The Community for Technology Leaders
Green Image
Issue No. 02 - March/April (vol. 8)
ISSN: 1540-7993
Spam-over-IP Telephony

The Legal Ramifications of Call-Filtering Solutions (Abstract)

Christoph Sorge , University of Paderborn
Saverio Niccolini , NEC Laboratories Europe
Jan Seedorf , NEC Laboratories Europe
pp. 45-50
News Briefs

News Briefs (HTML)

pp. 8-10
Mobile Device Security

Guest Editors' Introduction: Mobile Device Security (HTML)

John Viega , Perimeter eSecurity
Bret Michael , Naval Postgraduate School
pp. 11-12
It All Depends

My Information, Your Code (Abstract)

Bruce Potter , The Shmoo Group
pp. 51-53

A Clinic for "Secure" Programming (Abstract)

Matt Bishop , University of California, Davis
pp. 54-56
On the Horizon

Hide and Seek in the Cloud (Abstract)

Marjory S. Blumenthal , Georgetown University
pp. 57-58
Privacy Interests

The Limits of Notice and Choice (Abstract)

Fred H. Cate , Indiana University
pp. 59-62
Crypto Corner

Crypto: Not Just for the Defensive Team (Abstract)

Charles P. Pfleeger , Pfleeger Consulting Group
pp. 63-66
Basic Training

Ethics in Security Vulnerability Research (Abstract)

Andrea M. Matwyshyn , University of Pennsylvania
Ang Cui , Columbia University
Angelos D. Keromytis , Columbia University
Salvatore J. Stolfo , Columbia University
pp. 67-72
Attack Trends

Always the Same, Never the Same (Abstract)

Marco Ramilli , University of Bologna
Marco Prandini , University of Bologna
pp. 73-75
Secure Systems
Security & Privacy Economics
Building Security In
For Good Measure

Nothing Ventured, Nothing Gained (Abstract)

Daniel G. Conway , Augustana College
pp. 86-87

Identity and Security (Abstract)

Steven M. Bellovin , Columbia University
pp. 88
80 ms
(Ver 3.3 (11022016))