default search action
IEEE Security & Privacy, Volume 15
Volume 15, Number 1, January - February 2017
- Ahmad-Reza Sadeghi:
Security and Privacy More Crucial than Ever. 3-4 - Gary McGraw:
Silver Bullet Talks with Marie Moe. 8-11 - Jacob Bellatti, Andrew Brunner, Joseph Lewis, Prasad Annadata, Wisam Eltarjaman, Rinku Dewri, Ramakrishna Thurimella:
Driving Habits Data: Location Privacy Implications and Solutions. 12-20 - Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino:
Overview of Mobile Containerization Approaches and Open Research Directions. 22-31 - Pawel Lubomski, Henryk Krawczyk:
Practical Evaluation of Internet Systems' Security Mechanisms. 32-40 - Manjur S. Kolhar, Mosleh M. Abu-Alhaj, Saied M. Abd El-atty:
Cloud Data Auditing Techniques with a Focus on Privacy and Security. 42-51 - Ezhil Kalaimannan, Jatinder N. D. Gupta:
The Security Development Lifecycle in the Context of Accreditation Policies and Standards. 52-57 - Hossein Homaei, Hamid Reza Shahriari:
Seven Years of Software Vulnerabilities: The Ebb and Flow. 58-65 - Ahmad-Reza Sadeghi, Ghada Dessouky:
Security & Privacy Week Interviews, Part 3. 66-74 - Franziska Roesner:
Designing Application Permission Models that Meet User Expectations. 75-79 - Nir Kshetri:
An Opinion on the "Report on Securing and Growing the Digital Economy". 80-85 - Daniel E. Geer Jr., Richard Danzig:
Mutual Dependence Demands Mutual Sharing. 87-88
Volume 15, Number 2, 2017
- Jeremy Epstein:
Privacy is Context Dependent. 5-6 - Gary McGraw:
Silver Bullet Talks with Lesley Carhart. 8-10 - Terry Benzel:
Selected Papers from the 2016 IEEE Symposium on Security and Privacy. 11-13 - Lucas Silva Figueiredo, David Molnar, Margus Veanes, Benjamin Livshits:
Prepose: Privacy, Security, and Reliability for Gesture-Based Programming. 14-23 - Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash:
Security Implications of Permission Models in Smart-Home Application Frameworks. 24-30 - Sashank Narain, Triet D. Vo-Huu, Kenneth Block, Guevara Noubir:
The Perils of User Tracking Using Zero-Permission Mobile Apps. 32-41 - Xiaolong Bai, Luyi Xing, Nan Zhang, XiaoFeng Wang, Xiaojing Liao, Tongxin Li, Shi-Min Hu:
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos. 42-49 - Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, Christian Stransky:
How Internet Resources Might Be Helping You Develop Faster but Less Securely. 50-60 - Matthew Tischer, Zakir Durumeric, Elie Bursztein, Michael D. Bailey:
The Danger of USB Drives. 62-69 - Chaz Lever, Robert J. Walls, Yacin Nadji, David Dagon, Patrick D. McDaniel, Manos Antonakakis:
Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains. 70-77 - Mohammed Aamir Ali, Budi Arief, Martin Emms, Aad P. A. van Moorsel:
Does the Online Card Payment Landscape Unwittingly Facilitate Fraud? 78-86 - Ahmad-Reza Sadeghi, Shaza Zeitouni:
ACM CCS 2016 Interviews, Part 1. 88-91 - Siona Listokin:
Does Industry Self-Regulation of Consumer Data Privacy Work? 92-95 - Marc Dacier, Hartmut König, Radoslaw Cwalinski, Frank Kargl, Sven Dietrich:
Security Challenges and Opportunities of Software-Defined Networking. 96-100 - Joshua I. James:
How Businesses Can Speed Up International Cybercrime Investigation. 102-106 - Bruce Schneier:
The Internet of Things Will Upend Our Industry. 108
Volume 15, Number 3, 2017
- Gary McGraw:
Silver Bullet Talks with Kate Pearce. 6-9 - Josh Benaloh, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
A Vote of Confidence? 12-13 - Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
An Efficient E2E Verifiable E-voting System without Setup Assumptions. 14-23 - Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer:
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security? 24-29 - Aleksander Essex:
Detecting the Detectable: Unintended Consequences of Cryptographic Election Verification. 30-38 - Jeroen van de Graaf:
Long-Term Threats to Ballot Privacy. 40-47 - Ronald L. Rivest, Philip B. Stark:
When Is an Election Verifiable? 48-50 - Aanjhan Ranganathan, Srdjan Capkun:
Are We Really Close? Verifying Proximity in Wireless Systems. 52-58 - Jay Aikat, Aditya Akella, Jeffrey S. Chase, Ari Juels, Michael K. Reiter, Thomas Ristenpart, Vyas Sekar, Michael M. Swift:
Rethinking Security in the Era of Cloud Computing. 60-69 - Ahmad-Reza Sadeghi, Shaza Zeitouni:
ACM CCS 2016 Interviews, Part 2. 70-76 - Chetan Gupta:
The Market's Law of Privacy: Case Studies in Privacy and Security Adoption. 78-83 - Sai Teja Peddinti, Keith W. Ross, Justin Cappos:
User Anonymity on Twitter. 84-87 - Richard S. Weiss, Franklyn A. Turbak, Jens Mache, Michael E. Locasto:
Cybersecurity Education and Assessment in EDURange. 90-95 - Steven M. Bellovin:
Jurisdiction and the Internet. 96
Volume 15, Number 4, 2017
- Gary McGraw:
Silver Bullet Talks with Kelly Lum. 7-10 - Johannes Buchmann, Kristin E. Lauter, Michele Mosca:
Postquantum Cryptography - State of the Art. 12-13 - John Mulholland, Michele Mosca, Johannes Braun:
The Day the Cryptography Dies. 14-21 - Kristin E. Lauter:
Postquantum Opportunities: Lattices, Homomorphic Encryption, and Supersingular Isogeny Graphs. 22-27 - Jintai Ding, Albrecht Petzoldt:
Current State of Multivariate Cryptography. 28-36 - Denis Butin:
Hash-Based Signatures: State of Play. 37-43 - Nicolas Sendrier:
Code-Based Cryptography: State of the Art and Perspectives. 44-50 - Lidong Chen:
Cryptography Standards in Quantum Time: New Wine in an Old Wineskin? 51-57 - Ahmad-Reza Sadeghi, Shaza Zeitouni:
ACM CCS 2016 Interview, Part 3. 58-61 - Bart P. Knijnenburg:
Privacy? I Can't Even! Making a Case for User-Tailored Privacy. 62-67 - Bryan Reinicke, Jeff W. Cummings, Howard Kleinberg:
The Right to Digital Self-Defense. 68-71 - Alan T. Sherman, Melissa Dark, Agnes H. Chan, Rylan Chong, Thomas H. Morris, Linda Oliva, John A. Springer, Bhavani Thuraisingham, Christopher Vatcher, Rakesh M. Verma, Susanne Wetzel:
INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research. 72-78 - Earlence Fernandes, Amir Rahmati, Kevin Eykholt, Atul Prakash:
Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? 79-84 - Archer L. Batcheller, Summer Craze Fowler, Robert K. Cunningham, Dinara Doyle, Trent Jaeger, Ulf Lindqvist:
Building on the Success of Building Security In. 85-87 - Daniel E. Geer Jr.:
Attribution. 88
Volume 15, Number 5, 2017
- Gary McGraw:
Silver Bullet Talks with Ksenia Dmitrieva-Peguero. 7-9 - Jean-Pierre Hubaux, Stefan Katzenbeisser, Bradley A. Malin:
Genomic Data Privacy and Security: Where We Stand and Where We Are Heading. 10-12 - Sara Renee Savage:
Characterizing the Risks and Harms of Linking Genomic Information to Individuals. 14-19 - Marina Blanton, Fattaneh Bayatbabolghani:
Improving the Security and Efficiency of Private Genomic Computation Using Server Aid. 20-28 - Erman Ayday, Mathias Humbert:
Inference Attacks against Kin Genomic Privacy. 29-37 - Tatiana Bradley, Xuhua Ding, Gene Tsudik:
Genomic Security (Lest We Forget). 38-46 - Adenekan Dedeke:
Cybersecurity Framework Adoption: Using Capability Levels for Implementation Tiers and Profiles. 47-54 - Robert W. Reeder, Iulia Ion, Sunny Consolvo:
152 Simple Steps to Stay Safe Online: Security Advice for Non-Tech-Savvy Users. 55-64 - Alexander Kott, Jackson Ludwig, Mona Lange:
Assessing Mission Impact of Cyberattacks: Toward a Model-Driven Paradigm. 65-74 - Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo:
Security and Privacy Experiences and Practices of Survivors of Intimate Partner Abuse. 76-81 - Rolf Oppliger:
Disillusioning Alice and Bob. 82-84 - Patrick Traynor, Kevin R. B. Butler, Jasmine D. Bowers, Bradley Reaves:
FinTechSec: Addressing the Security Challenges of Digital Financial Services. 85-89 - David OReilly:
Availability of Required Data to Support Criminal Investigations Involving Large-Scale IP Address-Sharing Technologies. 90-93 - Sean Peisert, Von Welch:
The Open Science Cyber Risk Profile: The Rosetta Stone for Open Science and Cybersecurity. 94-95 - Bruce Schneier:
IoT Security: What's Plan B? 96
Volume 15, Number 6, November / December 2017
- Gary McGraw:
Silver Bullet Talks with Nicole Perlroth. 7-9 - Wojciech Mazurczyk, Luca Caviglione, Steffen Wendzel:
Recent Advancements in Digital Forensics. 10-11 - Luca Caviglione, Steffen Wendzel, Wojciech Mazurczyk:
The Future of Digital Forensics: Challenges and the Road Ahead. 12-17 - Irfan Ahmed, Sebastian Obermeier, Sneha Sudhakaran, Vassil Roussev:
Programmable Logic Controller Forensics. 18-24 - Piotr Bazydlo, Krzysztof Lasota, Adam Kozakiewicz:
Botnet Fingerprinting: Anomaly Detection in SMTP Conversations. 25-32 - Amarnath Gupta, Subhasis Dasgupta, Aditya Bagchi:
PROFORMA: Proactive Forensics with Message Analytics. 33-41 - Maxim Chernyshev, Sherali Zeadally, Zubair A. Baig, Andrew Woodward:
Mobile Forensics: Advances, Challenges, and Research Opportunities. 42-51 - Bruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik:
An Exploration of the Effects of Sensory Stimuli on the Completion of Security Tasks. 52-60 - Nir Drucker, Shay Gueron, Benny Pinkas:
Faster Secure Cloud Computations with a Trusted Proxy. 61-67 - Fariborz Farahmand:
Decision and Experienced Utility: Computational Applications in Privacy Decision Making. 68-72 - Richard Chow:
The Last Mile for IoT Privacy. 73-76 - William H. Hawkins, Jason D. Hiser, Anh Nguyen-Tuong, Michele Co, Jack W. Davidson:
Securing Binary Code. 77-81 - Jan Peter van Zandwijk, Aya Fukami:
NAND Flash Memory Forensic Analysis and the Growing Challenge of Bit Errors. 82-87 - Steven M. Bellovin:
Who Are You? 88
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.