The Community for Technology Leaders
Green Image
Issue No. 05 - September/October (vol. 4)
ISSN: 1540-7993
From the Editors

Insecurity through Obscurity (HTML)

Marc Donner , Associate Editor in Chief
pp. 4

Letters to the Editor (HTML)

pp. 5
Book Reviews

Cross-Border Transaction Liability (HTML)

Geraldine MacDonald , Independent Consultant
pp. 7

News Briefs (HTML)

pp. 8-10
Peripheral Devices

Scrubbing Stubborn Data: An Evaluation of Counter-Forensic Privacy Tools (Abstract)

Matthew Geiger , Carnegie Mellon University
Lorrie Faith Cranor , Carnegie Mellon University
pp. 16-25

Enhancing PC Security with a U-Key (Abstract)

Peng Shaunghe , Beijing Jiaotong University
Han Zhen , Beijing Jiaotong University
pp. 34-39

How Mobile Host Batteries Can Improve Network Security (Abstract)

Grant A. Jacoby , US Military Academy
Randy Marchany , Virginia Polytechnic Institute and State University
Nathaniel J. Davis IV , US Air Force Institute of Technology
pp. 40-49
Voting Systems

Voting Technologies and Trust (Abstract)

Brian Randell , Newcastle upon Tyne University
Peter Y.A. Ryan , Newcastle upon Tyne University
pp. 50-56
Conference Reports

Privacy Enhancing Technologies (HTML)

Stephen A. Weis , Independent Consultant
pp. 59

Computer Security Education and Research in Australia (Abstract)

Jill Slay , University of South Australia, Mawson Lakes
Benjamin Turnbull , University of South Australia, Mawson Lakes
pp. 60-63
Crypto Corner

Fitting Square Pegs into Round Holes (Abstract)

Luther Martin , Voltage Security
pp. 64-66
Basic Training

Understanding the Adversary: Virus Writers and Beyond (Abstract)

Sarah Gordon , Symantec Security Response
pp. 67-70
Attack Trends

Worst-Case Scenario (Abstract)

Elias Levy , Symantec
pp. 71-73
Digital Protection
Building Security In
Emerging Standards

Toward Secure Routing Infrastructures (Abstract)

Doug Montgomery , US National Institute of Standards and Technology
Sandra Murphy , Sparta
pp. 84-87
Clear Text

University Networks and Data Security (Abstract)

Bruce Schneier , Counterpane Internet Security
pp. 88
95 ms
(Ver 3.3 (11022016))