The Community for Technology Leaders
Green Image
Issue No. 01 - January/February (vol. 5)
ISSN: 1540-7993
From the Editors

New Challenges for the New Year (HTML)

Carl E. Landwehr , University of Maryland
pp. 3-4
Book Reviews

Software Security: State of the Art (HTML)

Ross Anderson , Cambridge University
pp. 8

News Briefs (HTML)

pp. 12-15
Certified Mail

Providing Certified Mail Services on the Internet (Abstract)

Rolf Oppliger , eSECURITY Technologies
pp. 16-22
Wireless Networks

Dependability in Wireless Networks: Can We Rely on WiFi? (Abstract)

Marco Domenico Aime , Politecnico di Torino
Giorgio Calandriello , Politecnico di Torino
Antonio Lioy , Politecnico di Torino
pp. 23-29
Operational Security
Information Security Controls
Healthcare Legislation

HIPAA's Effect on Web Site Privacy Policies (Abstract)

Annie I. Ant? , North Carolina State University
Julia B. Eart , North Carolina State University
Matthew W. Vail , North Carolina State University
Neha Jain , North Carolina State University
Carrie M. Gheen , North Carolina State University
Jack M. Frink , North Carolina State University
pp. 45-52

Achieving Learning Objectives through E-Voting Case Studies (Abstract)

Matt Bishop , University of California, Davis
Deborah A. Frincke , Pacific Northwest National Laboratory
pp. 53-56
On The Horizon

Toward Application-Aware Security and Reliability (Abstract)

Ravishankar K. Iyer , University of Illinois at Urbana-Champaign
Zbigniew Kalbarczyk , University of Illinois at Urbana-Champaign
Karthik Pattabiraman , University of Illinois at Urbana-Champaign
William Healey , University of Illinois at Urbana-Champaign
Wen-Mei W. Hwu , University of Illinois at Urbana-Champaign
Peter Klemperer , University of Illinois at Urbana-Champaign
Reza Farivar , University of Illinois at Urbana-Champaign
pp. 57-62
Crypto Corner

Special-Purpose Hardware in Cryptanalysis: The Case of 1,024-Bit RSA (Abstract)

Willi Geiselmann , Universit?t Karlsruhe
Rainer Steinwandt , Florida Atlantic University
pp. 63-66
Basic Training

How Not to Be Seen (Abstract)

Richard Ford , Florida Institute of Technology
William H. Allen , Florida Institute of Technology
pp. 67-69
Attack Trends
Digital Protection
Emerging Standards

Who's Watching You Now? (Abstract)

John Morris , Center for Democracy & Technology
Jon Peterson , NeuStar
pp. 76-79
Clear Text

DRM, Complexity, and Correctness (Abstract)

Steve Bellovin , Columbia University
pp. 80
102 ms
(Ver 3.3 (11022016))