default search action
IEEE Security & Privacy, Volume 14
Volume 14, Number 1, January - February 2016
- Ahmad-Reza Sadeghi:
Games without Frontiers: Whither Information Security and Privacy? 3-5 - Gary McGraw:
Silver Bullet Talks with Peiter (Mudge) Zatko. 7-10 - Shari Lawrence Pfleeger:
Software Everywhere. 11 - Roland L. Trope, Eugene K. Ressler:
Mettle Fatigue: VW's Single-Point-of-Failure Ethics. 12-30 - Charles P. Pfleeger:
Looking into Software Transparency. 31-36 - Constantinos Kolias, Angelos Stavrou, Jeffrey M. Voas, Irena Bojanova, D. Richard Kuhn:
Learning Internet-of-Things Security "Hands-On". 37-46 - Marc Lichtman, Jeffrey D. Poston, SaiDhiraj Amuru, Chowdhury Shahriar, T. Charles Clancy, R. Michael Buehrer, Jeffrey H. Reed:
A Communications Jamming Taxonomy. 47-54 - Yuta Nakashima, Tomoaki Ikeno, Noboru Babaguchi:
Evaluating Protection Capability for Visual Privacy Information. 55-61 - Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache:
Fully Homomorphic Encryption: Computations with a Blindfold. 63-67 - Angelos Oikonomopoulos, Cristiano Giuffrida, Sanjay Rawat, Herbert Bos:
Binary Rejuvenation: Applications and Challenges. 68-71 - Laura Amo:
Addressing Gender Gaps in Teens' Cybersecurity Engagement and Self-Efficacy. 72-75 - Jia Song, Jim Alves-Foss:
The DARPA Cyber Grand Challenge: A Competitor's Perspective, Part 2. 76-81 - Karen Elliott, Fabio Massacci, Julian Williams:
Action, Inaction, Trust, and Cybersecurity's Common Property Problem. 82-86 - Bruce Schneier:
Cryptography Is Harder than It Looks. 87-88
Volume 14, Number 2, March - April 2016
- Jeremy Epstein:
Reflections of an NSF Program Officer. 3-6 - Gary McGraw:
Silver Bullet Talks with Jamie Butler. 8-10 - Terry Benzel:
The IEEE Security and Privacy Symposium Workshops. 12-14 - Paul Syverson, Griffin Boyce:
Bake in .onion for Tear-Free and Stronger Website Authentication. 15-21 - Amit Levy, Henry Corrigan-Gibbs, Dan Boneh:
Stickler: Defending against Malicious Content Distribution Networks in an Unmodified Browser. 22-28 - Aviv Ron, Alexandra Shulman-Peleg, Anton Puzanov:
Analysis and Mitigation of NoSQL Injections. 30-39 - Seda Gurses, José M. del Álamo:
Privacy Engineering: Shaping an Emerging Field of Research and Practice. 40-46 - Benjamin Stritter, Felix C. Freiling, Hartmut König, René Rietz, Steffen Ullrich, Alexander von Gernler, Felix Erlacher, Falko Dressler:
Cleaning up Web 2.0's Security Mess-at Least Partly. 48-57 - Chris Jay Hoofnagle:
Assessing the Federal Trade Commission's Privacy Assessments. 58-64 - Sebastian Lins, Pascal Grochol, Stephan Schneider, Ali Sunyaev:
Dynamic Certification of Cloud Services: Trust, but Verify! 66-71 - Sarah Zatko:
Rethinking the Role of Security in Undergraduate Education. 73-78 - John Scott-Railton:
Security for the High-Risk User: Separate and Unequal. 79-87 - Daniel E. Geer Jr.:
Provenance. 88
Volume 14, Number 3, May - June 2016
- Bill G. Horne:
Trust Me. Trust Me Not. 3-5 - Gary McGraw:
Silver Bullet Talks with Jacob West. 7-10 - Massimo Felici, Nick Wainwright, Simona Cavallini, Fabio Bisogni:
What's New in the Economics of Cybersecurity? 11-13 - Wolter Pieters, Jeroen Barendse, Margaret Ford, Claude P. R. Heath, Christian W. Probst, Ruud Verbij:
The Navigation Metaphor in Security Economics. 14-21 - Aurélien Faravelon, Stéphane Frénot, Stéphane Grumbach:
Chasing Data in the Intermediation Era: Economy and Security at Stake. 22-31 - Ziming Zhao, Mukund Sankaran, Gail-Joon Ahn, Thomas J. Holt, Yiming Jing, Hongxin Hu:
Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces. 32-43 - Chad Dacus, Panayotis A. Yannakogeorgos:
Designing Cybersecurity into Defense Systems: An Information Economics Approach. 44-51 - Fabio Massacci, Raminder S. Ruprai, Matthew Collinson, Julian Williams:
Economic Impacts of Rules- versus Risk-Based Cybersecurity Regulations for Critical Infrastructure Providers. 52-60 - Marco Ghiglieri, Michael Waidner:
HbbTV Security and Privacy: Issues and Challenges. 61-67 - Patrick D. McDaniel, Nicolas Papernot, Z. Berkay Celik:
Machine Learning in Adversarial Settings. 68-72 - Rubén Trapero, Jesus Luna, Neeraj Suri:
Quantifiably Trusting the Cloud: Putting Metrics to Work. 73-77 - Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache:
Cdoe Obofsucaitn: Securing Software from Within. 78-81 - Debi Ashenden, Darren Lawrence:
Security Dialogues: Building Better Relationships between Security and Business. 82-87 - Steven M. Bellovin:
Attack Surfaces. 88
Volume 14, Number 4, July - August 2016
- Terry Benzel:
The Growth of a Conference, a Community, and an Industry. 3-5 - Gary McGraw:
Silver Bullet Talks with Martin Hellman. 7-11 - Qingyun Li, Lei Zhang:
The Public Security and Personal Privacy Survey: Biometric Technology in Hong Kong. 12-21 - Jussi Laakkonen, Janne Parkkila, Pekka Jäppinen, Jouni Ikonen, Ahmed Seffah:
Incorporating Privacy into Digital Game Platform Design: The What, Why, and How. 22-32 - Madhusanka Liyanage, Ahmed Bux Abro, Mika Ylianttila, Andrei V. Gurtov:
Opportunities and Challenges of Software-Defined Mobile Networks in Network Security. 34-44 - Aditya K. Sood, Sherali Zeadally:
A Taxonomy of Domain-Generation Algorithms. 46-53 - Diego A. Ortiz-Yepes:
A Review of Technical Approaches to Realizing Near-Field Communication Mobile Payments. 54-62 - Craig Burton, Chris Culnane, Steve A. Schneider:
vVote: Verifiable Electronic Voting in Practice. 64-73 - Baijian Justin Yang, Brian Kirk:
Try-CybSI: A Platform for Trying Out Cybersecurity. 74-75 - Logan O. Mailloux, Michael McEvilley, Stephen Khou, John M. Pecarina:
Putting the "Systems" in Security Engineering: An Examination of NIST Special Publication 800-160. 76-80 - Robert K. Cunningham, Pamela Gupta, Ulf Lindqvist, Stelios Sidiroglou-Douskos, Michael Hicks:
IEEE SecDev 2016: Prioritizing Secure Development. 82-84 - Daniel E. Geer Jr.:
Privacy's Paradigm. 87-88
Volume 14, Number 5, September - October 2016
- Susan Landau:
Is It Legal? Is It Right? The Can and Should of Use. 3-5 - Marcus J. Ranum:
Silver Bullet Talks with Gary McGraw. 7-10 - M. Angela Sasse, Matthew Smith:
The Security-Usability Tradeoff Myth [Guest editors' introduction]. 11-13 - Mary Theofanos, Simson L. Garfinkel, Yee-Yin Choong:
Secure and Usable Enterprise Authentication: Lessons from the Field. 14-21 - Deanna D. Caputo, Shari Lawrence Pfleeger, M. Angela Sasse, Paul Ammann, Jeff Offutt, Lin Deng:
Barriers to Usable Security? Three Organizational Case Studies. 22-32 - M. Angela Sasse, Matthew Smith, Cormac Herley, Heather Lipford, Kami Vaniea:
Debunking Security-Usability Tradeoff Myths. 33-39 - Matthew Green, Matthew Smith:
Developers are Not the Enemy!: The Need for Usable Security APIs. 40-46 - David W. Archer, Dan Bogdanov, Benny Pinkas, Pille Pullonen:
Maturity and Performance of Programmable Secure Computation. 48-56 - Ahmad-Reza Sadeghi, Ghada Dessouky:
Security & Privacy Week Interviews, Part 1. 58-67 - Rita Heimes:
Global InfoSec and Breach Standards. 68-72 - Ivo Flammer:
Genteel Wearables: Bystander-Centered Design. 73-79 - Hui Xu, Michael R. Lyu:
Assessing the Security Properties of Software Obfuscation. 80-83 - Tina Ladabouche, Steve LaFountain:
GenCyber: Inspiring the Next Generation of Cyber Stars. 84-86 - Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache:
White-Box Cryptography: Security in an Insecure Environment. 88-92 - Jonathan Margulies, Michael Berg:
That Certificate You Bought Could Get You Hacked. 93-95 - Bruce Schneier:
Stop Trying to Fix the User. 96
Volume 14, Number 6, November - December 2016
- Gary McGraw:
Silver Bullet Talks with Jim Manico. 3-5 - Dan Boneh, Kenny Paterson, Nigel P. Smart:
Building a Community of Real-World Cryptographers. 7-9 - Phillip Rogaway:
Practice-Oriented Provable Security and the Social Construction of Cryptography. 10-17 - Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss:
miTLS: Verifying Protocol Implementations against Real-World Attacks. 18-25 - Aaron Tomb:
Automated Verification of Real-World Cryptographic Implementations. 26-33 - Neal Koblitz, Alfred Menezes:
A Riddle Wrapped in an Enigma. 34-42 - Lucas Dixon, Thomas Ristenpart, Thomas Shrimpton:
Network Traffic Obfuscation and Automated Internet Censorship. 43-53 - Shay Gueron:
Memory Encryption for General-Purpose Processors. 54-62 - Jingqiang Lin, Bo Luo, Le Guan, Jiwu Jing:
Secure Computing Using Registers and Caches: The Problem, Challenges, and Solutions. 63-70 - Ahmad-Reza Sadeghi, Ghada Dessouky:
Security & Privacy Week Interviews, Part 2. 71-80 - Omer Tene:
Microsoft v. USA: Location of Data and the Law of the Horse. 81-85 - Christof Fetzer:
Building Critical Applications Using Microservices. 86-89 - Portia Pusey, Mark A. Gondree, Zachary N. J. Peterson:
The Outcomes of Cybersecurity Competitions and Implications for Underrepresented Populations. 90-95 - Steven M. Bellovin:
Easy Email Encryption. 96
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.