default search action
Bruce Schneier
Person information
- award (2007): EFF Pioneer Award
- affiliation: Harvard Kennedy School, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j85]Fredrik Heiding, Bruce Schneier, Arun Vishwanath, Jeremy Bernstein, Peter S. Park:
Devising and Detecting Phishing Emails Using Large Language Models. IEEE Access 12: 42131-42146 (2024) - [j84]Bruce Schneier:
LLMs' Data-Control Path Insecurity. Commun. ACM 67(9): 31-32 (2024) - [j83]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our pockets: the risks of client-side scanning. J. Cybersecur. 10(1) (2024) - [i14]Christopher Summerfield, Lisa Argyle, Michiel A. Bakker, Teddy Collins, Esin Durmus, Tyna Eloundou, Iason Gabriel, Deep Ganguli, Kobi Hackenburg, Gillian K. Hadfield, Luke Hewitt, Saffron Huang, Helene Landemore, Nahema Marchal, Aviv Ovadya, Ariel Procaccia, Mathias Risse, Bruce Schneier, Elizabeth Seger, Divya Siddarth, Henrik Skaug Sætra, MH Tessler, Matthew Botvinick:
How will advanced AI systems impact democracy? CoRR abs/2409.06729 (2024) - [i13]Fredrik Heiding, Simon Lermen, Andrew Kao, Bruce Schneier, Arun Vishwanath:
Evaluating Large Language Models' Capability to Launch Fully Automated Spear Phishing Campaigns: Validated on Human Subjects. CoRR abs/2412.00586 (2024) - 2023
- [j82]Bruce Schneier:
Trustworthy AI Means Public AI [Last Word]. IEEE Secur. Priv. 21(6): 95-96 (2023) - [i12]Nathan E. Sanders, Alex Ulinich, Bruce Schneier:
Demonstrations of the Potential of AI-based Political Issue Polling. CoRR abs/2307.04781 (2023) - [i11]Fredrik Heiding, Bruce Schneier, Arun Vishwanath, Jeremy Bernstein:
Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models. CoRR abs/2308.12287 (2023) - [i10]Stephen Farrell, Farzaneh Badii, Bruce Schneier, Steven M. Bellovin:
Reflections on Ten Years Past the Snowden Revelations. RFC 9446: 1-29 (2023) - 2022
- [j81]Bruce Schneier:
Robot Hacking Games. IEEE Secur. Priv. 20(1): 119-120 (2022) - [j80]Bruce Schneier:
NIST's Post-Quantum Cryptography Standards Competition. IEEE Secur. Priv. 20(5): 107-108 (2022) - 2021
- [j79]Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl E. Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, James Bret Michael:
Perspectives on the SolarWinds Incident. IEEE Secur. Priv. 19(2): 7-13 (2021) - [j78]Bruce Schneier:
What Will It Take? IEEE Secur. Priv. 19(3): 63-64 (2021) - [c55]Bruce Schneier:
Invited Talk: The Coming AI Hackers. CSCML 2021: 336-360 - [i9]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our Pockets: The Risks of Client-Side Scanning. CoRR abs/2110.07450 (2021) - [i8]Nathan E. Sanders, Bruce Schneier:
Machine Learning Featurizations for AI Hacking of Political Systems. CoRR abs/2110.09231 (2021) - 2020
- [j77]Bruce Schneier:
Attacking Machine Learning Systems. Computer 53(5): 78-80 (2020) - [j76]Karen Levy, Bruce Schneier:
Privacy threats in intimate relationships. J. Cybersecur. 6(1): tyaa006 (2020) - [j75]Bruce Schneier:
Technologists vs. Policy Makers. IEEE Secur. Priv. 18(1): 72-71 (2020) - [j74]Bruce Schneier:
Hacking the Tax Code. IEEE Secur. Priv. 18(5): 79-80 (2020) - [i7]Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar:
Politics of Adversarial Machine Learning. CoRR abs/2002.05648 (2020) - [i6]Karen Levy, Bruce Schneier:
Privacy threats in intimate relationships. CoRR abs/2006.03907 (2020) - [i5]Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert:
Legal Risks of Adversarial Machine Learning Research. CoRR abs/2006.16179 (2020)
2010 – 2019
- 2019
- [j73]Bruce Schneier:
Cybersecurity for the Public Interest. IEEE Secur. Priv. 17(1): 84-83 (2019) - 2018
- [j72]Bruce Schneier:
Artificial Intelligence and the Attack/Defense Balance. IEEE Secur. Priv. 16(2): 96 (2018) - [j71]Bruce Schneier:
Cryptography after the Aliens Land. IEEE Secur. Priv. 16(5): 86-88 (2018) - [j70]Bruce Schneier:
Unnoticed Consent [Last Word]. IEEE Secur. Priv. 16(6): 80-79 (2018) - 2017
- [j69]Bruce Schneier:
The Internet of Things Will Upend Our Industry. IEEE Secur. Priv. 15(2): 108 (2017) - [j68]Bruce Schneier:
IoT Security: What's Plan B? IEEE Secur. Priv. 15(5): 96 (2017) - 2016
- [j67]Bruce Schneier:
Cryptography Is Harder than It Looks. IEEE Secur. Priv. 14(1): 87-88 (2016) - [j66]Bruce Schneier:
Stop Trying to Fix the User. IEEE Secur. Priv. 14(5): 96 (2016) - 2015
- [j65]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats. Commun. ACM 58(10): 24-26 (2015) - [j64]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats: mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1(1): 69-79 (2015) - [j63]Bruce Schneier:
The Security Value of Muddling Through. IEEE Secur. Priv. 13(2): 108 (2015) - [j62]Bruce Schneier:
Ubiquitous Surveillance and Security [Keynote]. IEEE Technol. Soc. Mag. 34(3): 39-40 (2015) - [i4]Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart:
Surreptitiously Weakening Cryptographic Systems. IACR Cryptol. ePrint Arch. 2015: 97 (2015) - [i3]Richard L. Barnes, Bruce Schneier, Cullen Jennings, Ted Hardie, Brian Trammell, Christian Huitema, Daniel Borkmann:
Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement. RFC 7624: 1-24 (2015) - 2014
- [j61]Bruce Schneier:
Metadata = Surveillance. IEEE Secur. Priv. 12(2): 84 (2014) - [j60]Bruce Schneier:
The Future of Incident Response. IEEE Secur. Priv. 12(5): 96 (2014) - 2013
- [j59]Bruce Schneier:
IT for Oppression. IEEE Secur. Priv. 11(2): 96 (2013) - [j58]Bruce Schneier:
Trust in Man/Machine Security Systems. IEEE Secur. Priv. 11(5): 96 (2013) - [e3]Bruce Schneier:
Economics of Information Security and Privacy III [papers from the Tenth Workshop on Economics and Information Security, WEIS 2011]. Springer 2013, ISBN 978-1-4614-1980-8 [contents] - 2012
- [j57]Bruce Schneier:
How Changing Technology Affects Security. IEEE Secur. Priv. 10(2): 104 (2012) - [j56]Bruce Schneier:
The Importance of Security Engineering. IEEE Secur. Priv. 10(5): 88 (2012) - 2011
- [j55]Bruce Schneier:
Detecting Cheaters. IEEE Secur. Priv. 9(2): 96 (2011) - [j54]Bruce Schneier:
Empathy and Security. IEEE Secur. Priv. 9(5): 88 (2011) - [r2]Bruce Schneier:
Solitaire. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1229-1230 - 2010
- [b9]Niels Ferguson, Bruce Schneier, Tadayoshi Kohno:
Cryptography Engineering - Design Principles and Practical Applications. Wiley 2010, ISBN 978-0-470-47424-2, pp. I-XXIX, 1-353 - [j53]Bruce Schneier:
Security and Function Creep. IEEE Secur. Priv. 8(1): 88 (2010) - [j52]Bruce Schneier:
A Taxonomy of Social Networking Data. IEEE Secur. Priv. 8(4): 88 (2010) - [j51]Bruce Schneier:
Schneier on Security: Privacy and Control. J. Priv. Confidentiality 2(1) (2010) - [j50]Theo Dimitrakos, Fabio Martinelli, Bruce Schneier:
Special issue on security and trust management for dynamic coalitions. Secur. Commun. Networks 3(6): 453-455 (2010)
2000 – 2009
- 2009
- [j49]Bruce Schneier:
Architecture of Privacy. IEEE Secur. Priv. 7(1): 88 (2009) - [j48]Bruce Schneier:
Security, Group Size, and the Human Brain. IEEE Secur. Priv. 7(4): 88 (2009) - 2008
- [b8]Bruce Schneier:
Schneier on security. Wiley 2008, ISBN 978-0-470-39535-6, pp. I-VIII, 1-328 - [j47]Bruce Schneier:
How the Human Brain Buys Security. IEEE Secur. Priv. 6(4): 80 (2008) - [c54]Bruce Schneier:
The Psychology of Security. AFRICACRYPT 2008: 50-79 - [c53]Alexei Czeskis, David J. St. Hilaire, Karl Koscher, Steven D. Gribble, Tadayoshi Kohno, Bruce Schneier:
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications. HotSec 2008 - 2007
- [j46]Bruce Schneier:
The psychology of security. Commun. ACM 50(5): 128 (2007) - [j45]Bruce Schneier:
Nonsecurity Considerations in Security Decisions. IEEE Secur. Priv. 5(3): 88 (2007) - [j44]Bruce Schneier:
The Death of the Security Industry. IEEE Secur. Priv. 5(6): 88 (2007) - 2006
- [b7]Bruce Schneier:
Beyond fear - thinking sensibly about security in an uncertain world. Springer 2006, ISBN 978-0-387-02620-6, pp. 1-295 - [b6]Bruce Schneier:
Angewandte Kryptographie - Protokolle, Algorithmen und Sourcecode in C: der Klassiker. Pearson Education 2006, ISBN 978-3-8273-7228-4, pp. I-XXII, 1-844 - [j43]Bruce Schneier:
University Networks and Data Security. IEEE Secur. Priv. 4(5): 88-88 (2006) - 2005
- [j42]Bruce Schneier:
Two-factor authentication: too little, too late. Commun. ACM 48(4): 136 (2005) - [j41]Bruce Schneier:
Risks of third-party data. Commun. ACM 48(5): 136 (2005) - [j40]Ross J. Anderson, Bruce Schneier:
Guest Editors' Introduction: Economics of Information Security. IEEE Secur. Priv. 3(1): 12-13 (2005) - [j39]Bruce Schneier:
Authentication and Expiration. IEEE Secur. Priv. 3(1): 88 (2005) - [j38]Bruce Schneier:
The Zotob Storm. IEEE Secur. Priv. 3(6): 96 (2005) - [j37]Bruce Schneier:
Attack trends: 2004 and 2005. ACM Queue 3(5): 52-53 (2005) - [c52]John Kelsey, Bruce Schneier:
Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. EUROCRYPT 2005: 474-490 - [r1]Bruce Schneier:
Solitaire. Encyclopedia of Cryptography and Security 2005 - [i2]Paul E. Hoffman, Bruce Schneier:
Attacks on Cryptographic Hashes in Internet Protocols. RFC 4270: 1-12 (2005) - 2004
- [b5]Bruce Schneier:
Secrets and lies - IT-Sicherheit in einer vernetzten Welt. dpunkt.verlag 2004, ISBN 978-3-89864-302-3, pp. I-XI, 1-408 - [b4]Bruce Schneier:
Secrets and lies - digital security in a networked world: with new information about post-9/11 security. Wiley 2004, ISBN 978-0-471-45380-2, pp. I-XIII, 1-414 - [j36]Paul C. Kocher, Bruce Schneier:
Insider risks in elections. Commun. ACM 47(7): 104 (2004) - [j35]Bruce Schneier:
The nonsecurity of secrecy. Commun. ACM 47(10): 120 (2004) - [j34]Bruce Schneier:
Hacking the Business Climate for Network Security. Computer 37(4): 87-89 (2004) - [j33]Bruce Schneier:
Voting Security and Technology. IEEE Secur. Priv. 2(1): 84 (2004) - [j32]Bruce Schneier:
Security and Compliance. IEEE Secur. Priv. 2(3): 96 (2004) - [j31]Bruce Schneier:
Customers, Passwords, and Web Sites. IEEE Secur. Priv. 2(4): 88 (2004) - [j30]Bruce Schneier:
SIMS: Solution, or Part of the Problem? IEEE Secur. Priv. 2(5): 88 (2004) - [j29]Bruce Schneier:
Sensible Authentication. ACM Queue 1(10): 74-78 (2004) - [p1]Bruce Schneier:
Evaluating Security Systems: A Five-Step Process. Economics of Information Security 2004: 289-293 - [i1]John Kelsey, Bruce Schneier:
Second Preimages on n-bit Hash Functions for Much Less than 2n Work. IACR Cryptol. ePrint Arch. 2004: 304 (2004) - 2003
- [b3]Niels Ferguson, Bruce Schneier:
Practical cryptography. Wiley 2003, ISBN 978-0-471-22357-3, pp. I-XX, 1-410 - [j28]David L. Dill, Bruce Schneier, Barbara Simons:
Voting and technology: who gets to count your vote? Commun. ACM 46(8): 29-31 (2003) - [j27]Bruce Schneier:
We Are All Security Consumers. IEEE Secur. Priv. 1(1): 104 (2003) - [j26]Bruce Schneier:
Locks and Full Disclosure. IEEE Secur. Priv. 1(2): 88 (2003) - [j25]Bruce Schneier:
Guilty Until Proven Innocent? IEEE Secur. Priv. 1(3): 88, 87 (2003) - [j24]Bruce Schneier:
The Speed of Security. IEEE Secur. Priv. 1(4): 96 (2003) - [j23]Bruce Schneier:
Airplane Hackers. IEEE Secur. Priv. 1(6): 92 (2003) - [c51]Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno:
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. FSE 2003: 330-346 - 2002
- [c50]Kahil Jallad, Jonathan Katz, Bruce Schneier:
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. ISC 2002: 90-101 - 2001
- [j22]Bruce Schneier:
Insurance and the computer industry. Commun. ACM 44(3): 114-115 (2001) - [j21]Bruce Schneier:
Cyber underwriters lab. Commun. ACM 44(4): 128 (2001) - [j20]Stephan Somogyi, Bruce Schneier:
The perils of port 80. Commun. ACM 44(10): 168 (2001) - [j19]Bruce Schneier:
Managed Security Monitoring: Network Security for the 21st Centur. Comput. Secur. 20(6): 491-503 (2001) - [e2]Bruce Schneier:
Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings. Lecture Notes in Computer Science 1978, Springer 2001, ISBN 3-540-41728-1 [contents] - 2000
- [j18]Carl M. Ellison, Bruce Schneier:
Risks of PKI: Secure Email. Commun. ACM 43(1): 160 (2000) - [j17]Carl M. Ellison, Bruce Schneier:
Risks of PKI: E-Commerce. Commun. ACM 43(2): 152 (2000) - [j16]Bruce Schneier:
Semantic network attacks. Commun. ACM 43(12): 168 (2000) - [j15]Bruce Schneier:
A Self-Study Course in Block-Cipher Cryptanalysis. Cryptologia 24(1): 18-33 (2000) - [j14]Carl M. Ellison, Chris Hall, Randy Milbert, Bruce Schneier:
Protecting secret keys with personal entropy. Future Gener. Comput. Syst. 16(4): 311-318 (2000) - [j13]John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Side Channel Cryptanalysis of Product Ciphers. J. Comput. Secur. 8(2/3): 141-158 (2000) - [c49]Niels Ferguson, Bruce Schneier, David A. Wagner:
Security Weaknesses in a Randomized Stream Cipher. ACISP 2000: 234-241 - [c48]Bruce Schneier, Doug Whiting:
A Performance Comparison of the Five AES Finalists. AES Candidate Conference 2000: 123-135 - [c47]John Kelsey, Bruce Schneier:
MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants. AES Candidate Conference 2000: 169-185 - [c46]Tadayoshi Kohno, John Kelsey, Bruce Schneier:
Preliminary Cryptanalysis of Reduced-Round Serpent. AES Candidate Conference 2000: 195-211 - [c45]Bruce Schneier, John Kelsey, Doug Whiting, David A. Wagner, Niels Ferguson:
Comments on Twofish as an AES Candidate. AES Candidate Conference 2000: 355-356 - [c44]John Kelsey, Tadayoshi Kohno, Bruce Schneier:
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. FSE 2000: 75-93 - [c43]Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Michael Stay, David A. Wagner, Doug Whiting:
Improved Cryptanalysis of Rijndael. FSE 2000: 213-230 - [c42]Jonathan Katz, Bruce Schneier:
A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols. USENIX Security Symposium 2000 - [e1]Jean-Jacques Quisquater, Bruce Schneier:
Smart Card Research and Applications, This International Conference, CARDIS '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings. Lecture Notes in Computer Science 1820, Springer 2000, ISBN 3-540-67923-5 [contents]
1990 – 1999
- 1999
- [j12]Bruce Schneier:
The Uses and Abuses of Biometrics. Commun. ACM 42(8): 136 (1999) - [j11]Bruce Schneier:
The Trojan Horse Race. Commun. ACM 42(9): 128 (1999) - [j10]Bruce Schneier:
Risks of Relying on Cryptography. Commun. ACM 42(10): 144 (1999) - [j9]Bruce Schneier:
Cryptography: The Importance of Not Being Different. Computer 32(3): 108-109 (1999) - [j8]John Kelsey, Bruce Schneier:
The Street Performer Protocol and Digital Copyrights. First Monday 4(6) (1999) - [j7]Bruce Schneier, John Kelsey:
Secure Audit Logs to Support Computer Forensics. ACM Trans. Inf. Syst. Secur. 2(2): 159-176 (1999) - [c41]Bruce Schneier, Mudge, David A. Wagner:
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2). CQRE 1999: 192-203 - [c40]John Kelsey, Bruce Schneier, David A. Wagner:
Mod n Cryptanalysis, with Applications Against RC5P and M6. FSE 1999: 139-155 - [c39]Chris Hall, Ian Goldberg, Bruce Schneier:
Reaction Attacks against several Public-Key Cryptosystems. ICICS 1999: 2-12 - [c38]John Kelsey, Bruce Schneier:
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs. Recent Advances in Intrusion Detection 1999 - [c37]John Kelsey, Bruce Schneier, Niels Ferguson:
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. Selected Areas in Cryptography 1999: 13-33 - [c36]John Kelsey, Bruce Schneier:
Key-Schedule Cryptanalysis of DEAL. Selected Areas in Cryptography 1999: 118-134 - [c35]John Kelsey, Bruce Schneier:
Authenticating Secure Tokens Using Slow Memory Access. Smartcard 1999 - 1998
- [j6]