Issue No. 05 - September/October (2006 vol. 4)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2006.123
Marc Donner , Associate Editor in Chief
Figuring out how to gather and share data might not be as glamorous as cracking a tough cipher or thwarting an exploit, but it does have great leverage.
cipher, exploit, data sharing, system design
M. Donner, "Insecurity through Obscurity," in IEEE Security & Privacy, vol. 4, no. , pp. 4, 2006.