The Community for Technology Leaders
Green Image
Issue No. 02 - March/April (vol. 6)
ISSN: 1540-7993
From the Editors
Book Reviews

Sharp Figures, Fuzzy Purpose (HTML)

Simson Garfinkel , US Naval Postgraduate School
pp. 5
News Briefs

News Briefs (HTML)

Brandi Ortega , Staff editor
pp. 10-12
Guest Editors' Introduction

I'm Pc01002/SpringPeeper/ED288l.6; Who are You? (HTML)

Susan Landau , Sun Microsystems
Deirdre K. Mulligan , University of California, Berkeley
pp. 13-15
Identity Management

Biometrics in Identity Management Systems (Abstract)

James L. Wayman , San Jose State University
pp. 30-37

Privacy and Identity Management (Abstract)

Marit Hansen , Independent Centre for Privacy Protection
Ari Schwartz , Center for Democracy and Technology
Alissa Cooper , Center for Democracy and Technology
pp. 38-45

Use Cases for Identity Management in E-Government (Abstract)

Robin McKenzie , Information Integrity Solutions, Australia
Malcolm Crompton , Information Integrity Solutions, Australia
Colin Wallis , State Services Commission, New Zealand
pp. 51-57
Reverse Engineering

Hindering Reverse Engineering: Thinking Outside the Box (Abstract)

Thomas E. Dube , US Air Force Institute of Technology
Bobby D. Birrer , US Air Force Institute of Technology
Richard A. Raines , Air Force Institute of Technology
Rusty O. Baldwin , Air Force Institute of Technology
Barry E. Mullins , Air Force Institute of Technology
Robert W. Bennington , US Air Force Research Laboratory
Christopher E. Reuter , US Air Force Research Laboratory
pp. 58-65

Why and How to Perform Fraud Experiments (Abstract)

Markus Jakobsson , Palo Alto Research Center
Nathaniel Johnson , Indiana University
Peter Finn , Indiana University
pp. 66-68
Crypto Corner

Cryptographic Test Correction (Abstract)

Eric Levieil , ?cole normale sup?rieure
David Naccache , ?cole normale sup?rieure
pp. 69-71
Basic Training

Security in Mobile Ad Hoc Networks (Abstract)

Marco Carvalho , Florida Institute for Human and Machine Cognition
pp. 72-75
Attack Trends
Secure Systems

The Hidden Difficulties of Watching and Rebuilding Networks (Abstract)

Michael E. Locasto , Dartmouth College
Angelos Stavrou , George Mason University
pp. 79-82
Building Security In
For Good Measure

Beware the IDs of March (Abstract)

Daniel G. Conway , Indiana University
pp. 87
Clear Text

Security by Checklist (Abstract)

Steve Bellovin , Columbia University
pp. 88
79 ms
(Ver 3.3 (11022016))