


default search action
IEEE Security & Privacy, Volume 1
Volume 1, Number 1, January-February 2003
- George Cybenko:

A Critical Need, An Ambitious Mission, A New Magazine. 5-9
- Sandra Kay Miller:

Legal Battle Looming for Internet Protections Acts. 10-12 - Scott L. Andresen:

New Draft to Secure Cyberspace Leaked. 13
- Simson L. Garfinkel

, Abhi Shelat:
Remembrance of Data Passed: A Study of Disk Sanitization Practices. 17-27
- Nick L. Petroni Jr., William A. Arbaugh:

The Dangers of Mitigating Security Design Flaws: A Wireless Case Study. 28-36
- Crispin Cowan:

Software Security for Open-Source Systems. 38-45
- Joshua W. Haines, Dorene Kewley Ryder, Laura Tinnel

, Stephen Taylor:
Validation of Sensor Alert Correlators. 46-56
- Michael Howard, Steve Lipner:

Inside the Windows Security Push. 57-61
- Marc Donner:

AI Bites Man? 63-66
- Matt Bishop

:
What Is Computer Security? 67-69
- Daniel J. Ryan:

Two Views on Security Software Liability: Let the Legal System Decide. 70-72 - Carey Heckman:

Two Views on Security Software Liability: Using the Right Legal Tools. 73-75
- Michael Lesk:

Copyright Extension: Eldred v. Ashcroft. 76-78
- Jim Hearn:

International Participation: The Continuing March Toward Security and Privacy. 79-81
- Iván Arce, Elias Levy:

An Analysis of the Slapper Worm. 82-87
- Sean W. Smith:

Fairy Dust, Secrets, and the Real World. 89-93
- Martin R. Stytz, James A. Whittaker:

Software Protection: Security's Last Stand? 95-98
- Michael A. Caloyannides:

Privacy vs. Information Technology. 100-103
- Bruce Schneier:

We Are All Security Consumers. 104
Volume 1, Number 2, March-April 2003
- George Cybenko:

From the Editor: Sapphire/Slammer Redux. 6
- Letters to the Editor. 7-10

- Daniel P. Dern:

Privacy Concerns. 11-13
- Lance Spitzner:

The Honeynet Project: Trapping the Hackers. 15-23
- Matt Blaze:

Rights Amplification in Master-Keyed Mechanical Locks. 24-32
- Salil Prabhakar, Sharath Pankanti, Anil K. Jain:

Biometric Recognition: Security and Privacy Concerns. 33-42
- William E. Burr:

Selecting the Advanced Encryption Standard. 43-52
- Marc Donner:

Post-Apocalypse Now. 53-55
- Jim Davis, Melissa Dark:

Teaching Students to Design Secure Systems. 56-58
- Gary McGraw:

From the Ground Up: The DIMACS Software Security Workshop. 59-66
- Michael Lesk:

Copyright Enforcement or Censorship: New Uses for the DMCA? 67-69
- Jim Hearn:

Moving Forward? 70-71
- Iván Arce:

The Weakest Link Revisited. 72-76
- Edward Ball, David W. Chadwick

, Darren P. Mundy:
Patient Privacy in Electronic Prescription Transfer. 77-80
- James A. Whittaker:

Why Secure Applications are Difficult to Write. 81-83
- Michael A. Caloyannides:

Engineering or Sloganeering? The Counterattack on Privacy. 84-87
- Bruce Schneier:

Locks and Full Disclosure. 88
Volume 1, Number 3, May-June 2003
- Marc Donner:

Toward a Security Ontology. 6-7
- Greg Goth, Scott L. Andresen:

News. 8-13
- Nancy R. Mead:

Building a Foundation. 14
- Lucila Ishitani

, Virgílio A. F. Almeida, Wagner Meira Jr.:
Masks: Bringing Anonymity and Personalization Together. 18-23
- Hassan Aljifri:

IP Traceback: A New Denial-of-Service Deterrent? 24-31
- Niels Provos, Peter Honeyman

:
Hide and Seek: An Introduction to Steganography. 32-44
- Václav Matyás Jr., Zdenek Ríha:

Toward Reliable User Authentication through Biometrics. 45-49
- Marc Donner:

Hey, Robot! 51-55
- Deborah A. Frincke:

Who Watches the Security Educators? 56-58
- Edward W. Felten:

Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks? 60-62
- Michael Lesk:

The Good, the Bad, and the Ugly: What Might Change if We Had Good DRM. 63-66
- Jim Hearn:

Slow Dancing. 67-68
- Elias Levy:

Poisoning the Software Supply Chain. 70-73
- Sean W. Smith:

Humans in the Loop: Human-Computer Interaction and Security. 75-79
- Martin R. Stytz:

The Case for Software Warranties. 80-82
- Michael A. Caloyannides:

Society Cannot Function Without Privacy. 84-86
- Bruce Schneier:

Guilty Until Proven Innocent? 88, 87
Volume 1, Number 4, July-August 2003
- George Cybenko:

Boiling Frogs? 5 - S&P Welcomes New Editorial Board Members. 6-7

- Laurianne McLaughlin, Rosemary Clandos:

News. 8-11 - Scott L. Andresen:

News Briefs. 12-13
- Martin R. Stytz:

Setting the Standard for Security Literature. 14
- Alec Yasinsac, Robert F. Erbacher, Donald G. Marks, Mark Pollitt, Peter M. Sommer:

Computer Forensics Education. 15-23
- Daniel E. Geer Jr., Kevin Soo Hoo, Andrew Jaquith:

Information Security: Why the Future Belongs to the Quants. 24-32
- David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver:

Inside the Slammer Worm. 33-39
- Christian S. Collberg, Ginger Myles, Andrew Huntwork:

Sandmark--A Tool for Software Protection Research. 40-49
- Ting Yu, Marianne Winslett, Jason E. Holt:

Two Security Symposia. 50-52
- Bacon Ice Cream: The Best Mix of Proactive and Reactive Security? 53-57

- Elias Levy:

The Making of a Spam Zombie Army: Dissecting the Sobig Worms. 58-59
- Marc Donner:

The Girl with No Eyes. 60-64
- Barbara Endicott-Popovsky:

Ethics and Teaching Information Assurance. 65-67
- Bruce Potter:

Wireless Security's Future. 68-72
- Michael Lesk:

Making the Copyright Law Work. 73-74
- Jim Hearn:

Keeping Up Appearances. 75-76
- Dave Ahmad:

The Rising Threat of Vulnerabilities Due to Integer Errors. 77-82
- Herbert H. Thompson:

Why Security Testing Is Hard. 83-86
- Bill McCarty:

Botnets: Big and Bigger. 87-90
- Michael A. Caloyannides:

The Assault on Logic. 91-95
- Bruce Schneier:

The Speed of Security. 96
Volume 1, Number 5, September-October 2003
- Carl E. Landwehr:

From the Editor: Security Cosmology: Moving from Big Bang to Worlds in Collusion. 5 - Security and Privacy Welcomes New Editorial Board Members. 6-7

- Greg Goth, Sandra Kay Miller:

News. 8-11 - Scott L. Andresen:

News Briefs. 12-13
- Letters to the Editor. 14

- Robert J. Campbell:

Crime Scene Investigators: The Next Generation. 15
- Dennis McGrath:

Measuring the 4: 11 Effect: The Power Failure and the Internet. 16-18 - Massoud Amin:

North America's Electricity Infrastructure: Are We Ready for More Perfect Storms? 19-25
- Peter G. Capek, David M. Chess, Steve R. White:

Merry Christma: An Early Network Worm. 26-34
- Hilarie K. Orman:

The Morris Worm: A Fifteen-Year Perspective. 35-43
- Rolf Oppliger, Ruedi Rytz:

Digital Evidence: Dream and Reality. 44-48
- Salim Hariri, Guangzhi Qu, Tushneem Dharmagadda, Modukuri Ramkishore, Cauligi S. Raghavendra:

Impact Analysis of Faults and Attacks in Large-Scale Networks. 49-54
- Fred B. Schneider:

Least Privilege and More. 55-59
- John Lenarcic:

The Dinosaur and the Butterfly: A Tale of Computer Ethics. 61-63
- Daniel Ragsdale, Donald J. Welch, Ronald Dodge:

Information Assurance the West Point Way. 64-67
- Nancy R. Mead:

SEHAS 2003: The Future of High-Assurance Systems. 68-72
- Michael Lesk:

Chicken Little and the Recorded Music Crisis. 73-75
- Jim Hearn:

What Works? 76-77
- Iván Arce:

The Rise of the Gadgets. 78-81
- L. Jean Camp:

Access Denied. 82-85
- Martin R. Stytz, James A. Whittaker:

Caution: This Product Contains Security Code. 86-88
- Bill McCarty:

Automated Identity Theft. 89-92
- Michael A. Caloyannides:

Keeping Offline Computer Usage Private. 93-95
Volume 1, Number 6, November-December 2003
- George Cybenko:

From the Editors: Privacy Is the Issue. 5-7
- Greg Goth, Benjamin Alfonsi:

News. 8-13
- Daniel E. Geer Jr., David Aucsmith, James A. Whittaker:

Monoculture. 14-19
- Simson L. Garfinkel

:
Email-Based Identification and Authentication: An Alternative to PKI? 20-26 - Dakshi Agrawal, Dogan Kesdogan:

Measuring Anonymity: The Disclosure Attack. 27-34 - Jean-Marc Seigneur

, Christian Damsgaard Jensen
:
Privacy Recovery with Disposable Email Addresses. 35-39 - Abdelmounaam Rezgui, Athman Bouguettaya

, Mohamed Eltoweissy:
Privacy on the Web: Facts, Challenges, and Solutions. 40-49 - Lorrie Faith Cranor

:
P3P: Making Privacy Policies More Useful. 50-55
- John S. Quarterman:

The Ultimate in Instant Gratification. 56-58
- Cynthia E. Irvine:

Teaching Constructive Security. 59-61
- Jeannette M. Wing:

A Call to Action: Look Beyond the Horizon. 62-67
- Michael Lesk:

Feist and Facts: If Data Is Protected, Will It Be More or Less Available? 68-70
- Elias Levy:

Crossover: Online Pests Plaguing the Offline World. 71-73
- Sean W. Smith, Jothy Rosenberg, Adam Golodner:

A Funny Thing Happened on the Way to the Marketplace. 74-78
- Bill McCarty:

The Honeynet Arms Race. 79-82
- 2003 Annual Index IEEE Security & Privacy Volume 1. 83-88

- Michael A. Caloyannides:

Digital "Evidence" and Reasonable Doubt. 89-91
- Bruce Schneier:

Airplane Hackers. 92

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














