Advanced Search 
IEEE Security & Privacy
March/April 2009 (vol. 7 no. 2)
ISSN: 1521-9615
Table of Contents
From the Editors
Special Thanks
News Briefs
Interview
Book Reviews
Guest Editors' Introduction
Michael A. Caloyannides, Northrop Grumman
Nasir Memon, Polytechnic Institute of New York University
Wietse Venema, IBM T.J. Watson Research Center
pp. 16-17
Brian Hay, University of Alaska Fairbanks
Matt Bishop, University of California, Davis
Kara Nance, University of Alaska Fairbanks
pp. 30-37
Authentication
Sarah Spiekermann, Humboldt University, Berlin
Sergei Evdokimov, Humboldt University, Berlin
pp. 56-62
It All Depends
Education
Jungwoo Ryoo, Pennsylvania State University
Angsana Techatassanasoontorn, Pennsylvania State University
Dongwon Lee, Pennsylvania State University
pp. 71-74
Privacy Interests
Khaled El Emam, Children's Hospital of Eastern Ontario Research Institute
Patricia Kosseim, Genome Canada
pp. 75-78
Crypto Corner
Temperature Attacks (Abstract)
Julien Brouchier, Institut supérieur de l'électronique et du numérique
Tom Kean, Algotronix
Carol Marsh, Algotronix
David Naccache, École normale supérieure
pp. 79-82
Attack Trends
Martin Gilje Jaatun, SINTEF Information and Communication Technology
Jostein Jensen, SINTEF Information and Communication Technology
Hâvard Vegge, Norwegian University of Science and Technology
Finn Michael Halvorsen, Norwegian University of Science and Technology
Rune Walsø Nergârd, Norwegian University of Science and Technology
pp. 83-86
Secure Systems
Building Security In
For Good Measure
Clear Text
Usage of this product signifies your acceptance of the Terms of Use.