The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 02 - March/April (vol. 7)
ISSN: 1540-7993
From the Editors

Accountability for Perfection (HTML)

Fred B. Schneider , Cornell University
pp. 3-4
Special Thanks
News Briefs

News Briefs (HTML)

pp. 8-9
Interview
Book Reviews

Searching for You (HTML)

Shari Lawrence Pfleeger , RAND Corporation
pp. 15
Guest Editors' Introduction

Digital Forensics (HTML)

Nasir Memon , Polytechnic Institute of New York University
Michael A. Caloyannides , Northrop Grumman
Wietse Venema , IBM T.J. Watson Research Center
pp. 16-17
Digital Forensics

Forensics Is So "Yesterday" (Abstract)

Michael A. Caloyannides , Northrop Grumman
pp. 18-25

Digital Forensics Works (Abstract)

Brian D. Carrier , Basis Technology
pp. 26-29

Live Analysis: Progress and Challenges (Abstract)

Kara Nance , University of Alaska Fairbanks
Matt Bishop , University of California, Davis
Brian Hay , University of Alaska Fairbanks
pp. 30-37

New XML-Based Files Implications for Forensics (Abstract)

James J. Migletz , US Marine Corps
Simson L. Garfinkel , US Naval Postgraduate School
pp. 38-44

Hashing and Data Fingerprinting in Digital Forensics (Abstract)

Vassil Roussev , University of New Orleans
pp. 49-55
Authentication

Critical RFID Privacy-Enhancing Technologies (Abstract)

Sarah Spiekermann , Humboldt University, Berlin
Sergei Evdokimov , Humboldt University, Berlin
pp. 56-62
It All Depends

A New Era of Presidential Security: The President and His BlackBerry (Abstract)

Lori M. Kaufman , BAE Systems IT
John Harauz , Jonic Systems Engineering
pp. 67-70
Education

Security Education Using Second Life (Abstract)

Jungwoo Ryoo , Pennsylvania State University
Dongwon Lee , Pennsylvania State University
Angsana Techatassanasoontorn , Pennsylvania State University
pp. 71-74
Privacy Interests

Privacy Interests in Prescription Data, Part 2: Patient Privacy (Abstract)

Patricia Kosseim , Genome Canada
Khaled El Emam , Children's Hospital of Eastern Ontario Research Institute
pp. 75-78
Crypto Corner

Temperature Attacks (Abstract)

David Naccache , École normale supérieure
Carol Marsh , Algotronix
Tom Kean , Algotronix
Julien Brouchier , Institut supérieur de l'électronique et du numérique
pp. 79-82
Attack Trends

Fools Download Where Angels Fear to Tread (Abstract)

Martin Gilje Jaatun , SINTEF Information and Communication Technology
Jostein Jensen , SINTEF Information and Communication Technology
Hâvard Vegge , Norwegian University of Science and Technology
Finn Michael Halvorsen , Norwegian University of Science and Technology
Rune Walsø Nergârd , Norwegian University of Science and Technology
pp. 83-86
Secure Systems

The Real Cost of Software Errors (Abstract)

Michael Zhivich , MIT Lincoln Laboratory
Robert K. Cunningham , MIT Lincoln Laboratory
pp. 87-90
Building Security In
For Good Measure

Hard Data Is Good to Find (Abstract)

Daniel G. Conway , Augustana College
pp. 94-95
Clear Text

The Government and Cybersecurity (Abstract)

Steven M. Bellovin , Columbia University
pp. 96
88 ms
(Ver )