By Topic

IEEE Security & Privacy

Issue 3 • Date May-June 2004

Filter Results

Displaying Results 1 - 25 of 25
  • [Front cover]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (742 KB)
    Freely Available from IEEE
  • Websec the e-security 2004 conference & expo

    Publication Year: 2004, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (524 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (430 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2004, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • From the Editors: Whose Data Are These, Anyway?

    Publication Year: 2004, Page(s):5 - 6
    Request permission for commercial reuse | PDF file iconPDF (117 KB) | HTML iconHTML
    Freely Available from IEEE
  • Book Reviews

    Publication Year: 2004, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (46 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters to the Editor

    Publication Year: 2004, Page(s):8 - 9
    Request permission for commercial reuse | PDF file iconPDF (271 KB) | HTML iconHTML
    Freely Available from IEEE
  • Richard Clarke talks cybersecurity and JELL-O

    Publication Year: 2004, Page(s):11 - 15
    Request permission for commercial reuse | PDF file iconPDF (356 KB) | HTML iconHTML
    Freely Available from IEEE
  • Processes for producing secure software

    Publication Year: 2004, Page(s):18 - 25
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Summarizes work initiated at the National Cybersecurity Summit, held 2-3 December 2003 in Santa Clara, California. Attendees representing industry, academia, and the US Department of Homeland Security (DHS) formed five task forces to focus on specific topic areas. This report describes, the key problems and recommendations identified by the Software Process subgroup of the "Security Across the Sof... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editor's Introduction: Wired on Wireless

    Publication Year: 2004, Page(s):26 - 27
    Request permission for commercial reuse | PDF file iconPDF (337 KB) | HTML iconHTML
    Freely Available from IEEE
  • A survey of secure wireless ad hoc routing

    Publication Year: 2004, Page(s):28 - 39
    Cited by:  Papers (172)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Attacks on ad hoc network routing protocols disrupt network performance and reliability. The article reviews attacks on ad hoc networks and discusses current approaches for establishing cryptographic keys in ad hoc networks. We describe the state of research in secure ad hoc routing protocols and its rese... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overview of IEEE 802.16 security

    Publication Year: 2004, Page(s):40 - 48
    Cited by:  Papers (101)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    When creating the new wireless communication standard IEEE 802.16, designers attempted to reuse a security scheme designed for wired media. The authors review the standard, enumerate its flaws, and outline changes that could defend it against threats. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The security and privacy of smart vehicles

    Publication Year: 2004, Page(s):49 - 55
    Cited by:  Papers (238)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (569 KB) | HTML iconHTML

    Road safety, traffic management, and driver convenience continue to improve, in large part thanks to appropriate usage of information technology. But this evolution has deep implications for security and privacy, which the research community has overlooked so far. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomic 802.11 wireless LAN security auditing

    Publication Year: 2004, Page(s):56 - 65
    Cited by:  Papers (14)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (892 KB) | HTML iconHTML

    The authors describe their Distributed Wireless Security Auditor (DWSA), which works toward finding unauthorized wireless access points in large-scale wireless environments while providing an autonomic and unobtrusive layer of network protection. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cult classics [science fiction]

    Publication Year: 2004, Page(s):66 - 68
    Request permission for commercial reuse | PDF file iconPDF (195 KB) | HTML iconHTML
    Freely Available from IEEE
  • Guarding the castle keep: teaching with the fortress metaphor

    Publication Year: 2004, Page(s):69 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (831 KB) | HTML iconHTML
    Freely Available from IEEE
  • Worm and attack early warning: piercing stealthy reconnaissance

    Publication Year: 2004, Page(s):73 - 75
    Cited by:  Papers (6)  |  Patents (3)
    Request permission for commercial reuse | PDF file iconPDF (66 KB) | HTML iconHTML
    Freely Available from IEEE
  • Copyright and creativity

    Publication Year: 2004, Page(s):76 - 78
    Request permission for commercial reuse | PDF file iconPDF (217 KB) | HTML iconHTML
    Freely Available from IEEE
  • The kernel craze [computer security]

    Publication Year: 2004, Page(s):79 - 81
    Request permission for commercial reuse | PDF file iconPDF (333 KB) | HTML iconHTML
    Freely Available from IEEE
  • Online impersonation in securities scams

    Publication Year: 2004, Page(s):82 - 85
    Cited by:  Papers (3)
    Request permission for commercial reuse | PDF file iconPDF (94 KB) | HTML iconHTML
    Freely Available from IEEE
  • The wrong stuff? [computer viruses]

    Publication Year: 2004, Page(s):86 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (101 KB) | HTML iconHTML
    Freely Available from IEEE
  • Misuse and abuse cases: getting past the positive

    Publication Year: 2004, Page(s):90 - 92
    Cited by:  Papers (20)
    Request permission for commercial reuse | PDF file iconPDF (76 KB) | HTML iconHTML
    Freely Available from IEEE
  • Security or cosmetology?

    Publication Year: 2004, Page(s):93 - 95
    Request permission for commercial reuse | PDF file iconPDF (92 KB) | HTML iconHTML
    Freely Available from IEEE
  • Security and compliance

    Publication Year: 2004
    Request permission for commercial reuse | PDF file iconPDF (67 KB) | HTML iconHTML
    Freely Available from IEEE
  • USENIX Security Symposium

    Publication Year: 2004, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (525 KB)
    Freely Available from IEEE

Aims & Scope

The primary objective of IEEE Security & Privacy is to stimulate and track advances in information assurance and security and present these advances in a form that can be useful to a broad cross-section of the professional community-ranging from academic researchers to industry practitioners. It is intended to serve a broad readership.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Shari Lawrence Pfleeger
shari.l.pfleeger@dartmouth.edu