Search dblp for Publications

export results for "toc:db/journals/ieeesp/ieeesp1.bht:"

 download as .bib file

@article{DBLP:journals/ieeesp/AgrawalK03,
  author       = {Dakshi Agrawal and
                  Dogan Kesdogan},
  title        = {Measuring Anonymity: The Disclosure Attack},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {27--34},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1253565},
  doi          = {10.1109/MSECP.2003.1253565},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AgrawalK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Ahmad03,
  author       = {Dave Ahmad},
  title        = {The Rising Threat of Vulnerabilities Due to Integer Errors},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {77--82},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219077},
  doi          = {10.1109/MSECP.2003.1219077},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Ahmad03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Aljifri03,
  author       = {Hassan Aljifri},
  title        = {{IP} Traceback: {A} New Denial-of-Service Deterrent?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {24--31},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203219},
  doi          = {10.1109/MSECP.2003.1203219},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Aljifri03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Amin03,
  author       = {Massoud Amin},
  title        = {North America's Electricity Infrastructure: Are We Ready for More
                  Perfect Storms?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {19--25},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236231},
  doi          = {10.1109/MSECP.2003.1236231},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Amin03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Andresen03,
  author       = {Scott L. Andresen},
  title        = {New Draft to Secure Cyberspace Leaked},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {13},
  year         = {2003},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10001},
  doi          = {10.1109/MSP.2003.10001},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Andresen03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Andresen03a,
  author       = {Scott L. Andresen},
  title        = {News Briefs},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {12--13},
  year         = {2003},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10008},
  doi          = {10.1109/MSP.2003.10008},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Andresen03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Andresen03b,
  author       = {Scott L. Andresen},
  title        = {News Briefs},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {12--13},
  year         = {2003},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10011},
  doi          = {10.1109/MSP.2003.10011},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Andresen03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Arce03,
  author       = {Iv{\'{a}}n Arce},
  title        = {The Weakest Link Revisited},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {72--76},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1193216},
  doi          = {10.1109/MSECP.2003.1193216},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Arce03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Arce03a,
  author       = {Iv{\'{a}}n Arce},
  title        = {The Rise of the Gadgets},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {78--81},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236241},
  doi          = {10.1109/MSECP.2003.1236241},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Arce03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ArceL03,
  author       = {Iv{\'{a}}n Arce and
                  Elias Levy},
  title        = {An Analysis of the Slapper Worm},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {82--87},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1177002},
  doi          = {10.1109/MSECP.2003.1177002},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ArceL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BallCM03,
  author       = {Edward Ball and
                  David W. Chadwick and
                  Darren P. Mundy},
  title        = {Patient Privacy in Electronic Prescription Transfer},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {77--80},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1193217},
  doi          = {10.1109/MSECP.2003.1193217},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BallCM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bishop03,
  author       = {Matt Bishop},
  title        = {What Is Computer Security?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {67--69},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1176998},
  doi          = {10.1109/MSECP.2003.1176998},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bishop03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Blaze03,
  author       = {Matt Blaze},
  title        = {Rights Amplification in Master-Keyed Mechanical Locks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {24--32},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1193208},
  doi          = {10.1109/MSECP.2003.1193208},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Blaze03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Burr03,
  author       = {William E. Burr},
  title        = {Selecting the Advanced Encryption Standard},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {43--52},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1193210},
  doi          = {10.1109/MSECP.2003.1193210},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Burr03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Caloyannides03,
  author       = {Michael A. Caloyannides},
  title        = {Privacy vs. Information Technology},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {100--103},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1177005},
  doi          = {10.1109/MSECP.2003.1177005},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Caloyannides03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Caloyannides03a,
  author       = {Michael A. Caloyannides},
  title        = {Engineering or Sloganeering? The Counterattack on Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {84--87},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1193219},
  doi          = {10.1109/MSECP.2003.1193219},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Caloyannides03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Caloyannides03b,
  author       = {Michael A. Caloyannides},
  title        = {Society Cannot Function Without Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {84--86},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203230},
  doi          = {10.1109/MSECP.2003.1203230},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Caloyannides03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Caloyannides03c,
  author       = {Michael A. Caloyannides},
  title        = {The Assault on Logic},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {91--95},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219080},
  doi          = {10.1109/MSECP.2003.1219080},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Caloyannides03c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Caloyannides03d,
  author       = {Michael A. Caloyannides},
  title        = {Keeping Offline Computer Usage Private},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {93--95},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236245},
  doi          = {10.1109/MSECP.2003.1236245},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Caloyannides03d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Caloyannides03e,
  author       = {Michael A. Caloyannides},
  title        = {Digital "Evidence" and Reasonable Doubt},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {89--91},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1266366},
  doi          = {10.1109/MSECP.2003.1266366},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Caloyannides03e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Camp03,
  author       = {L. Jean Camp},
  title        = {Access Denied},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {82--85},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236242},
  doi          = {10.1109/MSECP.2003.1236242},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Camp03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Campbell03,
  author       = {Robert J. Campbell},
  title        = {Crime Scene Investigators: The Next Generation},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {15},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236229},
  doi          = {10.1109/MSECP.2003.1236229},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Campbell03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CapekCW03,
  author       = {Peter G. Capek and
                  David M. Chess and
                  Steve R. White},
  title        = {Merry Christma: An Early Network Worm},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {26--34},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236232},
  doi          = {10.1109/MSECP.2003.1236232},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CapekCW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CollbergMH03,
  author       = {Christian S. Collberg and
                  Ginger Myles and
                  Andrew Huntwork},
  title        = {Sandmark--A Tool for Software Protection Research},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {40--49},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219058},
  doi          = {10.1109/MSECP.2003.1219058},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CollbergMH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Cowan03,
  author       = {Crispin Cowan},
  title        = {Software Security for Open-Source Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {38--45},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1176994},
  doi          = {10.1109/MSECP.2003.1176994},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Cowan03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Cranor03,
  author       = {Lorrie Faith Cranor},
  title        = {{P3P:} Making Privacy Policies More Useful},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {50--55},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1253568},
  doi          = {10.1109/MSECP.2003.1253568},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Cranor03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Cybenko03,
  author       = {George Cybenko},
  title        = {A Critical Need, An Ambitious Mission, {A} New Magazine},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {5--9},
  year         = {2003},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10000},
  doi          = {10.1109/MSP.2003.10000},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Cybenko03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Cybenko03a,
  author       = {George Cybenko},
  title        = {From the Editor: Sapphire/Slammer Redux},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {6},
  year         = {2003},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10002},
  doi          = {10.1109/MSP.2003.10002},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Cybenko03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Cybenko03b,
  author       = {George Cybenko},
  title        = {Boiling Frogs?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {5},
  year         = {2003},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10005},
  doi          = {10.1109/MSP.2003.10005},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Cybenko03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Cybenko03c,
  author       = {George Cybenko},
  title        = {From the Editors: Privacy Is the Issue},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {5--7},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1253559},
  doi          = {10.1109/MSECP.2003.1253559},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Cybenko03c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DavisD03,
  author       = {Jim Davis and
                  Melissa Dark},
  title        = {Teaching Students to Design Secure Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {56--58},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1193212},
  doi          = {10.1109/MSECP.2003.1193212},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DavisD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Dern03,
  author       = {Daniel P. Dern},
  title        = {Privacy Concerns},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {11--13},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1193206},
  doi          = {10.1109/MSECP.2003.1193206},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Dern03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Donner03,
  author       = {Marc Donner},
  title        = {{AI} Bites Man?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {63--66},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1176997},
  doi          = {10.1109/MSECP.2003.1176997},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Donner03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Donner03a,
  author       = {Marc Donner},
  title        = {Post-Apocalypse Now},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {53--55},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1193211},
  doi          = {10.1109/MSECP.2003.1193211},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Donner03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Donner03b,
  author       = {Marc Donner},
  title        = {Toward a Security Ontology},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {6--7},
  year         = {2003},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10004},
  doi          = {10.1109/MSP.2003.10004},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Donner03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Donner03c,
  author       = {Marc Donner},
  title        = {Hey, Robot!},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {51--55},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203222},
  doi          = {10.1109/MSECP.2003.1203222},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Donner03c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Donner03d,
  author       = {Marc Donner},
  title        = {The Girl with No Eyes},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {60--64},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219072},
  doi          = {10.1109/MSECP.2003.1219072},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Donner03d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Endicott-Popovsky03,
  author       = {Barbara Endicott{-}Popovsky},
  title        = {Ethics and Teaching Information Assurance},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {65--67},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219073},
  doi          = {10.1109/MSECP.2003.1219073},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Endicott-Popovsky03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Felten03,
  author       = {Edward W. Felten},
  title        = {Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {60--62},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203224},
  doi          = {10.1109/MSECP.2003.1203224},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Felten03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Frincke03,
  author       = {Deborah A. Frincke},
  title        = {Who Watches the Security Educators?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {56--58},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203223},
  doi          = {10.1109/MSECP.2003.1203223},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Frincke03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Garfinkel03,
  author       = {Simson L. Garfinkel},
  title        = {Email-Based Identification and Authentication: An Alternative to PKI?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {20--26},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1253564},
  doi          = {10.1109/MSECP.2003.1253564},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Garfinkel03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GarfinkelS03,
  author       = {Simson L. Garfinkel and
                  Abhi Shelat},
  title        = {Remembrance of Data Passed: {A} Study of Disk Sanitization Practices},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {17--27},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1176992},
  doi          = {10.1109/MSECP.2003.1176992},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GarfinkelS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GeerAW03,
  author       = {Daniel E. Geer Jr. and
                  David Aucsmith and
                  James A. Whittaker},
  title        = {Monoculture},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {14--19},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1253563},
  doi          = {10.1109/MSECP.2003.1253563},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GeerAW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GeerHJ03,
  author       = {Daniel E. Geer Jr. and
                  Kevin Soo Hoo and
                  Andrew Jaquith},
  title        = {Information Security: Why the Future Belongs to the Quants},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {24--32},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219053},
  doi          = {10.1109/MSECP.2003.1219053},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GeerHJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GothA03,
  author       = {Greg Goth and
                  Scott L. Andresen},
  title        = {News},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {8--13},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203215},
  doi          = {10.1109/MSECP.2003.1203215},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GothA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GothA03a,
  author       = {Greg Goth and
                  Benjamin Alfonsi},
  title        = {News},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {8--13},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1253561},
  doi          = {10.1109/MSECP.2003.1253561},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GothA03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GothM03,
  author       = {Greg Goth and
                  Sandra Kay Miller},
  title        = {News},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {8--11},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236226},
  doi          = {10.1109/MSECP.2003.1236226},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GothM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HainesRTT03,
  author       = {Joshua W. Haines and
                  Dorene Kewley Ryder and
                  Laura Tinnel and
                  Stephen Taylor},
  title        = {Validation of Sensor Alert Correlators},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {46--56},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1176995},
  doi          = {10.1109/MSECP.2003.1176995},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HainesRTT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HaririQDRR03,
  author       = {Salim Hariri and
                  Guangzhi Qu and
                  Tushneem Dharmagadda and
                  Modukuri Ramkishore and
                  Cauligi S. Raghavendra},
  title        = {Impact Analysis of Faults and Attacks in Large-Scale Networks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {49--54},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236235},
  doi          = {10.1109/MSECP.2003.1236235},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HaririQDRR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Hearn03,
  author       = {Jim Hearn},
  title        = {International Participation: The Continuing March Toward Security
                  and Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {79--81},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1177001},
  doi          = {10.1109/MSECP.2003.1177001},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Hearn03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Hearn03a,
  author       = {Jim Hearn},
  title        = {Moving Forward?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {70--71},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1193215},
  doi          = {10.1109/MSECP.2003.1193215},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Hearn03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Hearn03b,
  author       = {Jim Hearn},
  title        = {Slow Dancing},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {67--68},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203226},
  doi          = {10.1109/MSECP.2003.1203226},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Hearn03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Hearn03c,
  author       = {Jim Hearn},
  title        = {Keeping Up Appearances},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {75--76},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219076},
  doi          = {10.1109/MSECP.2003.1219076},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Hearn03c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Hearn03d,
  author       = {Jim Hearn},
  title        = {What Works?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {76--77},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236240},
  doi          = {10.1109/MSECP.2003.1236240},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Hearn03d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Heckman03,
  author       = {Carey Heckman},
  title        = {Two Views on Security Software Liability: Using the Right Legal Tools},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {73--75},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203443},
  doi          = {10.1109/MSECP.2003.1203443},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Heckman03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HowardL03,
  author       = {Michael Howard and
                  Steve Lipner},
  title        = {Inside the Windows Security Push},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {57--61},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1176996},
  doi          = {10.1109/MSECP.2003.1176996},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HowardL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Irvine03,
  author       = {Cynthia E. Irvine},
  title        = {Teaching Constructive Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {59--61},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1253570},
  doi          = {10.1109/MSECP.2003.1253570},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Irvine03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/IshitaniAM03,
  author       = {Lucila Ishitani and
                  Virg{\'{\i}}lio A. F. Almeida and
                  Wagner Meira Jr.},
  title        = {Masks: Bringing Anonymity and Personalization Together},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {18--23},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203218},
  doi          = {10.1109/MSECP.2003.1203218},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/IshitaniAM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Landwehr03,
  author       = {Carl E. Landwehr},
  title        = {From the Editor: Security Cosmology: Moving from Big Bang to Worlds
                  in Collusion},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {5},
  year         = {2003},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10012},
  doi          = {10.1109/MSP.2003.10012},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Landwehr03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Lenarcic03,
  author       = {John Lenarcic},
  title        = {The Dinosaur and the Butterfly: {A} Tale of Computer Ethics},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {61--63},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236237},
  doi          = {10.1109/MSECP.2003.1236237},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Lenarcic03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Lesk03,
  author       = {Michael Lesk},
  title        = {Copyright Extension: Eldred v. Ashcroft},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {76--78},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1177000},
  doi          = {10.1109/MSECP.2003.1177000},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Lesk03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Lesk03a,
  author       = {Michael Lesk},
  title        = {Copyright Enforcement or Censorship: New Uses for the DMCA?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {67--69},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1193214},
  doi          = {10.1109/MSECP.2003.1193214},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Lesk03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Lesk03b,
  author       = {Michael Lesk},
  title        = {The Good, the Bad, and the Ugly: What Might Change if We Had Good
                  {DRM}},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {63--66},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203225},
  doi          = {10.1109/MSECP.2003.1203225},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Lesk03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Lesk03c,
  author       = {Michael Lesk},
  title        = {Making the Copyright Law Work},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {73--74},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219075},
  doi          = {10.1109/MSECP.2003.1219075},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Lesk03c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Lesk03d,
  author       = {Michael Lesk},
  title        = {Chicken Little and the Recorded Music Crisis},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {73--75},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236239},
  doi          = {10.1109/MSECP.2003.1236239},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Lesk03d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Lesk03e,
  author       = {Michael Lesk},
  title        = {Feist and Facts: If Data Is Protected, Will It Be More or Less Available?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {68--70},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1253572},
  doi          = {10.1109/MSECP.2003.1253572},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Lesk03e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Levy03,
  author       = {Elias Levy},
  title        = {Poisoning the Software Supply Chain},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {70--73},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203227},
  doi          = {10.1109/MSECP.2003.1203227},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Levy03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Levy03a,
  author       = {Elias Levy},
  title        = {The Making of a Spam Zombie Army: Dissecting the Sobig Worms},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {58--59},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219071},
  doi          = {10.1109/MSECP.2003.1219071},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Levy03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Levy03b,
  author       = {Elias Levy},
  title        = {Crossover: Online Pests Plaguing the Offline World},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {71--73},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1253573},
  doi          = {10.1109/MSECP.2003.1253573},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Levy03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MatyasR03,
  author       = {V{\'{a}}clav Maty{\'{a}}s Jr. and
                  Zdenek R{\'{\i}}ha},
  title        = {Toward Reliable User Authentication through Biometrics},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {45--49},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203221},
  doi          = {10.1109/MSECP.2003.1203221},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MatyasR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McCarty03,
  author       = {Bill McCarty},
  title        = {Botnets: Big and Bigger},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {87--90},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219079},
  doi          = {10.1109/MSECP.2003.1219079},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McCarty03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McCarty03a,
  author       = {Bill McCarty},
  title        = {Automated Identity Theft},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {89--92},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236244},
  doi          = {10.1109/MSECP.2003.1236244},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McCarty03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McCarty03b,
  author       = {Bill McCarty},
  title        = {The Honeynet Arms Race},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {79--82},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1253575},
  doi          = {10.1109/MSECP.2003.1253575},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McCarty03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McGrath03,
  author       = {Dennis McGrath},
  title        = {Measuring the 4: 11 Effect: The Power Failure and the Internet},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {16--18},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236230},
  doi          = {10.1109/MSECP.2003.1236230},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McGrath03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McGraw03,
  author       = {Gary McGraw},
  title        = {From the Ground Up: The {DIMACS} Software Security Workshop},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {59--66},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1193213},
  doi          = {10.1109/MSECP.2003.1193213},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McGraw03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McLaughlinC03,
  author       = {Laurianne McLaughlin and
                  Rosemary Clandos},
  title        = {News},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {8--11},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219049},
  doi          = {10.1109/MSECP.2003.1219049},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McLaughlinC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Mead03,
  author       = {Nancy R. Mead},
  title        = {Building a Foundation},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {14},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203217},
  doi          = {10.1109/MSECP.2003.1203217},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Mead03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Mead03a,
  author       = {Nancy R. Mead},
  title        = {{SEHAS} 2003: The Future of High-Assurance Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {68--72},
  year         = {2003},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10013},
  doi          = {10.1109/MSP.2003.10013},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Mead03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Miller03,
  author       = {Sandra Kay Miller},
  title        = {Legal Battle Looming for Internet Protections Acts},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {10--12},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1176991},
  doi          = {10.1109/MSECP.2003.1176991},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Miller03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MoorePSSSW03,
  author       = {David Moore and
                  Vern Paxson and
                  Stefan Savage and
                  Colleen Shannon and
                  Stuart Staniford{-}Chen and
                  Nicholas Weaver},
  title        = {Inside the Slammer Worm},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {33--39},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219056},
  doi          = {10.1109/MSECP.2003.1219056},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MoorePSSSW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/OppligerR03,
  author       = {Rolf Oppliger and
                  Ruedi Rytz},
  title        = {Digital Evidence: Dream and Reality},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {44--48},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236234},
  doi          = {10.1109/MSECP.2003.1236234},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/OppligerR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Orman03,
  author       = {Hilarie K. Orman},
  title        = {The Morris Worm: {A} Fifteen-Year Perspective},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {35--43},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236233},
  doi          = {10.1109/MSECP.2003.1236233},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Orman03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PetroniA03,
  author       = {Nick L. Petroni Jr. and
                  William A. Arbaugh},
  title        = {The Dangers of Mitigating Security Design Flaws: {A} Wireless Case
                  Study},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {28--36},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1176993},
  doi          = {10.1109/MSECP.2003.1176993},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PetroniA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Potter03,
  author       = {Bruce Potter},
  title        = {Wireless Security's Future},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {68--72},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219074},
  doi          = {10.1109/MSECP.2003.1219074},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Potter03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PrabhakarPJ03,
  author       = {Salil Prabhakar and
                  Sharath Pankanti and
                  Anil K. Jain},
  title        = {Biometric Recognition: Security and Privacy Concerns},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {33--42},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1193209},
  doi          = {10.1109/MSECP.2003.1193209},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PrabhakarPJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ProvosH03,
  author       = {Niels Provos and
                  Peter Honeyman},
  title        = {Hide and Seek: An Introduction to Steganography},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {32--44},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203220},
  doi          = {10.1109/MSECP.2003.1203220},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ProvosH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Quarterman03,
  author       = {John S. Quarterman},
  title        = {The Ultimate in Instant Gratification},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {56--58},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1253569},
  doi          = {10.1109/MSECP.2003.1253569},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Quarterman03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RagsdaleWD03,
  author       = {Daniel Ragsdale and
                  Donald J. Welch and
                  Ronald Dodge},
  title        = {Information Assurance the West Point Way},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {64--67},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236238},
  doi          = {10.1109/MSECP.2003.1236238},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RagsdaleWD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RezguiBE03,
  author       = {Abdelmounaam Rezgui and
                  Athman Bouguettaya and
                  Mohamed Eltoweissy},
  title        = {Privacy on the Web: Facts, Challenges, and Solutions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {40--49},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1253567},
  doi          = {10.1109/MSECP.2003.1253567},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RezguiBE03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Ryan03,
  author       = {Daniel J. Ryan},
  title        = {Two Views on Security Software Liability: Let the Legal System Decide},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {70--72},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1176999},
  doi          = {10.1109/MSECP.2003.1176999},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Ryan03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneider03,
  author       = {Fred B. Schneider},
  title        = {Least Privilege and More},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {55--59},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236236},
  doi          = {10.1109/MSECP.2003.1236236},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneider03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier03,
  author       = {Bruce Schneier},
  title        = {We Are All Security Consumers},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {104},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1177006},
  doi          = {10.1109/MSECP.2003.1177006},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier03a,
  author       = {Bruce Schneier},
  title        = {Locks and Full Disclosure},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {88},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1193220},
  doi          = {10.1109/MSECP.2003.1193220},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier03b,
  author       = {Bruce Schneier},
  title        = {Guilty Until Proven Innocent?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {88, 87},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203231},
  doi          = {10.1109/MSECP.2003.1203231},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier03c,
  author       = {Bruce Schneier},
  title        = {The Speed of Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {96},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219081},
  doi          = {10.1109/MSECP.2003.1219081},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier03c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier03d,
  author       = {Bruce Schneier},
  title        = {Airplane Hackers},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {92},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1266367},
  doi          = {10.1109/MSECP.2003.1266367},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier03d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SeigneurJ03,
  author       = {Jean{-}Marc Seigneur and
                  Christian Damsgaard Jensen},
  title        = {Privacy Recovery with Disposable Email Addresses},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {35--39},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1253566},
  doi          = {10.1109/MSECP.2003.1253566},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SeigneurJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Smith03,
  author       = {Sean W. Smith},
  title        = {Fairy Dust, Secrets, and the Real World},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {89--93},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1177003},
  doi          = {10.1109/MSECP.2003.1177003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Smith03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Smith03a,
  author       = {Sean W. Smith},
  title        = {Humans in the Loop: Human-Computer Interaction and Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {75--79},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203228},
  doi          = {10.1109/MSECP.2003.1203228},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Smith03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SmithRG03,
  author       = {Sean W. Smith and
                  Jothy Rosenberg and
                  Adam Golodner},
  title        = {A Funny Thing Happened on the Way to the Marketplace},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {74--78},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1253574},
  doi          = {10.1109/MSECP.2003.1253574},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SmithRG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Spitzner03,
  author       = {Lance Spitzner},
  title        = {The Honeynet Project: Trapping the Hackers},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {15--23},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1193207},
  doi          = {10.1109/MSECP.2003.1193207},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Spitzner03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Stytz03,
  author       = {Martin R. Stytz},
  title        = {The Case for Software Warranties},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {80--82},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203229},
  doi          = {10.1109/MSECP.2003.1203229},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Stytz03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Stytz03a,
  author       = {Martin R. Stytz},
  title        = {Setting the Standard for Security Literature},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {14},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219051},
  doi          = {10.1109/MSECP.2003.1219051},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Stytz03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/StytzW03,
  author       = {Martin R. Stytz and
                  James A. Whittaker},
  title        = {Software Protection: Security's Last Stand?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {95--98},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1177004},
  doi          = {10.1109/MSECP.2003.1177004},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/StytzW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/StytzW03a,
  author       = {Martin R. Stytz and
                  James A. Whittaker},
  title        = {Caution: This Product Contains Security Code},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {86--88},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236243},
  doi          = {10.1109/MSECP.2003.1236243},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/StytzW03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Thompson03,
  author       = {Herbert H. Thompson},
  title        = {Why Security Testing Is Hard},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {83--86},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219078},
  doi          = {10.1109/MSECP.2003.1219078},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Thompson03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Whittaker03,
  author       = {James A. Whittaker},
  title        = {Why Secure Applications are Difficult to Write},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {81--83},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1193218},
  doi          = {10.1109/MSECP.2003.1193218},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Whittaker03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Wing03,
  author       = {Jeannette M. Wing},
  title        = {A Call to Action: Look Beyond the Horizon},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {62--67},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1253571},
  doi          = {10.1109/MSECP.2003.1253571},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Wing03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/X03,
  title        = {Letters to the Editor},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {7--10},
  year         = {2003},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10003},
  doi          = {10.1109/MSP.2003.10003},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/X03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/X03a,
  title        = {S{\&}P Welcomes New Editorial Board Members},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {6--7},
  year         = {2003},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10007},
  doi          = {10.1109/MSP.2003.10007},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/X03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/X03b,
  title        = {Bacon Ice Cream: The Best Mix of Proactive and Reactive Security?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {53--57},
  year         = {2003},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10006},
  doi          = {10.1109/MSP.2003.10006},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/X03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/X03c,
  title        = {Security and Privacy Welcomes New Editorial Board Members},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {6--7},
  year         = {2003},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10010},
  doi          = {10.1109/MSP.2003.10010},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/X03c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/X03d,
  title        = {Letters to the Editor},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {14},
  year         = {2003},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10014},
  doi          = {10.1109/MSP.2003.10014},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/X03d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/X03e,
  title        = {2003 Annual Index {IEEE} Security {\&} Privacy Volume 1},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {83--88},
  year         = {2003},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10015},
  doi          = {10.1109/MSP.2003.10015},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/X03e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/YasinsacEMPS03,
  author       = {Alec Yasinsac and
                  Robert F. Erbacher and
                  Donald G. Marks and
                  Mark Pollitt and
                  Peter M. Sommer},
  title        = {Computer Forensics Education},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {15--23},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219052},
  doi          = {10.1109/MSECP.2003.1219052},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/YasinsacEMPS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/YuWH03,
  author       = {Ting Yu and
                  Marianne Winslett and
                  Jason E. Holt},
  title        = {Two Security Symposia},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {50--52},
  year         = {2003},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MSP.2003.10009},
  doi          = {10.1109/MSP.2003.10009},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/YuWH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics