The Community for Technology Leaders
Green Image
Issue No. 01 - January-February (vol. 2)
ISSN: 1540-7993
From the Editor

Reviewer Thanks (HTML)

pp. 6

Letters to the Editors (HTML)

pp. 7-9

Can We Win the Security Game? (Abstract)

Charles C. Palmer , IBM T.J. Watson Research Center
pp. 10-12
Book Reviews

Book Reviews (Abstract)

Martin R. Stytz , US Air Force Research Laboratory
pp. 20-21
E-Voting: Can You Trust It?

Guest Editors' Introduction: E-Voting Security (HTML)

David L. Dill , Stanford University
Aviel D. Rubin , Johns Hopkins University
pp. 22-23

Election Security: Perception and Reality (Abstract)

David Evans , University of Virginia
Nathanael Paul , University of Virginia
pp. 24-31

Hack-a-Vote: Security Issues with Electronic Voting Systems (Abstract)

Jonathan Bannet , Rice University
David W. Price , Rice University
Algis Rudys , Rice University
Justin Singer , Rice University
Dan S. Wallach , Rice University
pp. 32-37
Conference Reports

Computer Network Security: Report from MMM-ACNS (Abstract)

Nicolas Sklavos , University of Patras, Greece
Nikolay Moldovyan , St. Petersburg Electrical Engineering University
Vladimir Gorodetsky , St. Petersburg Institute for Informatics and Automation
Odysseas Koufopavlou , University of Patras, Greece
pp. 49-52
Biblio Tech
Digital Rights
Global Perspectives

Does the Common Criteria Paradigm Have a Future? (Abstract)

Jim Hearn , Independent Consultant
pp. 64-65
Attack Trends

More Bang For the Bug: An Account of 2003's Attack Trends (Abstract)

Iv? Arce , Core Security Technologies
pp. 66-68
Secure Systems
Application Security

Considering Defense in Depth for Software Applications (Abstract)

Martin R. Stytz , US Air Force Research Laboratory
pp. 72-75
The Honeynet Files

Anti-Honeypot Technology (Abstract)

Neal Krawetz , Hacker Factor Solutions
pp. 76-79
Privacy Matters
Clear Text

Voting Security and Technology (Abstract)

Bruce Schneier , Counterpane Internet Security
pp. 84
83 ms
(Ver 3.3 (11022016))