default search action
IEEE Security & Privacy, Volume 10
Volume 10, Number 1, January - February 2012
- Anup K. Ghosh, Gary McGraw:
Lost Decade or Golden Era: Computer Security since 9/11. 6-10 - Dirk Balfanz, Richard Chow, Ori Eisen, Markus Jakobsson, Steve Kirsch, Scott Matsumoto, Jesus Molina, Paul C. van Oorschot:
The Future of Authentication. 22-27 - Cormac Herley, Paul C. van Oorschot:
A Research Agenda Acknowledging the Persistence of Passwords. 28-36 - Amir Herzberg, Ronen Margulies:
Training Johnny to Authenticate (Safely). 37-45 - Andreas Poller, Ulrich Waldmann, Sven Vowe, Sven Türpe:
Electronic Identity Cards for User Authentication - Promise and Practice. 46-54 - Idoia Aguirre, Sergio Alonso:
Improving the Automation of Security Information Management: A Collaborative Approach. 55-59 - James Pettigrew, Julie J. C. H. Ryan:
Making Successful Security Decisions: A Qualitative Evaluation. 60-68 - Jean Arlat, Zbigniew Kalbarczyk, Takashi Nanya:
Nanocomputing: Small Devices, Large Dependability Challenges. 69-72 - Jelena Mirkovic, Terry Benzel:
Teaching Cybersecurity with DeterLab. 73-76 - Tara Whalen:
This Time, It's Personal: Recent Discussions on Concepts of Personal Information. 77-79 - Jan Camenisch, Anja Lehmann, Gregory Neven:
Electronic Identities Need Private Credentials. 80-83 - Don A. Bailey:
Moving 2 Mishap: M2M's Impact on Privacy and Safety. 84-87 - Michael Lesk:
Your Memory Is Now a Vendor Service. 88-90 - Bronwen Matthews:
Optimizing Product Improvement Spending with Third-Party Security Consultants. 91-93 - Daniel E. Geer Jr.:
Power. Law. 94-95
Volume 10, Number 2, March - April 2012
- Jeremy Epstein:
Can We Be Too Careful? 3-5 - Jeremy Epstein:
Reflecting on Some Past Predictions. 7-10 - Gary McGraw:
Silver Bullet Talks with Neil Daswani. 11-14 - Lee Garber:
Security, Privacy, and Policy Roundup. 15-17 - Shari Lawrence Pfleeger, Cynthia E. Irvine, Mischel Kwon:
Guest Editors' Introduction. 19-23 - Iacovos Kirlappos, Martina Angela Sasse:
Security Education against Phishing: A Modest Proposal for a Major Rethink. 24-32 - Lance J. Hoffman, Diana L. Burley, Costis Toregas:
Holistically Building the Cybersecurity Workforce. 33-39 - Susanne Furman, Mary Frances Theofanos, Yee-Yin Choong, Brian C. Stanton:
Basing Cybersecurity Training on User Perceptions. 40-49 - Mischel Kwon, Michael J. Jacobs, David Cullinane, Christopher G. Ipsen, James D. Foley:
Educating Cyber Professionals: A View from Academia, the Private Sector, and Government. 50-53 - Scott Charney:
Collective Defense: Applying the Public-Health Model to the Internet. 54-59 - Sanjeev Kumar, Sirisha Surisetty:
Microsoft vs. Apple: Resilience against Distributed Denial-of-Service Attacks. 60-64 - Peter G. Neumann, Ulf Lindqvist:
The IEEE Symposium on Security and Privacy Is Moving to San Francisco. 65-66 - Gernot Heiser, Toby C. Murray, Gerwin Klein:
It's Time for Trustworthy Systems. 67-70 - Michael D. Bailey, David Dittrich, Erin Kenneally, Douglas Maughan:
The Menlo Report. 71-75 - Diana Maimut, Khaled Ouafi:
Lightweight Cryptography for RFID Tags. 76-79 - Barbara Endicott-Popovsky, Donald J. Horowitz:
Unintended Consequences: Digital Evidence in Our Legal System. 80-83 - Chris Rohlf, Yan Ivnitskiy:
The Security Challenges of Client-Side Just-in-Time Engines. 84-86 - Len Sassaman, Meredith L. Patterson, Sergey Bratus:
A Patch for Postel's Robustness Principle. 87-91 - Lorrie Faith Cranor:
Can Users Control Online Behavioral Advertising Effectively? 93-96 - Barbara Fichtinger, Frances Paulisch, Peter Panholzer:
Driving Secure Software Development Experience in a Diverse Product Environment. 97-101 - Daniel E. Geer Jr.:
Numbers Worth Having. 102-103 - Bruce Schneier:
How Changing Technology Affects Security. 104
Volume 10, Number 3, May - June 2012
- Shari Lawrence Pfleeger:
A Key to the Castle. 3 - George Cybenko, Carl E. Landwehr:
Security Analytics and Measurements. 5-8 - Gary McGraw:
Silver Bullet Talks with Giovanni Vigna. 9-11 - Lee Garber:
Security, Privacy, and Policy Roundup. 12-13 - Brian Chess, Chris Wysopal:
Guest editors' introduction: Software Assurance for the Masses. 14-15 - Cristina Cifuentes, Nathan Keynes, Lian Li, Nathan Hawes, Manuel Valdiviezo:
Transitioning Parfait into a Development Tool. 16-23 - Robert A. Martin, Steven M. Christey:
The Software Industry's "Clean Water Act" Alternative. 24-31 - James Walden, Maureen Doyle:
SAVI: Static-Analysis Vulnerability Indicator. 32-39 - Paul Anderson:
Measuring the Value of Static-Analysis Tool Deployments. 40-47 - Paul E. Black:
Static Analyzers: Seat Belts for Your Code. 48-52 - Brian Chess, Kris Britton, Chris Eng, Bill Pugh, Lakshmikanth Raghavan, Jacob West:
Static Analysis in Motion. 53-56 - Karen Renaud:
Blaming Noncompliance Is Too Convenient: What Really Causes Information Breaches? 57-63 - Rohan M. Amin, Julie J. C. H. Ryan, Johan René van Dorp:
Detecting Targeted Malicious Email. 64-71 - Lorenzo Strigini:
Resilience: What Is It, and How Much Do We Want? 72-75 - Celia Paulsen, Ernest McDuffie, William Newhouse, Patricia Toth:
NICE: Creating a Cybersecurity Workforce and Aware Public. 76-79 - Helena Handschuh:
Hardware-Anchored Security Based on SRAM PUFs, Part 1. 80-83 - Michael Lesk:
The Clouds Roll By. 84-87 - Eric Baize:
Developing Secure Products in the Age of Advanced Persistent Threats. 88-92 - Daniel E. Geer Jr., Mukul Pareek:
ICS Update. 93-95 - Steven M. Bellovin:
Fighting the Last War. 96
Volume 10, Number 4, July - August 2012
- John Viega:
Cloud Security: Not a Problem. 3 - Shari Lawrence Pfleeger:
Security Measurement Steps, Missteps, and Next Steps. 5-9 - Shari Lawrence Pfleeger, Marc Rogers, Masooda N. Bashir, Kelly Caine, Deanna D. Caputo, Michael Losavio, Salvatore J. Stolfo:
Does Profiling Make Us More Secure? 10-15 - Lee Garber:
Security, Privacy, and Policy Roundup. 16-18 - Gary McGraw:
Silver Bullet Talks with Randy Sabett. 19-22 - Jose Nazario, John Kristoff:
Internet Infrastructure Security. 24-25 - Ahmad AlSa'deh, Christoph Meinel:
Secure Neighbor Discovery: Review, Challenges, Perspectives, and Recommendations. 26-34 - Matthew Dunlop, Stephen Groat, William Urbanski, Randy C. Marchany, Joseph G. Tront:
The Blind Man's Bluff Approach to Security Using IPv6. 35-43 - Sergio Sánchez García, Ana Gómez Oliva, Emilia Pérez Belleboni:
Is Europe Ready for a Pan-European Identity Management System? 44-49 - Jan Kallberg:
The Common Criteria Meets Realpolitik: Trust, Alliances, and Potential Betrayal. 50-53 - Frederick T. Sheldon, John Mark Weber, Seong-Moo Yoo, W. David Pan:
The Insecurity of Wireless Networks. 54-61 - György Dán, Henrik Sandberg, Mathias Ekstedt, Gunnar Björkman:
Challenges in Power System Information Security. 62-70 - Anthony Dessiatnikoff, Yves Deswarte, Eric Alata, Vincent Nicomette:
Potential Attacks on Onboard Aerospace Systems. 71-74 - Efstratios Gavas, Nasir D. Memon, Douglas Britton:
Winning Cybersecurity One Challenge at a Time. 75-79 - Helena Handschuh:
Hardware-Anchored Security Based on SRAM PUFs, Part 2. 80-81 - Chris Valasek:
Primitive-Chaining Exploits: A Real-World Example. 82-84 - Patrick D. McDaniel:
Bloatware Comes to the Smartphone. 85-87 - Michael Lesk:
Georgia on My Mind. 88-90 - Jeremiah Grossman:
The State of Website Security. 91-93 - Daniel E. Geer Jr., Bob Blakley:
Are You Smarter than the TSA? (Hint: No). 94-95 - Daniel E. Geer Jr., Jerry Archer:
Stand Your Ground. 96
Volume 10, Number 5, September - October 2012
- Robin E. Bloomfield:
Are Things Getting Worse? 3 - Gary McGraw:
Silver Bullet Talks with Kay Connelly. 5-7 - Lee Garber:
Security, Privacy, and Policy Roundup. 8-9 - Ann Cavoukian, Alan Davidson, Ed Felton, Marit Hansen, Susan Landau, Anna Slomovic:
Privacy: Front and Center. 10-15 - Michael Ian Shamos, Alec Yasinsac:
Realities of E-voting Security. 16-17 - Aleksander Essex, Urs Hengartner:
Hover: Trustworthy Elections with Hash-Only Verification. 18-24 - Richard Buckland, Roland Wen:
The Future of E-voting in Australia. 25-32 - Philip B. Stark, David A. Wagner:
Evidence-Based Elections. 33-41 - Mark Lindeman, Philip B. Stark:
A Gentle Introduction to Risk-Limiting Audits. 42-49 - Merle S. King, Brian Hancock:
Electronic Voting Security 10 Years after the Help America Vote Act. 50-52 - Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin, Salvatore J. Stolfo:
Usable, Secure, Private Search. 53-60 - Krishna K. Venkatasubramanian, Eugene Y. Vasserman, Oleg Sokolsky, Insup Lee:
Security and Interoperable-Medical-Device Systems, Part 1. 61-63 - Matt Bishop, Sean Peisert:
Security and Elections. 64-67 - John Viega, Hugh Thompson:
The State of Embedded-Device Security (Spoiler Alert: It's Bad). 68-70 - Joshua J. Pauli, Patrick Henry Engebretson:
Filling Your Cyber Operations Training Toolbox. 71-74 - Sean W. Smith:
Security and Cognitive Bias: Exploring the Role of the Mind. 75-78 - Michael Lesk:
The Price of Privacy. 79-81 - Zeljko Obrenovic, Bart den Haak:
Integrating User Customization and Authentication: The Identity Crisis. 82-85 - Daniel E. Geer Jr.:
Risk Aversion. 86-87 - Bruce Schneier:
The Importance of Security Engineering. 88
Volume 10, Number 6, November - December 2012
- John Viega:
Giving Back. 3-4 - Lee Garber:
Security, Privacy, Policy, and Dependability Roundup. 6-8 - Gary McGraw:
Silver Bullet Talks with Howard Schmidt. 9-12 - John Viega:
Ten Years On, How Are We Doing? (Spoiler Alert: We Have No Clue). 13-16 - Dan Thomsen, Jeremy Epstein, Peter G. Neumann:
Lost Treasures. 17-19 - Richard E. Smith:
A Contemporary Look at Saltzer and Schroeder's 1975 Design Principles. 20-25 - Steve Lipner, Trent Jaeger, Mary Ellen Zurko:
Lessons from VAX/SVS for High-Assurance VM Systems. 26-35 - Howard E. Shrobe, Daniel Adams:
Suppose We Got a Do-Over: A Revolution for Secure Computing. 36-39 - Steven J. Murdoch, Mike Bond, Ross J. Anderson:
How Certification Systems Fail: Lessons from the Ware Report. 40-44 - Jeffrey Todd McDonald, Todd R. Andel:
Integrating Historical Security Jewels in Information Assurance Education. 45-50 - Fernando Alonso-Fernandez, Julian Fiérrez, Javier Ortega-Garcia:
Quality Measures in Biometric Systems. 52-62 - Dinei A. F. Florêncio, Cormac Herley:
Is Everything We Know about Password Stealing Wrong? 63-69 - Eugene Y. Vasserman, Krishna K. Venkatasubramanian, Oleg Sokolsky, Insup Lee:
Security and Interoperable-Medical-Device Systems, Part 2: Failures, Consequences, and Classification. 70-73 - Susan Older, Shiu-Kai Chin:
Engineering Assurance at the Undergraduate Level. 74-77 - Michael Brennan:
Academic Impact at the Federal Trade Commission. 78-82 - Marco Prandini, Marco Ramilli:
Return-Oriented Programming. 84-87 - Rick Wash:
Folk Security. 88-90 - Josh Kebbel-Wyen:
Training an Army of Security Ninjas. 91-93 - Daniel E. Geer Jr., Daniel B. Larremore:
Progress Is Infectious. 94-95 - Steven M. Bellovin:
The Major Cyberincident Investigations Board. 96
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.