The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 03 - May/June (vol. 3)
ISSN: 1540-7993
From the Editors

It Depends on What You Pay (HTML)

Fred B. Schneider , Cornell University
pp. 3
Book Reviews

Under the Black Hat (HTML)

Martin R. Stytz , Institute for Defense Analyses
pp. 5
Interview with Tom Leighton
PITAC Cybersecurity Report
News

NewsBriefs (HTML)

Garrett Jones , I3P at Dartmouth College
Brent Kesler , I3P at Dartmouth College
pp. 12-14
Infrastructure Security

Collaborative Internet Worm Containment (Abstract)

Yu Chen , University of Southern California
Min Cai , University of Southern California
Kai Hwang , University of Southern California
Shanshan Song , University of Southern California
Yu-Kwong Kwok , University of Southern California
pp. 25-33
Radio Frequency Identification

RFID Privacy: An Overview of Problems and Proposed Solutions (Abstract)

Ravi Pappu , ThingMagic
Simson L. Garfinkel , Massachusetts Institute of Technology
Ari Juels , RSA Laboratories
pp. 34-43
Voice over IP

Challenges in Securing Voice over IP (Abstract)

D. Richard Kuhn , National Institute of Standards and Technology
Thomas J. Walsh , National Institute of Standards and Technology
pp. 44-49
Video Privacy

Enabling Video Privacy through Computer Vision (Abstract)

Sharath Pankanti , IBM T.J. Watson Research Center
Andrew Senior , IBM T.J. Watson Research Center
Arun Hampapur , IBM T.J. Watson Research Center
Lisa Brown , IBM T.J. Watson Research Center
Jonathan Connell , IBM T.J. Watson Research Center
Max Lu , IBM T.J. Watson Research Center
Ahmet Ekin , IBM T.J. Watson Research Center
Ying-Li Tian , IBM T.J. Watson Research Center
Chiao Fe Shu , IBM T.J. Watson Research Center
pp. 50-57
Biblio Tech

A Young Geek's Fancy Turns to...Science Fiction? (Abstract)

Marc Donner , Associate Editor in Chief
pp. 58-60
Education

CyberCIEGE: Gaming for Information Assurance (Abstract)

Ken Allen , Rivermind
Michael F. Thompson , Naval Postgraduate School
Cynthia E. Irvine , Naval Postgraduate School
pp. 61-64
On the Horizon

Four Ways to Improve Security (Abstract)

Brian Snow , US National Security Agency
pp. 65-67
Crypto Corner

When Hashes Collide (Abstract)

Peter Gutmann , University of Auckland
David Naccache , Gemplus
pp. 68-71
Basic Training

Malcode Mysteries Revealed (Abstract)

Richard Ford , Florida Institute of Technology
pp. 72-75
Attack Trends

A Short Visit to the Bot Zoo (Abstract)

Thorsten Holz , RWTH Aachen University
pp. 76-79
Secure Systems

Programming Languages and Systems Security (Abstract)

Christian Skalka , University of Vermont
pp. 80-83
Digital Protection

Salute the Broadcast Flag (Abstract)

Michael Lesk , Rutgers University
pp. 84-87
Building Security In
Clear Text

Security and Privacy: Enemies or Allies? (Abstract)

Steve Bellovin , Columbia University
pp. 92
100 ms
(Ver 3.1 (10032016))