default search action
IEEE Security & Privacy, Volume 1
Volume 1, Number 1, January-February 2003
- George Cybenko:
A Critical Need, An Ambitious Mission, A New Magazine. 5-9
- Sandra Kay Miller:
Legal Battle Looming for Internet Protections Acts. 10-12 - Scott L. Andresen:
New Draft to Secure Cyberspace Leaked. 13
- Simson L. Garfinkel, Abhi Shelat:
Remembrance of Data Passed: A Study of Disk Sanitization Practices. 17-27
- Nick L. Petroni Jr., William A. Arbaugh:
The Dangers of Mitigating Security Design Flaws: A Wireless Case Study. 28-36
- Crispin Cowan:
Software Security for Open-Source Systems. 38-45
- Joshua W. Haines, Dorene Kewley Ryder, Laura Tinnel, Stephen Taylor:
Validation of Sensor Alert Correlators. 46-56
- Michael Howard, Steve Lipner:
Inside the Windows Security Push. 57-61
- Marc Donner:
AI Bites Man? 63-66
- Matt Bishop:
What Is Computer Security? 67-69
- Daniel J. Ryan:
Two Views on Security Software Liability: Let the Legal System Decide. 70-72 - Carey Heckman:
Two Views on Security Software Liability: Using the Right Legal Tools. 73-75
- Michael Lesk:
Copyright Extension: Eldred v. Ashcroft. 76-78
- Jim Hearn:
International Participation: The Continuing March Toward Security and Privacy. 79-81
- Iván Arce, Elias Levy:
An Analysis of the Slapper Worm. 82-87
- Sean W. Smith:
Fairy Dust, Secrets, and the Real World. 89-93
- Martin R. Stytz, James A. Whittaker:
Software Protection: Security's Last Stand? 95-98
- Michael A. Caloyannides:
Privacy vs. Information Technology. 100-103
- Bruce Schneier:
We Are All Security Consumers. 104
Volume 1, Number 2, March-April 2003
- George Cybenko:
From the Editor: Sapphire/Slammer Redux. 6
- Letters to the Editor. 7-10
- Daniel P. Dern:
Privacy Concerns. 11-13
- Lance Spitzner:
The Honeynet Project: Trapping the Hackers. 15-23
- Matt Blaze:
Rights Amplification in Master-Keyed Mechanical Locks. 24-32
- Salil Prabhakar, Sharath Pankanti, Anil K. Jain:
Biometric Recognition: Security and Privacy Concerns. 33-42
- William E. Burr:
Selecting the Advanced Encryption Standard. 43-52
- Marc Donner:
Post-Apocalypse Now. 53-55
- Jim Davis, Melissa Dark:
Teaching Students to Design Secure Systems. 56-58
- Gary McGraw:
From the Ground Up: The DIMACS Software Security Workshop. 59-66
- Michael Lesk:
Copyright Enforcement or Censorship: New Uses for the DMCA? 67-69
- Jim Hearn:
Moving Forward? 70-71
- Iván Arce:
The Weakest Link Revisited. 72-76
- Edward Ball, David W. Chadwick, Darren P. Mundy:
Patient Privacy in Electronic Prescription Transfer. 77-80
- James A. Whittaker:
Why Secure Applications are Difficult to Write. 81-83
- Michael A. Caloyannides:
Engineering or Sloganeering? The Counterattack on Privacy. 84-87
- Bruce Schneier:
Locks and Full Disclosure. 88
Volume 1, Number 3, May-June 2003
- Marc Donner:
Toward a Security Ontology. 6-7
- Greg Goth, Scott L. Andresen:
News. 8-13
- Nancy R. Mead:
Building a Foundation. 14
- Lucila Ishitani, Virgílio A. F. Almeida, Wagner Meira Jr.:
Masks: Bringing Anonymity and Personalization Together. 18-23
- Hassan Aljifri:
IP Traceback: A New Denial-of-Service Deterrent? 24-31
- Niels Provos, Peter Honeyman:
Hide and Seek: An Introduction to Steganography. 32-44
- Václav Matyás Jr., Zdenek Ríha:
Toward Reliable User Authentication through Biometrics. 45-49
- Marc Donner:
Hey, Robot! 51-55
- Deborah A. Frincke:
Who Watches the Security Educators? 56-58
- Edward W. Felten:
Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks? 60-62
- Michael Lesk:
The Good, the Bad, and the Ugly: What Might Change if We Had Good DRM. 63-66
- Jim Hearn:
Slow Dancing. 67-68
- Elias Levy:
Poisoning the Software Supply Chain. 70-73
- Sean W. Smith:
Humans in the Loop: Human-Computer Interaction and Security. 75-79
- Martin R. Stytz:
The Case for Software Warranties. 80-82
- Michael A. Caloyannides:
Society Cannot Function Without Privacy. 84-86
- Bruce Schneier:
Guilty Until Proven Innocent? 88, 87
Volume 1, Number 4, July-August 2003
- George Cybenko:
Boiling Frogs? 5 - S&P Welcomes New Editorial Board Members. 6-7
- Laurianne McLaughlin, Rosemary Clandos:
News. 8-11 - Scott L. Andresen:
News Briefs. 12-13
- Martin R. Stytz:
Setting the Standard for Security Literature. 14
- Alec Yasinsac, Robert F. Erbacher, Donald G. Marks, Mark Pollitt, Peter M. Sommer:
Computer Forensics Education. 15-23
- Daniel E. Geer Jr., Kevin Soo Hoo, Andrew Jaquith:
Information Security: Why the Future Belongs to the Quants. 24-32
- David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver:
Inside the Slammer Worm. 33-39
- Christian S. Collberg, Ginger Myles, Andrew Huntwork:
Sandmark--A Tool for Software Protection Research. 40-49
- Ting Yu, Marianne Winslett, Jason E. Holt:
Two Security Symposia. 50-52
- Bacon Ice Cream: The Best Mix of Proactive and Reactive Security? 53-57
- Elias Levy:
The Making of a Spam Zombie Army: Dissecting the Sobig Worms. 58-59
- Marc Donner:
The Girl with No Eyes. 60-64
- Barbara Endicott-Popovsky:
Ethics and Teaching Information Assurance. 65-67
- Bruce Potter:
Wireless Security's Future. 68-72
- Michael Lesk:
Making the Copyright Law Work. 73-74
- Jim Hearn:
Keeping Up Appearances. 75-76
- Dave Ahmad:
The Rising Threat of Vulnerabilities Due to Integer Errors. 77-82
- Herbert H. Thompson:
Why Security Testing Is Hard. 83-86
- Bill McCarty:
Botnets: Big and Bigger. 87-90
- Michael A. Caloyannides:
The Assault on Logic. 91-95
- Bruce Schneier:
The Speed of Security. 96
Volume 1, Number 5, September-October 2003
- Carl E. Landwehr:
From the Editor: Security Cosmology: Moving from Big Bang to Worlds in Collusion. 5 - Security and Privacy Welcomes New Editorial Board Members. 6-7
- Greg Goth, Sandra Kay Miller:
News. 8-11 - Scott L. Andresen:
News Briefs. 12-13
- Letters to the Editor. 14
- Robert J. Campbell:
Crime Scene Investigators: The Next Generation. 15
- Dennis McGrath:
Measuring the 4: 11 Effect: The Power Failure and the Internet. 16-18 - Massoud Amin:
North America's Electricity Infrastructure: Are We Ready for More Perfect Storms? 19-25
- Peter G. Capek, David M. Chess, Steve R. White:
Merry Christma: An Early Network Worm. 26-34
- Hilarie K. Orman:
The Morris Worm: A Fifteen-Year Perspective. 35-43
- Rolf Oppliger, Ruedi Rytz:
Digital Evidence: Dream and Reality. 44-48
- Salim Hariri, Guangzhi Qu, Tushneem Dharmagadda, Modukuri Ramkishore, Cauligi S. Raghavendra:
Impact Analysis of Faults and Attacks in Large-Scale Networks. 49-54
- Fred B. Schneider:
Least Privilege and More. 55-59
- John Lenarcic:
The Dinosaur and the Butterfly: A Tale of Computer Ethics. 61-63
- Daniel Ragsdale, Donald J. Welch, Ronald Dodge:
Information Assurance the West Point Way. 64-67
- Nancy R. Mead:
SEHAS 2003: The Future of High-Assurance Systems. 68-72
- Michael Lesk:
Chicken Little and the Recorded Music Crisis. 73-75
- Jim Hearn:
What Works? 76-77
- Iván Arce:
The Rise of the Gadgets. 78-81
- L. Jean Camp:
Access Denied. 82-85
- Martin R. Stytz, James A. Whittaker:
Caution: This Product Contains Security Code. 86-88
- Bill McCarty:
Automated Identity Theft. 89-92
- Michael A. Caloyannides:
Keeping Offline Computer Usage Private. 93-95
Volume 1, Number 6, November-December 2003
- George Cybenko:
From the Editors: Privacy Is the Issue. 5-7
- Greg Goth, Benjamin Alfonsi:
News. 8-13
- Daniel E. Geer Jr., David Aucsmith, James A. Whittaker:
Monoculture. 14-19
- Simson L. Garfinkel:
Email-Based Identification and Authentication: An Alternative to PKI? 20-26 - Dakshi Agrawal, Dogan Kesdogan:
Measuring Anonymity: The Disclosure Attack. 27-34 - Jean-Marc Seigneur, Christian Damsgaard Jensen:
Privacy Recovery with Disposable Email Addresses. 35-39 - Abdelmounaam Rezgui, Athman Bouguettaya, Mohamed Eltoweissy:
Privacy on the Web: Facts, Challenges, and Solutions. 40-49 - Lorrie Faith Cranor:
P3P: Making Privacy Policies More Useful. 50-55
- John S. Quarterman:
The Ultimate in Instant Gratification. 56-58
- Cynthia E. Irvine:
Teaching Constructive Security. 59-61
- Jeannette M. Wing:
A Call to Action: Look Beyond the Horizon. 62-67
- Michael Lesk:
Feist and Facts: If Data Is Protected, Will It Be More or Less Available? 68-70
- Elias Levy:
Crossover: Online Pests Plaguing the Offline World. 71-73
- Sean W. Smith, Jothy Rosenberg, Adam Golodner:
A Funny Thing Happened on the Way to the Marketplace. 74-78
- Bill McCarty:
The Honeynet Arms Race. 79-82
- 2003 Annual Index IEEE Security & Privacy Volume 1. 83-88
- Michael A. Caloyannides:
Digital "Evidence" and Reasonable Doubt. 89-91
- Bruce Schneier:
Airplane Hackers. 92
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.