The Community for Technology Leaders
Green Image
Issue No. 01 - January/February (vol. 4)
ISSN: 1540-7993
From the Editors

Why Johnny Can't Evaluate Security Risk (HTML)

George Cybenko , Dartmouth University
pp. 5
Reviewer Thanks
Book Reviews

Chattering about SIGINT (HTML)

Whitfield Diffie , Sun Microsystems
pp. 9

News Briefs (HTML)

Heather Drinan , I3P at Dartmouth College
Nancy Fontaine , I3P at Dartmouth College
Brent Kesler , I3P at Dartmouth College
pp. 14-16
Looking into Rootkits

Digital Rights Management, Spyware, and Security (Abstract)

Edward W. Felten , Center for Information Technology Policy, Princeton University
J. Alex Halderman , Center for Information Technology Policy, Princeton University
pp. 18-23
Host Security

Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection (Abstract)

John G. Levine , Georgia Institute of Technology
Julian B. Grizzard , Georgia Institute of Technology
Henry L. Owen , Georgia Institute of Technology
pp. 24-32
Cybercrime Analysis

The Simple Economics of Cybercrimes (Abstract)

Nir Kshetri , University of North Carolina
pp. 33-39
Domain Name System
Online Gaming

A Security Analysis of the Internet Chess Club (Abstract)

John Black , University of Colorado
Martin Cochran , University of Colorado
Ryan Gardner , University of Colorado
pp. 46-52
Conference Reports

The NIST Cryptographic Workshop on Hash Functions (Abstract)

Christian Rechberger , Graz University of Technology, Austria
Vincent Rijmen , Graz University of Technology, Austria
Nicolas Sklavos , University of Patras, Greece
pp. 54-56

Taking Networks on the Road: Portable Solutions for Security Educators (Abstract)

Timothy Rosenberg , White Wolf Security
Lance J. Hoffman , The George Washington University
pp. 57-60
On the Horizon

Information Assurance Technology Forecast 2005 (Abstract)

Virgil D. Gligor , University of Maryland
Tom Haigh , Cyber Defense Agency
Dick Kemmerer , University of California, Santa Barbara
Carl Landwehr , University of Maryland
Steve Lipner , Microsoft
John McLean , Naval Research Lab
pp. 62-69
Crypto Corner

What Is Cryptography? (Abstract)

Jean-S?bastien Coron , University of Luxembourg
pp. 70-73
Basic Training

Secure Coding in C and C++: Of Strings and Integers (Abstract)

Robert Seacord , CERT/CC, Carnegie Mellon University
pp. 74-76
Attack Trends
Building Security In
Emerging Standards

Challenges in Securing the Domain Name System (Abstract)

Ramaswamy Chandramouli , US National Institute of Standards and Technology
Scott Rose , US National Institute of Standards and Technology
pp. 84-87
Clear Text

Unconventional Wisdom (Abstract)

Steve Bellovin , Columbia University
pp. 88
98 ms
(Ver 3.3 (11022016))