Advanced Search 
IEEE Security & Privacy
March/April 2010 (vol. 8 no. 2)
ISSN: 1540-7993
Table of Contents
From the Editors
Interview
News Briefs
Mobile Device Security
John Viega, Perimeter eSecurity
Bret Michael, Naval Postgraduate School
pp. 11-12
Ricardo Ribalda, Universidad Autónoma de Madrid
Guillermo Gonzalez de Rivera, Universidad Autónoma de Madrid
Angel de Castro, Universidad Autónoma de Madrid
Javier Garrido, Universidad Autónoma de Madrid
pp. 13-19
Asaf Shabtai, Deutsche Telekom Laboratories at Ben-Gurion University Ben-Gurion University, Beer-Sheva Beer-Sheva
Yuval Fledel, Deutsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva
Uri Kanonov, Deutsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva
Yuval Elovici, Deutsche Telekom Laboratories at Ben-Gurion University Ben-Gurion University, Beer-Sheva Beer-Sheva
Shlomi Dolev, Ben-Gurion University, Beer-Sheva
Chanan Glezer, Deutsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva
pp. 35-44
Spam-over-IP Telephony
Christoph Sorge, University of Paderborn
Saverio Niccolini, NEC Laboratories Europe
Jan Seedorf, NEC Laboratories Europe
pp. 45-50
It All Depends
Bruce Potter, The Shmoo Group
pp. 51-53
Education
Matt Bishop, University of California, Davis
pp. 54-56
On the Horizon
Marjory S. Blumenthal, Georgetown University
pp. 57-58
Privacy Interests
Fred H. Cate, Indiana University
pp. 59-62
Crypto Corner
Charles P. Pfleeger, Pfleeger Consulting Group
pp. 63-66
Basic Training
Andrea M. Matwyshyn, University of Pennsylvania
Ang Cui, Columbia University
Angelos D. Keromytis, Columbia University
Salvatore J. Stolfo, Columbia University
pp. 67-72
Attack Trends
Marco Ramilli, University of Bologna
Marco Prandini, University of Bologna
pp. 73-75
Secure Systems
Security & Privacy Economics
Building Security In
For Good Measure
ClearText
Steven M. Bellovin, Columbia University
pp. 88
Usage of this product signifies your acceptance of the Terms of Use.