Advanced Search 
IEEE Security & Privacy
May/June 2005 (vol. 3 no. 3)
ISSN: 1540-7993
Table of Contents
From the Editors
Book Reviews
Martin R. Stytz, Institute for Defense Analyses
pp. 5
Interview with Tom Leighton
PITAC Cybersecurity Report
News
NewsBriefs (HTML)
Garrett Jones, I3P at Dartmouth College
Brent Kesler, I3P at Dartmouth College
pp. 12-14
Infrastructure Security
Min Cai, University of Southern California
Kai Hwang, University of Southern California
Yu-Kwong Kwok, University of Southern California
Shanshan Song, University of Southern California
Yu Chen, University of Southern California
pp. 25-33
Radio Frequency Identification
Simson L. Garfinkel, Massachusetts Institute of Technology
Ari Juels, RSA Laboratories
Ravi Pappu, ThingMagic
pp. 34-43
Voice over IP
Thomas J. Walsh, National Institute of Standards and Technology
D. Richard Kuhn, National Institute of Standards and Technology
pp. 44-49
Video Privacy
Andrew Senior, IBM T.J. Watson Research Center
Sharath Pankanti, IBM T.J. Watson Research Center
Arun Hampapur, IBM T.J. Watson Research Center
Lisa Brown, IBM T.J. Watson Research Center
Ying-Li Tian, IBM T.J. Watson Research Center
Ahmet Ekin, IBM T.J. Watson Research Center
Jonathan Connell, IBM T.J. Watson Research Center
Chiao Fe Shu, IBM T.J. Watson Research Center
Max Lu, IBM T.J. Watson Research Center
pp. 50-57
Biblio Tech
Education
Cynthia E. Irvine, Naval Postgraduate School
Michael F. Thompson, Naval Postgraduate School
Ken Allen, Rivermind
pp. 61-64
On the Horizon
Crypto Corner
Basic Training
Richard Ford, Florida Institute of Technology
pp. 72-75
Attack Trends
Secure Systems
Digital Protection
Building Security In
Clear Text
Usage of this product signifies your acceptance of the Terms of Use.