


default search action
IEEE Security & Privacy, Volume 2
Volume 2, Number 1, January-February 2004
- Fred B. Schneider:

From the Editors: The Next Digital Divide. 5 - Reviewer Thanks. 6

- Letters to the Editors. 7-9

- Charles C. Palmer:

Can We Win the Security Game? 10-12
- Greg Goth, Pam Frost Gorder, Scott L. Andresen:

News. 14-19
- Martin R. Stytz:

Book Reviews. 20-21
- David L. Dill, Aviel D. Rubin:

Guest Editors' Introduction: E-Voting Security. 22-23 - David Evans

, Nathanael Paul:
Election Security: Perception and Reality. 24-31 - Jonathan Bannet, David W. Price, Algis Rudys, Justin Singer, Dan S. Wallach:

Hack-a-Vote: Security Issues with Electronic Voting Systems. 32-37 - David Chaum:

Secret-Ballot Receipts: True Voter-Verifiable Elections. 38-47
- Nicolas Sklavos

, Nick A. Moldovyan, Vladimir Gorodetsky, Odysseas G. Koufopavlou:
Computer Network Security: Report from MMM-ACNS. 49-52
- Marc Donner:

Die Gedanken Sind Frei. 53-55
- Michael R. Grimaila:

Maximizing Business Information Security's Educational Value. 56-60
- Michael Lesk:

Micropayments: An Idea Whose Time Has Passed Twice? 61-63
- Jim Hearn:

Does the Common Criteria Paradigm Have a Future? 64-65
- Iván Arce:

More Bang For the Bug: An Account of 2003's Attack Trends. 66-68
- Sean W. Smith, Eugene H. Spafford

:
Grand Challenges in Information Security: Process and Output. 69-71
- Martin R. Stytz:

Considering Defense in Depth for Software Applications. 72-75
- Neal Krawetz:

Anti-Honeypot Technology. 76-79
- Michael A. Caloyannides:

Online Monitoring: Security or Social Control? 81-83
- Bruce Schneier:

Voting Security and Technology. 84
Volume 2, Number 2, March-April 2004
- George Cybenko:

From the Editors: Don't Bring a Knife to a Gunfight. 5
- Letters to the Editor. 6-7

- Martin R. Stytz:

Book Reviews. 8
- Greg Goth, Benjamin Alfonsi, Scott L. Andresen:

News. 9-15
- Kanta Jiwnani, Marvin V. Zelkowitz:

Susceptibility Matrix: A New Aid to Software Auditing. 16-21 - Simon D. Byers:

Information Leakage Caused by Hidden Data in Published Documents. 23-27 - Marco Gruteser, Xuan Liu:

Protecting Privacy in Continuous Location-Tracking Applications. 28-34 - Annie I. Antón, Julia Brande Earp, Qingfeng He, William H. Stufflebeam, Davide Bolchini

, Carlos Jensen:
Financial Privacy Policies and the Need for Standardization. 36-45
- Ashish Popli:

ACM Computer and Communication Security Conference. 46-47 - Stephen A. Weis

:
RFID Privacy Workshop: Concerns, Consensus, and Questions. 48-50
- Marc Donner:

Hacking the Best-Seller List. 51-53
- Matt Bishop

, Deborah A. Frincke:
Teaching Robust Programming. 54-57
- Jeffery E. Payne:

Regulation and Information Security: Can Y2K Lessons Help Us? 58-61
- Michael Lesk:

Shedding Light on Creativity: The History of Photography. 62-64
- Elias Levy:

Criminals Become Tech Savvy. 65-68
- Peter C. Wayner:

The Power of Candy-Coated Bits. 69-72
- Roland L. Trope:

A Warranty of Cyberworthiness. 73-76
- George Chamales:

The Honeywall CD-ROM. 77-79
- Gary McGraw:

Software Security. 80-83
- Michael A. Caloyannides:

The Cost of Convenience: A Faustian Deal. 84-87
Volume 2, Number 3, May-June 2004
- Marc Donner:

From the Editors: Whose Data Are These, Anyway? 5-6
- Shari Lawrence Pfleeger:

Book Reviews. 7
- Letters to the Editor. 8-9

- Greg Goth, Scott L. Andresen:

News: Richard Clarke Talks Cybersecurity and JELL-O. 11-17
- Noopur Davis, Watts S. Humphrey, Samuel T. Redwine Jr., Gerlinde Zibulski, Gary McGraw:

Processes for Producing Secure Software: Summary of US National Cybersecurity Summit Subgroup Report. 18-25
- William A. Arbaugh:

Guest Editor's Introduction: Wired on Wireless. 26-27 - Yih-Chun Hu, Adrian Perrig:

A Survey of Secure Wireless Ad Hoc Routing. 28-39 - David Johnston, Jesse Walker:

Overview of IEEE 802.16 Security. 40-48 - Jean-Pierre Hubaux, Srdjan Capkun, Jun Luo

:
The Security and Privacy of Smart Vehicles. 49-55 - Joel W. Branch, Nick L. Petroni Jr., Leendert van Doorn, David Safford:

Autonomic 802.11 Wireless LAN Security Auditing. 56-65
- Marc Donner:

Cult Classics. 66-68
- Deborah A. Frincke, Matt Bishop

:
Guarding the Castle Keep: Teaching with the Fortress Metaphor. 69-72
- Salvatore J. Stolfo:

Worm and Attack Early Warning. 73-75
- Michael Lesk:

Copyright and Creativity. 76-78
- Iván Arce:

The Kernel Craze. 79-81
- Mark F. Vilardo:

Online Impersonation in Securities Scams. 82-85
- Richard Ford:

The Wrong Stuff? 86-89
- Paco Hope, Gary McGraw, Annie I. Antón:

Misuse and Abuse Cases: Getting Past the Positive. 90-92
- Michael A. Caloyannides:

Security or Cosmetology? 93-95
- Bruce Schneier:

Security and Compliance. 96
Volume 2, Number 4, July-August 2004
- Marc Donner:

From the Editors: A Witty Lesson. 5 - Letters to the Editor. 7-8

- Book Reviews. 10

- Adam Stone, Benjamin Alfonsi, Scott L. Andresen:

News. 12-15
- Iván Arce, Gary McGraw:

Guest Editors' Introduction: Why Attacking Systems Is a Good Idea. 17-19 - Jonathan D. Pincus, Brandon Baker:

Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns. 20-27 - Carolyn P. Meinel:

Cybercrime Treaty Could Chill Research. 28-32 - Gregory B. White, Art Conklin:

The Appropriate Use of Force-on-Force Cyberexercises. 33-37 - Sandra Ring, Eric Cole:

Taking a Lesson from Stealthy Rootkits. 38-45
- Colleen Shannon, David Moore:

The Spread of the Witty Worm. 46-50
- Marc Donner:

Deus Est Machina. 51-53
- Deborah A. Frincke, Matt Bishop

:
Back to School. 54-56
- Chip Elliott:

Quantum Cryptography. 57-61
- Michael Lesk:

Bigger Share of a Smaller Pie. 62-64
- Elias Levy:

Approaching Zero. 65-66
- Richard Guida, Robert Stahl, Thomas Bunt, Gary Secrest, Joseph Moorcones:

Deploying and Using Public Key Technology: Lessons Learned in Real Life. 67-71
- Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky:

Honeypot Forensics Part I: Analyzing the Network. 72-78
- Denis Verdon, Gary McGraw:

Risk Analysis in Software Design. 79-84
- Michael A. Caloyannides:

Is Privacy Really Constraining Security or Is this a Red Herring? 86-87
- Bruce Schneier:

Customers, Passwords, and Web Sites. 88
Volume 2, Number 5, September-October 2004
- Fred B. Schneider:

Time Out for Station Identification. 5
- Letters to the Editor. 6-7

- Greg Goth:

News. 8-11
- Protecting Consumers' Private Health Information. 12

- Lorrie Faith Cranor

, Simson L. Garfinkel
:
Guest Editors' Introduction: Secure or Usable? 16-18 - Dirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters:

In Search of Usable Security: Five Lessons from the Field. 19-24 - Jeff Jianxin Yan, Alan F. Blackwell, Ross J. Anderson, Alasdair Grant:

Password Memorability and Security: Empirical Results. 25-31 - Mike Just

:
Designing and Evaluating Challenge-Question Systems. 32-39 - Alen Peacock, Xian Ke, Matthew Wilkerson:

Typing Patterns: A Key to User Identification. 40-47 - Ka-Ping Yee:

Aligning Security and Usability. 48-55
- Marc Donner:

Jennifer Government. 57-59
- Deborah A. Frincke, Matt Bishop

:
Joining the Security Education Community. 61-63
- O. Sami Saydjari

:
Multilevel Security: Reprise. 64-67
- Mike Andrews, James A. Whittaker:

Computer Security. 68-71
- Iván Arce:

The Shellcode Generation. 72-76
- Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky:

Honeypot Forensics, Part II: Analyzing the Compromised Host. 77-80
- Gary McGraw, Bruce Potter:

Software Security Testing. 81-85
- Michael A. Caloyannides:

Speech Privacy Technophobes Need Not Apply. 86-87
- Bruce Schneier:

SIMS: Solution, or Part of the Problem? 88
Volume 2, Number 6, November-December 2004
- George Cybenko:

Security Alchemy. 5
- Scott Forbes:

Privacy Law Resource for Students and Professionals. 7
- Greg Goth, Benjamin Alfonsi:

News. 8-11
- Annie I. Antón, Qingfeng He, David L. Baumer:

Inside JetBlue's Privacy Policy Violations. 12-18 - Jaideep Vaidya, Chris Clifton:

Privacy-Preserving Data Mining: Why, How, and When. 19-27 - Kittur S. Shankar, Helmut Kurth:

Certifying Open Source-The Linux Experience. 28-33 - David E. Bakken, Rupa Parameswaran, Douglas M. Blough, Andy A. Franz, Ty J. Palmer:

Data Obfuscation: Anonymity and Desensitization of Usable Data Sets. 34-41 - Javed A. Aslam, Sergey Bratus, David Kotz

, Ronald A. Peterson, Brett Tofel, Daniela Rus:
The Kerf Toolkit for Intrusion Analysis. 42-52
- Marc Donner:

Use the Force, Luke! 53-55
- Deborah A. Frincke, Matt Bishop

:
Academic Degrees and Professional Certification. 56-58
- Shelby Evans, David V. Heinbuch, Elizabeth Kyule, John Piorkowski, James Wallner:

Risk-based Systems Security Engineering: Stopping Attacks with Intention. 59-62
- Michael Howard:

Building More Secure Software with Improved Development Processes. 63-65
- Elias Levy:

Interface Illusions. 66-69
- Anil Somayaji:

How to Win and Evolutionary Arms Race. 70-72
- John G. Levine, Julian B. Grizzard, Henry L. Owen:

Using Honeynets to Protect Large Enterprise Networks. 73-75
- Brian Chess, Gary McGraw:

Static Analysis for Security. 76-79
- 2004 Annual Index. 80-85

- Michael A. Caloyannides:

Enhancing Security: Not for the Conformist. 86-88

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














