By Topic

IEEE Security & Privacy

Issue 4 • 2017

Filter Results

Displaying Results 1 - 23 of 23
  • Front Cover 
  • Front Cover

    Publication Year: 2017, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (892 KB)
    Freely Available from IEEE
  • House Advertisement 
  • Call for Papers Special Issue on AI Ethics: The Privacy Challenge

    Publication Year: 2017, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of contents

    Publication Year: 2017, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (795 KB)
    Freely Available from IEEE
  • From the Editors 
  • Authorship Integrity and Attacks

    Publication Year: 2017, Page(s):3 - 5
    Request permission for commercial reuse | PDF file iconPDF (192 KB)
    Freely Available from IEEE
  • Masthead 
  • Masthead

    Publication Year: 2017, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • Interview 
  • Silver Bullet Talks with Kelly Lum

    Publication Year: 2017, Page(s):7 - 10
    Request permission for commercial reuse | PDF file iconPDF (455 KB)
    Freely Available from IEEE
  • House Advertisement 
  • Looking for the BEST Tech Job for You? [advertisement]

    Publication Year: 2017, Page(s): 11
    Request permission for commercial reuse | PDF file iconPDF (3325 KB)
    Freely Available from IEEE
  • Guest Editors’ Introduction 
  • Postquantum Cryptography—State of the Art

    Publication Year: 2017, Page(s):12 - 13
    Request permission for commercial reuse | PDF file iconPDF (528 KB)
    Freely Available from IEEE
  • Postquantum Cryptography, Part 1 
  • The Day the Cryptography Dies

    Publication Year: 2017, Page(s):14 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1141 KB)

    Typical digital technology users are often unaware of the cryptographic capabilities they utilize daily. The implications of quantum computers for various digital technologies and environments are discussed, and potential threat actor behaviors are explored. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Postquantum Opportunities: Lattices, Homomorphic Encryption, and Supersingular Isogeny Graphs

    Publication Year: 2017, Page(s):22 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (827 KB)

    Supersingular isogeny graph–based cryptography has not yet been standardized, but the underlying hard problem has now been proposed as the basis for many cryptographic protocols. This motivates further investigation into the hardness of the underlying problem and the security of the proposed protocols. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Current State of Multivariate Cryptography

    Publication Year: 2017, Page(s):28 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (619 KB)

    A review of the current state of multivariate public-key cryptosystems compares and contrasts the most promising multivariate schemes in digital signatures and public-key encryption as well as their security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hash-Based Signatures: State of Play

    Publication Year: 2017, Page(s):37 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (393 KB)

    Quantum computers haven’t yet arrived, but a history of inertia in the wide-scale adoption of new cryptographic schemes means that standardization of postquantum signature schemes—particularly hash-based ones—is both timely and urgent. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Code-Based Cryptography: State of the Art and Perspectives

    Publication Year: 2017, Page(s):44 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (972 KB)

    Code-based cryptography is one of the few mathematical techniques that enables the construction of public-key cryptosystems that are secure against an adversary equipped with a quantum computer. The McEliece public-key encryption scheme and its variants are candidates for a postquantum public-key encryption standard. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptography Standards in Quantum Time: New Wine in an Old Wineskin?

    Publication Year: 2017, Page(s):51 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB)

    The history of cryptography standards is reviewed, with a view to planning for the challenges, uncertainties, and strategies that the standardization of postquantum cryptography will entail. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spotlight 
  • ACM CCS 2016 Interview, Part 3

    Publication Year: 2017, Page(s):58 - 61
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • Sociotechnical Security and Privacy 
  • Privacy? I Can’t Even! Making a Case for User-Tailored Privacy

    Publication Year: 2017, Page(s):62 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3413 KB)

    How can we help users balance the benefits and risks of information disclosure online? A user-tailored privacy approach makes privacy decisions less burdensome by giving users the right kind of information and the right amount of control so as to be useful but not overwhelming or misleading. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resilient Security 
  • The Right to Digital Self-Defense

    Publication Year: 2017, Page(s):68 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB)

    Although the right to physical self-defense is legally well established, it’s unclear how this principle translates to security in today’s digital world. Approaches to cyber self-defense are discussed, as are arguments for and against allowing organizations to actively respond to cyberattacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Education 
  • INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research

    Publication Year: 2017, Page(s):72 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1296 KB)

    Since fall 2012, several National Centers of Academic Excellence in Cyber Defense Research have fielded a collaborative course—the Information Security Research and Education (INSuRE) program—to engage students in applied cybersecurity research. Recent experiences with INSuRE are discussed, including an overview of the project-based research course, student projects, and outcomes and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systems Attacks and Defenses 
  • Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?

    Publication Year: 2017, Page(s):79 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB)

    The Internet of Things (IoT) is a new computing paradigm that spans wearable devices, homes, hospitals, cities, transportation, and critical infrastructure. Building security into this new computing paradigm is a major technical challenge. What IoT security problems can we solve using existing security principles? And, what new problems and challenges in this space will require new security mechan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conferences 
  • Building on the Success of Building Security In

    Publication Year: 2017, Page(s):85 - 87
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Last Word 
  • Attribution

    Publication Year: 2017, Page(s): 88
    Request permission for commercial reuse | PDF file iconPDF (202 KB)
    Freely Available from IEEE
  • House Advertisement 
  • New membership options for a better fit [advertisement]

    Publication Year: 2017, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (401 KB)
    Freely Available from IEEE
  • IEEE Security & Privacy

    Publication Year: 2017, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (2343 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Security & Privacy’s primary objective is to stimulate and track advances in security, privacy, and dependability and present these advances in a form that can be useful to a broad cross-section of the professional community—ranging from academic researchers to industry practitioners. It provides articles with both a practical and research bent by the top thinkers in the field of security and privacy, along with case studies, surveys, tutorials, columns, and in-depth interviews and podcasts for the information security industry.
 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Ahmad-Reza Sadeghi
Technische Universität Darmstadt
ahmad.sadeghi@trust.tu-darmstadt.de