This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
September/October 2006 (vol. 4 no. 5)
pp. 4
Marc Donner, Associate Editor in Chief
Figuring out how to gather and share data might not be as glamorous as cracking a tough cipher or thwarting an exploit, but it does have great leverage.
Index Terms:
cipher, exploit, data sharing, system design
Citation:
Marc Donner, "Insecurity through Obscurity," IEEE Security & Privacy, vol. 4, no. 5, pp. 4, Sept.-Oct. 2006, doi:10.1109/MSP.2006.123
Usage of this product signifies your acceptance of the Terms of Use.