greg Goth, Scott L. Andresen:
News: Richard Clarke Talks Cybersecurity and JELL-O. 11-17
- Noopur Davis, Watts S. Humphrey, Samuel T. Redwine Jr., Gerlinde Zibulski, Gary McGraw:
Processes for Producing Secure Software: Summary of US National Cybersecurity Summit Subgroup Report. 18-25
- William A. Arbaugh:
Guest Editor's Introduction: Wired on Wireless. 26-27 - Yih-Chun Hu, Adrian Perrig:
A Survey of Secure Wireless Ad Hoc Routing. 28-39 - David Johnston, Jesse Walker:
Overview of IEEE 802.16 Security. 40-48 - Jean-Pierre Hubaux, Srdjan Capkun, Jun Luo:
The Security and Privacy of Smart Vehicles. 49-55 - Joel W. Branch, Nick L. Petroni Jr., Leendert van Doorn, David Safford:
Autonomic 802.11 Wireless LAN Security Auditing. 56-65
- Marc Donner:
Cult Classics. 66-68
- Deborah A. Frincke, Matt Bishop:
Guarding the Castle Keep: Teaching with the Fortress Metaphor. 69-72
- Salvatore J. Stolfo:
Worm and Attack Early Warning. 73-75
- Michael Lesk:
Copyright and Creativity. 76-78
- Iván Arce:
The Kernel Craze. 79-81
- Mark F. Vilardo:
Online Impersonation in Securities Scams. 82-85
- Richard Ford:
The Wrong Stuff? 86-89
- Paco Hope, Gary McGraw, Annie I. Antón:
Misuse and Abuse Cases: Getting Past the Positive. 90-92
- Michael A. Caloyannides:
Security or Cosmetology? 93-95
- Bruce Schneier:
Security and Compliance. 96
Volume 2, Number 4, July-August 2004
- Marc Donner:
From the Editors: A Witty Lesson. 5 - Letters to the Editor. 7-8
- Book Reviews. 10
- Adam Stone, Benjamin Alfonsi, Scott L. Andresen:
News. 12-15
- Iván Arce, Gary McGraw:
Guest Editors' Introduction: Why Attacking Systems Is a Good Idea. 17-19 - Jonathan D. Pincus, Brandon Baker:
Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns. 20-27 - Carolyn P. Meinel:
Cybercrime Treaty Could Chill Research. 28-32 - Gregory B. White, Art Conklin:
The Appropriate Use of Force-on-Force Cyberexercises. 33-37 - Sandra Ring, Eric Cole:
Taking a Lesson from Stealthy Rootkits. 38-45
- Colleen Shannon, David Moore:
The Spread of the Witty Worm. 46-50
- Marc Donner:
Deus Est Machina. 51-53
- Deborah A. Frincke, Matt Bishop:
Back to School. 54-56
- Chip Elliott:
Quantum Cryptography. 57-61
- Michael Lesk:
Bigger Share of a Smaller Pie. 62-64
- Elias Levy:
Approaching Zero. 65-66
- Richard Guida, Robert Stahl, Thomas Bunt, Gary Secrest, Joseph Moorcones:
Deploying and Using Public Key Technology: Lessons Learned in Real Life. 67-71
- Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky:
Honeypot Forensics Part I: Analyzing the Network. 72-78
- Denis Verdon, Gary McGraw:
Risk Analysis in Software Design. 79-84
- Michael A. Caloyannides:
Is Privacy Really Constraining Security or Is this a Red Herring? 86-87
- Bruce Schneier:
Customers, Passwords, and Web Sites. 88
Volume 2, Number 5, September-October 2004
- Fred B. Schneider:
Time Out for Station Identification. 5
- Letters to the Editor. 6-7
- Greg Goth:
News. 8-11
- Protecting Consumers' Private Health Information. 12
- Lorrie Faith Cranor, Simson L. Garfinkel:
Guest Editors' Introduction: Secure or Usable? 16-18 - Dirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters:
In Search of Usable Security: Five Lessons from the Field. 19-24 - Jeff Jianxin Yan, Alan F. Blackwell, Ross J. Anderson, Alasdair Grant:
Password Memorability and Security: Empirical Results. 25-31 - Mike Just:
Designing and Evaluating Challenge-Question Systems. 32-39 - Alen Peacock, Xian Ke, Matthew Wilkerson:
Typing Patterns: A Key to User Identification. 40-47 - Ka-Ping Yee:
Aligning Security and Usability. 48-55
- Marc Donner:
Jennifer Government. 57-59
- Deborah A. Frincke, Matt Bishop:
Joining the Security Education Community. 61-63
- O. Sami Saydjari:
Multilevel Security: Reprise. 64-67
- Mike Andrews, James A. Whittaker:
Computer Security. 68-71
- Iván Arce:
The Shellcode Generation. 72-76
- Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky:
Honeypot Forensics, Part II: Analyzing the Compromised Host. 77-80
- Gary McGraw, Bruce Potter:
Software Security Testing. 81-85
- Michael A. Caloyannides:
Speech Privacy Technophobes Need Not Apply. 86-87
- Bruce Schneier:
SIMS: Solution, or Part of the Problem? 88
Volume 2, Number 6, November-December 2004
- George Cybenko:
Security Alchemy. 5
- Scott Forbes:
Privacy Law Resource for Students and Professionals. 7
- Greg Goth, Benjamin Alfonsi:
News. 8-11
- Annie I. Antón, Qingfeng He, David L. Baumer:
Inside JetBlue's Privacy Policy Violations. 12-18 - Jaideep Vaidya, Chris Clifton:
Privacy-Preserving Data Mining: Why, How, and When. 19-27 - Kittur S. Shankar, Helmut Kurth:
Certifying Open Source-The Linux Experience. 28-33 - David E. Bakken, Rupa Parameswaran, Douglas M. Blough, Andy A. Franz, Ty J. Palmer:
Data Obfuscation: Anonymity and Desensitization of Usable Data Sets. 34-41 - Javed A. Aslam, Sergey Bratus, David Kotz, Ronald A. Peterson, Brett Tofel, Daniela Rus:
The Kerf Toolkit for Intrusion Analysis. 42-52
- Marc Donner:
Use the Force, Luke! 53-55
- Deborah A. Frincke, Matt Bishop:
Academic Degrees and Professional Certification. 56-58
- Shelby Evans, David V. Heinbuch, Elizabeth Kyule, John Piorkowski, James Wallner:
Risk-based Systems Security Engineering: Stopping Attacks with Intention. 59-62
- Michael Howard:
Building More Secure Software with Improved Development Processes. 63-65
- Elias Levy:
Interface Illusions. 66-69
- Anil Somayaji:
How to Win and Evolutionary Arms Race. 70-72
- John G. Levine, Julian B. Grizzard, Henry L. Owen:
Using Honeynets to Protect Large Enterprise Networks. 73-75
- Brian Chess, Gary McGraw:
Static Analysis for Security. 76-79
- 2004 Annual Index. 80-85
- Michael A. Caloyannides:
Enhancing Security: Not for the Conformist. 86-88
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.