By Topic

IEEE Security & Privacy

Issue 5 • Sept.-Oct. 2004

Filter Results

Displaying Results 1 - 22 of 22
  • [Front cover]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (572 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (363 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2004, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Time Out for Station Identification

    Publication Year: 2004, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (50 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters to the Editor

    Publication Year: 2004, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (51 KB) | HTML iconHTML
    Freely Available from IEEE
  • News

    Publication Year: 2004, Page(s):8 - 11
    Request permission for commercial reuse | PDF file iconPDF (336 KB) | HTML iconHTML
    Freely Available from IEEE
  • Protecting Consumers' Private Health Information

    Publication Year: 2004, Page(s): 12
    Request permission for commercial reuse | PDF file iconPDF (47 KB) | HTML iconHTML
    Freely Available from IEEE
  • Guest Editors' Introduction: Secure or Usable?

    Publication Year: 2004, Page(s):16 - 18
    Cited by:  Papers (12)
    Request permission for commercial reuse | PDF file iconPDF (230 KB) | HTML iconHTML
    Freely Available from IEEE
  • In search of usable security: five lessons from the field

    Publication Year: 2004, Page(s):19 - 24
    Cited by:  Papers (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB) | HTML iconHTML

    A new system reduces the time to enroll in a secure wireless network by two orders of magnitude, and it also gets high marks for usability and user satisfaction. This article provides a real-world example revealing five general lessons for usable, secure system design. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Password memorability and security: empirical results

    Publication Year: 2004, Page(s):25 - 31
    Cited by:  Papers (142)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (569 KB) | HTML iconHTML

    Users rarely choose passwords that are both hard to guess and easy to remember. To determine how to help users choose good passwords, the authors performed a controlled trial of the effects of giving users different kinds of advice. Some of their results challenge the established wisdom. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing and evaluating challenge-question systems

    Publication Year: 2004, Page(s):32 - 39
    Cited by:  Papers (16)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    The author describes a framework for designing user authentication systems with challenge questions that includes privacy, security, and usability criteria for evaluating a candidate challenge-question system. The proposed challenge-question system for recovering user credentials is based on this framework. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Typing patterns: a key to user identification

    Publication Year: 2004, Page(s):40 - 47
    Cited by:  Papers (84)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    As the deficiencies of traditional password-based access systems become increasingly acute, researchers have turned their focus to keystroke biometrics, which seeks to identify individuals by their typing characteristics. However, this field still faces many challenges before it can see full acceptance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aligning security and usability

    Publication Year: 2004, Page(s):48 - 55
    Cited by:  Papers (28)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1482 KB) | HTML iconHTML

    Conflicts between security and usability goals can be avoided by considering the goals together throughout an iterative design process. A successful design involves addressing users' expectations and inferring authorization based on their acts of designation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jennifer Government

    Publication Year: 2004, Page(s):57 - 59
    Request permission for commercial reuse | PDF file iconPDF (436 KB) | HTML iconHTML
    Freely Available from IEEE
  • Joining the security education community

    Publication Year: 2004, Page(s):61 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (410 KB) | HTML iconHTML
    Freely Available from IEEE
  • Multilevel security: reprise

    Publication Year: 2004, Page(s):64 - 67
    Cited by:  Papers (4)
    Request permission for commercial reuse | PDF file iconPDF (74 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computer security

    Publication Year: 2004, Page(s):68 - 71
    Cited by:  Papers (5)
    Request permission for commercial reuse | PDF file iconPDF (605 KB) | HTML iconHTML
    Freely Available from IEEE
  • The shellcode generation

    Publication Year: 2004, Page(s):72 - 76
    Cited by:  Papers (3)
    Request permission for commercial reuse | PDF file iconPDF (313 KB) | HTML iconHTML
    Freely Available from IEEE
  • Honeypot forensics, part II: analyzing the compromised host

    Publication Year: 2004, Page(s):77 - 80
    Cited by:  Papers (9)
    Request permission for commercial reuse | PDF file iconPDF (88 KB) | HTML iconHTML
    Freely Available from IEEE
  • Software security testing

    Publication Year: 2004, Page(s):81 - 85
    Cited by:  Papers (57)
    Request permission for commercial reuse | PDF file iconPDF (120 KB) | HTML iconHTML
    Freely Available from IEEE
  • Speech privacy technophobes need not apply

    Publication Year: 2004, Page(s):86 - 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (79 KB) | HTML iconHTML
    Freely Available from IEEE
  • SIMS: solution, or part of the problem?

    Publication Year: 2004
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (67 KB) | HTML iconHTML
    Freely Available from IEEE

Aims & Scope

IEEE Security & Privacy’s primary objective is to stimulate and track advances in security, privacy, and dependability and present these advances in a form that can be useful to a broad cross-section of the professional community—ranging from academic researchers to industry practitioners. It provides articles with both a practical and research bent by the top thinkers in the field of security and privacy, along with case studies, surveys, tutorials, columns, and in-depth interviews and podcasts for the information security industry.
 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Ahmad-Reza Sadeghi
Technische Universität Darmstadt
ahmad.sadeghi@trust.tu-darmstadt.de