The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 01 - January/February (vol. 10)
ISSN: 1540-7993
From the Editors

Happy Anniversary! (HTML)

John Viega , Perimeter E-Security
pp. 3-4
10th Anniversary Exclusive
Interview
News Briefs
Authentication Technologies

Authentication—Are We Doing Well Enough? (HTML)

RIchard Chow , Palo Alto Research Center
Jesus Molina , consultant
pp. 19-21

A Research Agenda Acknowledging the Persistence of Passwords (Abstract)

Cormac Herley , Microsoft Research
Paul van Oorschot , Carleton University
pp. 28-36

Training Johnny to Authenticate (Safely) (Abstract)

Ronen Margulies , Bar-Ilan University
Amir Herzberg , Bar-Ilan University
pp. 37-45

Electronic Identity Cards for User Authentication—Promise and Practice (Abstract)

Ulrich Waldmann , Fraunhofer Institute for Secure Information Technology
Sven Türpe , Fraunhofer Institute for Secure Information Technology
Andreas Poller , Fraunhofer Institute for Secure Information Technology
Sven Vowé , Fraunhofer Institute for Secure Information Technology
pp. 46-54
Incident Reporting

Improving the Automation of Security Information Management: A Collaborative Approach (Abstract)

Idoia Aguirre , the Multi­disciplinary Innovation and Technology Center of Navarra (Cemitec)
Sergio Alonso , the Multidisciplinary Innovation and Technology Center of Navarra (Cemitec)
pp. 55-59
Information Security Management

Making Successful Security Decisions: A Qualitative Evaluation (Abstract)

Julie J.C.H. Ryan , George Washington University
James A. Pettigrew III , National Geospatial-Intelligence Agency
pp. 60-68
It All Depends
Education

Teaching Cybersecurity with DeterLab (Abstract)

Jelena Mirkovic , University of Southern California
Terry Benzel , University of Southern California
pp. 73-76
Privacy Interests
Crypto Corner

Electronic Identities Need Private Credentials (Abstract)

Anja Lehmann , IBM Research - Zurich
Gregory Neven , IBM Research - Zurich
Jan Camenisch , IBM Research - Zurich
pp. 80-83
Attack Trends
Security & Privacy Economics

Your Memory Is Now a Vendor Service (Abstract)

Michael Lesk , Rutgers University
pp. 88-90
Building Security In
For Good Measure

Power. Law. (Abstract)

pp. 94-95
ClearText

More or Less (HTML)

pp. 96
129 ms
(Ver 3.1 (10032016))