Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ieeesp/ieeesp1.bht:"
@article{DBLP:journals/ieeesp/AgrawalK03, author = {Dakshi Agrawal and Dogan Kesdogan}, title = {Measuring Anonymity: The Disclosure Attack}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {27--34}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1253565}, doi = {10.1109/MSECP.2003.1253565}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/AgrawalK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Ahmad03, author = {Dave Ahmad}, title = {The Rising Threat of Vulnerabilities Due to Integer Errors}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {77--82}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219077}, doi = {10.1109/MSECP.2003.1219077}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Ahmad03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Aljifri03, author = {Hassan Aljifri}, title = {{IP} Traceback: {A} New Denial-of-Service Deterrent?}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {3}, pages = {24--31}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1203219}, doi = {10.1109/MSECP.2003.1203219}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Aljifri03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Amin03, author = {Massoud Amin}, title = {North America's Electricity Infrastructure: Are We Ready for More Perfect Storms?}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {19--25}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236231}, doi = {10.1109/MSECP.2003.1236231}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Amin03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Andresen03, author = {Scott L. Andresen}, title = {New Draft to Secure Cyberspace Leaked}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {13}, year = {2003}, url = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10001}, doi = {10.1109/MSP.2003.10001}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Andresen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Andresen03a, author = {Scott L. Andresen}, title = {News Briefs}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {12--13}, year = {2003}, url = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10008}, doi = {10.1109/MSP.2003.10008}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Andresen03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Andresen03b, author = {Scott L. Andresen}, title = {News Briefs}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {12--13}, year = {2003}, url = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10011}, doi = {10.1109/MSP.2003.10011}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Andresen03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Arce03, author = {Iv{\'{a}}n Arce}, title = {The Weakest Link Revisited}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {2}, pages = {72--76}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1193216}, doi = {10.1109/MSECP.2003.1193216}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Arce03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Arce03a, author = {Iv{\'{a}}n Arce}, title = {The Rise of the Gadgets}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {78--81}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236241}, doi = {10.1109/MSECP.2003.1236241}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Arce03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ArceL03, author = {Iv{\'{a}}n Arce and Elias Levy}, title = {An Analysis of the Slapper Worm}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {82--87}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1177002}, doi = {10.1109/MSECP.2003.1177002}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ArceL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BallCM03, author = {Edward Ball and David W. Chadwick and Darren P. Mundy}, title = {Patient Privacy in Electronic Prescription Transfer}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {2}, pages = {77--80}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1193217}, doi = {10.1109/MSECP.2003.1193217}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BallCM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bishop03, author = {Matt Bishop}, title = {What Is Computer Security?}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {67--69}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1176998}, doi = {10.1109/MSECP.2003.1176998}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Bishop03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Blaze03, author = {Matt Blaze}, title = {Rights Amplification in Master-Keyed Mechanical Locks}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {2}, pages = {24--32}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1193208}, doi = {10.1109/MSECP.2003.1193208}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Blaze03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Burr03, author = {William E. Burr}, title = {Selecting the Advanced Encryption Standard}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {2}, pages = {43--52}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1193210}, doi = {10.1109/MSECP.2003.1193210}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Burr03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Caloyannides03, author = {Michael A. Caloyannides}, title = {Privacy vs. Information Technology}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {100--103}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1177005}, doi = {10.1109/MSECP.2003.1177005}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Caloyannides03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Caloyannides03a, author = {Michael A. Caloyannides}, title = {Engineering or Sloganeering? The Counterattack on Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {2}, pages = {84--87}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1193219}, doi = {10.1109/MSECP.2003.1193219}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Caloyannides03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Caloyannides03b, author = {Michael A. Caloyannides}, title = {Society Cannot Function Without Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {3}, pages = {84--86}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1203230}, doi = {10.1109/MSECP.2003.1203230}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Caloyannides03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Caloyannides03c, author = {Michael A. Caloyannides}, title = {The Assault on Logic}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {91--95}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219080}, doi = {10.1109/MSECP.2003.1219080}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Caloyannides03c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Caloyannides03d, author = {Michael A. Caloyannides}, title = {Keeping Offline Computer Usage Private}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {93--95}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236245}, doi = {10.1109/MSECP.2003.1236245}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Caloyannides03d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Caloyannides03e, author = {Michael A. Caloyannides}, title = {Digital "Evidence" and Reasonable Doubt}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {89--91}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1266366}, doi = {10.1109/MSECP.2003.1266366}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Caloyannides03e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Camp03, author = {L. Jean Camp}, title = {Access Denied}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {82--85}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236242}, doi = {10.1109/MSECP.2003.1236242}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Camp03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Campbell03, author = {Robert J. Campbell}, title = {Crime Scene Investigators: The Next Generation}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {15}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236229}, doi = {10.1109/MSECP.2003.1236229}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Campbell03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CapekCW03, author = {Peter G. Capek and David M. Chess and Steve R. White}, title = {Merry Christma: An Early Network Worm}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {26--34}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236232}, doi = {10.1109/MSECP.2003.1236232}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CapekCW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CollbergMH03, author = {Christian S. Collberg and Ginger Myles and Andrew Huntwork}, title = {Sandmark--A Tool for Software Protection Research}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {40--49}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219058}, doi = {10.1109/MSECP.2003.1219058}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/CollbergMH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Cowan03, author = {Crispin Cowan}, title = {Software Security for Open-Source Systems}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {38--45}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1176994}, doi = {10.1109/MSECP.2003.1176994}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Cowan03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Cranor03, author = {Lorrie Faith Cranor}, title = {{P3P:} Making Privacy Policies More Useful}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {50--55}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1253568}, doi = {10.1109/MSECP.2003.1253568}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Cranor03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Cybenko03, author = {George Cybenko}, title = {A Critical Need, An Ambitious Mission, {A} New Magazine}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {5--9}, year = {2003}, url = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10000}, doi = {10.1109/MSP.2003.10000}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Cybenko03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Cybenko03a, author = {George Cybenko}, title = {From the Editor: Sapphire/Slammer Redux}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {2}, pages = {6}, year = {2003}, url = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10002}, doi = {10.1109/MSP.2003.10002}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Cybenko03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Cybenko03b, author = {George Cybenko}, title = {Boiling Frogs?}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {5}, year = {2003}, url = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10005}, doi = {10.1109/MSP.2003.10005}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Cybenko03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Cybenko03c, author = {George Cybenko}, title = {From the Editors: Privacy Is the Issue}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {5--7}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1253559}, doi = {10.1109/MSECP.2003.1253559}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Cybenko03c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DavisD03, author = {Jim Davis and Melissa Dark}, title = {Teaching Students to Design Secure Systems}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {2}, pages = {56--58}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1193212}, doi = {10.1109/MSECP.2003.1193212}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/DavisD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Dern03, author = {Daniel P. Dern}, title = {Privacy Concerns}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {2}, pages = {11--13}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1193206}, doi = {10.1109/MSECP.2003.1193206}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Dern03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Donner03, author = {Marc Donner}, title = {{AI} Bites Man?}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {63--66}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1176997}, doi = {10.1109/MSECP.2003.1176997}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Donner03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Donner03a, author = {Marc Donner}, title = {Post-Apocalypse Now}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {2}, pages = {53--55}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1193211}, doi = {10.1109/MSECP.2003.1193211}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Donner03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Donner03b, author = {Marc Donner}, title = {Toward a Security Ontology}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {3}, pages = {6--7}, year = {2003}, url = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10004}, doi = {10.1109/MSP.2003.10004}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Donner03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Donner03c, author = {Marc Donner}, title = {Hey, Robot!}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {3}, pages = {51--55}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1203222}, doi = {10.1109/MSECP.2003.1203222}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Donner03c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Donner03d, author = {Marc Donner}, title = {The Girl with No Eyes}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {60--64}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219072}, doi = {10.1109/MSECP.2003.1219072}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Donner03d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Endicott-Popovsky03, author = {Barbara Endicott{-}Popovsky}, title = {Ethics and Teaching Information Assurance}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {65--67}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219073}, doi = {10.1109/MSECP.2003.1219073}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Endicott-Popovsky03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Felten03, author = {Edward W. Felten}, title = {Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks?}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {3}, pages = {60--62}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1203224}, doi = {10.1109/MSECP.2003.1203224}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Felten03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Frincke03, author = {Deborah A. Frincke}, title = {Who Watches the Security Educators?}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {3}, pages = {56--58}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1203223}, doi = {10.1109/MSECP.2003.1203223}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Frincke03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Garfinkel03, author = {Simson L. Garfinkel}, title = {Email-Based Identification and Authentication: An Alternative to PKI?}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {20--26}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1253564}, doi = {10.1109/MSECP.2003.1253564}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Garfinkel03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GarfinkelS03, author = {Simson L. Garfinkel and Abhi Shelat}, title = {Remembrance of Data Passed: {A} Study of Disk Sanitization Practices}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {17--27}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1176992}, doi = {10.1109/MSECP.2003.1176992}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GarfinkelS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerAW03, author = {Daniel E. Geer Jr. and David Aucsmith and James A. Whittaker}, title = {Monoculture}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {14--19}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1253563}, doi = {10.1109/MSECP.2003.1253563}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerAW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerHJ03, author = {Daniel E. Geer Jr. and Kevin Soo Hoo and Andrew Jaquith}, title = {Information Security: Why the Future Belongs to the Quants}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {24--32}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219053}, doi = {10.1109/MSECP.2003.1219053}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerHJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GothA03, author = {Greg Goth and Scott L. Andresen}, title = {News}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {3}, pages = {8--13}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1203215}, doi = {10.1109/MSECP.2003.1203215}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GothA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GothA03a, author = {Greg Goth and Benjamin Alfonsi}, title = {News}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {8--13}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1253561}, doi = {10.1109/MSECP.2003.1253561}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GothA03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GothM03, author = {Greg Goth and Sandra Kay Miller}, title = {News}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {8--11}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236226}, doi = {10.1109/MSECP.2003.1236226}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GothM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HainesRTT03, author = {Joshua W. Haines and Dorene Kewley Ryder and Laura Tinnel and Stephen Taylor}, title = {Validation of Sensor Alert Correlators}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {46--56}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1176995}, doi = {10.1109/MSECP.2003.1176995}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/HainesRTT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HaririQDRR03, author = {Salim Hariri and Guangzhi Qu and Tushneem Dharmagadda and Modukuri Ramkishore and Cauligi S. Raghavendra}, title = {Impact Analysis of Faults and Attacks in Large-Scale Networks}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {49--54}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236235}, doi = {10.1109/MSECP.2003.1236235}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/HaririQDRR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Hearn03, author = {Jim Hearn}, title = {International Participation: The Continuing March Toward Security and Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {79--81}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1177001}, doi = {10.1109/MSECP.2003.1177001}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Hearn03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Hearn03a, author = {Jim Hearn}, title = {Moving Forward?}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {2}, pages = {70--71}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1193215}, doi = {10.1109/MSECP.2003.1193215}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Hearn03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Hearn03b, author = {Jim Hearn}, title = {Slow Dancing}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {3}, pages = {67--68}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1203226}, doi = {10.1109/MSECP.2003.1203226}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Hearn03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Hearn03c, author = {Jim Hearn}, title = {Keeping Up Appearances}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {75--76}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219076}, doi = {10.1109/MSECP.2003.1219076}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Hearn03c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Hearn03d, author = {Jim Hearn}, title = {What Works?}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {76--77}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236240}, doi = {10.1109/MSECP.2003.1236240}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Hearn03d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Heckman03, author = {Carey Heckman}, title = {Two Views on Security Software Liability: Using the Right Legal Tools}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {73--75}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1203443}, doi = {10.1109/MSECP.2003.1203443}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Heckman03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HowardL03, author = {Michael Howard and Steve Lipner}, title = {Inside the Windows Security Push}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {57--61}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1176996}, doi = {10.1109/MSECP.2003.1176996}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/HowardL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Irvine03, author = {Cynthia E. Irvine}, title = {Teaching Constructive Security}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {59--61}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1253570}, doi = {10.1109/MSECP.2003.1253570}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Irvine03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/IshitaniAM03, author = {Lucila Ishitani and Virg{\'{\i}}lio A. F. Almeida and Wagner Meira Jr.}, title = {Masks: Bringing Anonymity and Personalization Together}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {3}, pages = {18--23}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1203218}, doi = {10.1109/MSECP.2003.1203218}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/IshitaniAM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Landwehr03, author = {Carl E. Landwehr}, title = {From the Editor: Security Cosmology: Moving from Big Bang to Worlds in Collusion}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {5}, year = {2003}, url = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10012}, doi = {10.1109/MSP.2003.10012}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Landwehr03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Lenarcic03, author = {John Lenarcic}, title = {The Dinosaur and the Butterfly: {A} Tale of Computer Ethics}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {61--63}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236237}, doi = {10.1109/MSECP.2003.1236237}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Lenarcic03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Lesk03, author = {Michael Lesk}, title = {Copyright Extension: Eldred v. Ashcroft}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {76--78}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1177000}, doi = {10.1109/MSECP.2003.1177000}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Lesk03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Lesk03a, author = {Michael Lesk}, title = {Copyright Enforcement or Censorship: New Uses for the DMCA?}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {2}, pages = {67--69}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1193214}, doi = {10.1109/MSECP.2003.1193214}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Lesk03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Lesk03b, author = {Michael Lesk}, title = {The Good, the Bad, and the Ugly: What Might Change if We Had Good {DRM}}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {3}, pages = {63--66}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1203225}, doi = {10.1109/MSECP.2003.1203225}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Lesk03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Lesk03c, author = {Michael Lesk}, title = {Making the Copyright Law Work}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {73--74}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219075}, doi = {10.1109/MSECP.2003.1219075}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Lesk03c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Lesk03d, author = {Michael Lesk}, title = {Chicken Little and the Recorded Music Crisis}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {73--75}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236239}, doi = {10.1109/MSECP.2003.1236239}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Lesk03d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Lesk03e, author = {Michael Lesk}, title = {Feist and Facts: If Data Is Protected, Will It Be More or Less Available?}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {68--70}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1253572}, doi = {10.1109/MSECP.2003.1253572}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Lesk03e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Levy03, author = {Elias Levy}, title = {Poisoning the Software Supply Chain}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {3}, pages = {70--73}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1203227}, doi = {10.1109/MSECP.2003.1203227}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Levy03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Levy03a, author = {Elias Levy}, title = {The Making of a Spam Zombie Army: Dissecting the Sobig Worms}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {58--59}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219071}, doi = {10.1109/MSECP.2003.1219071}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Levy03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Levy03b, author = {Elias Levy}, title = {Crossover: Online Pests Plaguing the Offline World}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {71--73}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1253573}, doi = {10.1109/MSECP.2003.1253573}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Levy03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MatyasR03, author = {V{\'{a}}clav Maty{\'{a}}s Jr. and Zdenek R{\'{\i}}ha}, title = {Toward Reliable User Authentication through Biometrics}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {3}, pages = {45--49}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1203221}, doi = {10.1109/MSECP.2003.1203221}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MatyasR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McCarty03, author = {Bill McCarty}, title = {Botnets: Big and Bigger}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {87--90}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219079}, doi = {10.1109/MSECP.2003.1219079}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McCarty03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McCarty03a, author = {Bill McCarty}, title = {Automated Identity Theft}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {89--92}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236244}, doi = {10.1109/MSECP.2003.1236244}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McCarty03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McCarty03b, author = {Bill McCarty}, title = {The Honeynet Arms Race}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {79--82}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1253575}, doi = {10.1109/MSECP.2003.1253575}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McCarty03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McGrath03, author = {Dennis McGrath}, title = {Measuring the 4: 11 Effect: The Power Failure and the Internet}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {16--18}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236230}, doi = {10.1109/MSECP.2003.1236230}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McGrath03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McGraw03, author = {Gary McGraw}, title = {From the Ground Up: The {DIMACS} Software Security Workshop}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {2}, pages = {59--66}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1193213}, doi = {10.1109/MSECP.2003.1193213}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McGraw03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McLaughlinC03, author = {Laurianne McLaughlin and Rosemary Clandos}, title = {News}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {8--11}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219049}, doi = {10.1109/MSECP.2003.1219049}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McLaughlinC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Mead03, author = {Nancy R. Mead}, title = {Building a Foundation}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {3}, pages = {14}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1203217}, doi = {10.1109/MSECP.2003.1203217}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Mead03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Mead03a, author = {Nancy R. Mead}, title = {{SEHAS} 2003: The Future of High-Assurance Systems}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {68--72}, year = {2003}, url = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10013}, doi = {10.1109/MSP.2003.10013}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Mead03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Miller03, author = {Sandra Kay Miller}, title = {Legal Battle Looming for Internet Protections Acts}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {10--12}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1176991}, doi = {10.1109/MSECP.2003.1176991}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Miller03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MoorePSSSW03, author = {David Moore and Vern Paxson and Stefan Savage and Colleen Shannon and Stuart Staniford{-}Chen and Nicholas Weaver}, title = {Inside the Slammer Worm}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {33--39}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219056}, doi = {10.1109/MSECP.2003.1219056}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MoorePSSSW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/OppligerR03, author = {Rolf Oppliger and Ruedi Rytz}, title = {Digital Evidence: Dream and Reality}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {44--48}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236234}, doi = {10.1109/MSECP.2003.1236234}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/OppligerR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Orman03, author = {Hilarie K. Orman}, title = {The Morris Worm: {A} Fifteen-Year Perspective}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {35--43}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236233}, doi = {10.1109/MSECP.2003.1236233}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Orman03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PetroniA03, author = {Nick L. Petroni Jr. and William A. Arbaugh}, title = {The Dangers of Mitigating Security Design Flaws: {A} Wireless Case Study}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {28--36}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1176993}, doi = {10.1109/MSECP.2003.1176993}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/PetroniA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Potter03, author = {Bruce Potter}, title = {Wireless Security's Future}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {68--72}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219074}, doi = {10.1109/MSECP.2003.1219074}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Potter03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/PrabhakarPJ03, author = {Salil Prabhakar and Sharath Pankanti and Anil K. Jain}, title = {Biometric Recognition: Security and Privacy Concerns}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {2}, pages = {33--42}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1193209}, doi = {10.1109/MSECP.2003.1193209}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/PrabhakarPJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ProvosH03, author = {Niels Provos and Peter Honeyman}, title = {Hide and Seek: An Introduction to Steganography}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {3}, pages = {32--44}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1203220}, doi = {10.1109/MSECP.2003.1203220}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ProvosH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Quarterman03, author = {John S. Quarterman}, title = {The Ultimate in Instant Gratification}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {56--58}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1253569}, doi = {10.1109/MSECP.2003.1253569}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Quarterman03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RagsdaleWD03, author = {Daniel Ragsdale and Donald J. Welch and Ronald Dodge}, title = {Information Assurance the West Point Way}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {64--67}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236238}, doi = {10.1109/MSECP.2003.1236238}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RagsdaleWD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RezguiBE03, author = {Abdelmounaam Rezgui and Athman Bouguettaya and Mohamed Eltoweissy}, title = {Privacy on the Web: Facts, Challenges, and Solutions}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {40--49}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1253567}, doi = {10.1109/MSECP.2003.1253567}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RezguiBE03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Ryan03, author = {Daniel J. Ryan}, title = {Two Views on Security Software Liability: Let the Legal System Decide}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {70--72}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1176999}, doi = {10.1109/MSECP.2003.1176999}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Ryan03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Schneider03, author = {Fred B. Schneider}, title = {Least Privilege and More}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {55--59}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236236}, doi = {10.1109/MSECP.2003.1236236}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Schneider03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Schneier03, author = {Bruce Schneier}, title = {We Are All Security Consumers}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {104}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1177006}, doi = {10.1109/MSECP.2003.1177006}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Schneier03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Schneier03a, author = {Bruce Schneier}, title = {Locks and Full Disclosure}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {2}, pages = {88}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1193220}, doi = {10.1109/MSECP.2003.1193220}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Schneier03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Schneier03b, author = {Bruce Schneier}, title = {Guilty Until Proven Innocent?}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {3}, pages = {88, 87}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1203231}, doi = {10.1109/MSECP.2003.1203231}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Schneier03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Schneier03c, author = {Bruce Schneier}, title = {The Speed of Security}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {96}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219081}, doi = {10.1109/MSECP.2003.1219081}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Schneier03c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Schneier03d, author = {Bruce Schneier}, title = {Airplane Hackers}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {92}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1266367}, doi = {10.1109/MSECP.2003.1266367}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Schneier03d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SeigneurJ03, author = {Jean{-}Marc Seigneur and Christian Damsgaard Jensen}, title = {Privacy Recovery with Disposable Email Addresses}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {35--39}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1253566}, doi = {10.1109/MSECP.2003.1253566}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SeigneurJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Smith03, author = {Sean W. Smith}, title = {Fairy Dust, Secrets, and the Real World}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {89--93}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1177003}, doi = {10.1109/MSECP.2003.1177003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Smith03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Smith03a, author = {Sean W. Smith}, title = {Humans in the Loop: Human-Computer Interaction and Security}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {3}, pages = {75--79}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1203228}, doi = {10.1109/MSECP.2003.1203228}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Smith03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SmithRG03, author = {Sean W. Smith and Jothy Rosenberg and Adam Golodner}, title = {A Funny Thing Happened on the Way to the Marketplace}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {74--78}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1253574}, doi = {10.1109/MSECP.2003.1253574}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SmithRG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Spitzner03, author = {Lance Spitzner}, title = {The Honeynet Project: Trapping the Hackers}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {2}, pages = {15--23}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1193207}, doi = {10.1109/MSECP.2003.1193207}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Spitzner03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Stytz03, author = {Martin R. Stytz}, title = {The Case for Software Warranties}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {3}, pages = {80--82}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1203229}, doi = {10.1109/MSECP.2003.1203229}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Stytz03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Stytz03a, author = {Martin R. Stytz}, title = {Setting the Standard for Security Literature}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {14}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219051}, doi = {10.1109/MSECP.2003.1219051}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Stytz03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/StytzW03, author = {Martin R. Stytz and James A. Whittaker}, title = {Software Protection: Security's Last Stand?}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {1}, pages = {95--98}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1177004}, doi = {10.1109/MSECP.2003.1177004}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/StytzW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/StytzW03a, author = {Martin R. Stytz and James A. Whittaker}, title = {Caution: This Product Contains Security Code}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {86--88}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236243}, doi = {10.1109/MSECP.2003.1236243}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/StytzW03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Thompson03, author = {Herbert H. Thompson}, title = {Why Security Testing Is Hard}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {83--86}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219078}, doi = {10.1109/MSECP.2003.1219078}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Thompson03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Whittaker03, author = {James A. Whittaker}, title = {Why Secure Applications are Difficult to Write}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {2}, pages = {81--83}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1193218}, doi = {10.1109/MSECP.2003.1193218}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Whittaker03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Wing03, author = {Jeannette M. Wing}, title = {A Call to Action: Look Beyond the Horizon}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {62--67}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1253571}, doi = {10.1109/MSECP.2003.1253571}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Wing03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/X03, title = {Letters to the Editor}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {2}, pages = {7--10}, year = {2003}, url = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10003}, doi = {10.1109/MSP.2003.10003}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/X03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/X03a, title = {S{\&}P Welcomes New Editorial Board Members}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {6--7}, year = {2003}, url = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10007}, doi = {10.1109/MSP.2003.10007}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/X03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/X03b, title = {Bacon Ice Cream: The Best Mix of Proactive and Reactive Security?}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {53--57}, year = {2003}, url = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10006}, doi = {10.1109/MSP.2003.10006}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/X03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/X03c, title = {Security and Privacy Welcomes New Editorial Board Members}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {6--7}, year = {2003}, url = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10010}, doi = {10.1109/MSP.2003.10010}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/X03c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/X03d, title = {Letters to the Editor}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {14}, year = {2003}, url = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10014}, doi = {10.1109/MSP.2003.10014}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/X03d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/X03e, title = {2003 Annual Index {IEEE} Security {\&} Privacy Volume 1}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {83--88}, year = {2003}, url = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10015}, doi = {10.1109/MSP.2003.10015}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/X03e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/YasinsacEMPS03, author = {Alec Yasinsac and Robert F. Erbacher and Donald G. Marks and Mark Pollitt and Peter M. Sommer}, title = {Computer Forensics Education}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {15--23}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219052}, doi = {10.1109/MSECP.2003.1219052}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/YasinsacEMPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/YuWH03, author = {Ting Yu and Marianne Winslett and Jason E. Holt}, title = {Two Security Symposia}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {50--52}, year = {2003}, url = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10009}, doi = {10.1109/MSP.2003.10009}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/YuWH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.