The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (vol.3)
ISSN: 1540-7993
TABLE OF CONTENTS
From the Editors
Book Reviews
Martin R. Stytz , Institute for Defense Analyses
pp. 5
Interview with Tom Leighton
PITAC Cybersecurity Report
Susan Landau , Sun Microsystems
Martin R. Stytz , Institute for Defense Analyses
pp. 9-11
News
NewsBriefs (HTML)
Garrett Jones , I3P at Dartmouth College
Brent Kesler , I3P at Dartmouth College
pp. 12-14
Infrastructure Security
Min Cai , University of Southern California
Kai Hwang , University of Southern California
Yu-Kwong Kwok , University of Southern California
Shanshan Song , University of Southern California
Yu Chen , University of Southern California
pp. 25-33
Radio Frequency Identification
Simson L. Garfinkel , Massachusetts Institute of Technology
Ari Juels , RSA Laboratories
Ravi Pappu , ThingMagic
pp. 34-43
Voice over IP
Thomas J. Walsh , National Institute of Standards and Technology
D. Richard Kuhn , National Institute of Standards and Technology
pp. 44-49
Video Privacy
Andrew Senior , IBM T.J. Watson Research Center
Sharath Pankanti , IBM T.J. Watson Research Center
Arun Hampapur , IBM T.J. Watson Research Center
Lisa Brown , IBM T.J. Watson Research Center
Ying-Li Tian , IBM T.J. Watson Research Center
Ahmet Ekin , IBM T.J. Watson Research Center
Jonathan Connell , IBM T.J. Watson Research Center
Chiao Fe Shu , IBM T.J. Watson Research Center
Max Lu , IBM T.J. Watson Research Center
pp. 50-57
Biblio Tech
Marc Donner , Associate Editor in Chief
pp. 58-60
Education
Cynthia E. Irvine , Naval Postgraduate School
Michael F. Thompson , Naval Postgraduate School
Ken Allen , Rivermind
pp. 61-64
On the Horizon
Brian Snow , US National Security Agency
pp. 65-67
Crypto Corner
When Hashes Collide (Abstract)
Peter Gutmann , University of Auckland
David Naccache , Gemplus
pp. 68-71
Basic Training
Richard Ford , Florida Institute of Technology
pp. 72-75
Attack Trends
Thorsten Holz , RWTH Aachen University
pp. 76-79
Secure Systems
Christian Skalka , University of Vermont
pp. 80-83
Digital Protection
Michael Lesk , Rutgers University
pp. 84-87
Building Security In
Clear Text
Steve Bellovin , Columbia University
pp. 92
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool