Issue No.05 - September/October (2006 vol.4)
Marc Donner , Associate Editor in Chief
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2006.123
Figuring out how to gather and share data might not be as glamorous as cracking a tough cipher or thwarting an exploit, but it does have great leverage.
cipher, exploit, data sharing, system design
Marc Donner, "Insecurity through Obscurity", IEEE Security & Privacy, vol.4, no. 5, pp. 4, September/October 2006, doi:10.1109/MSP.2006.123