Categorizing Uses of Communications Metadata - Systematizing Knowledge and Presenting a Path for Privacy. | 0 | 0.34 | 2020 |
Limiting the undesired impact of cyber weapons: technical requirements and policy implications. | 0 | 0.34 | 2017 |
Insecure Surveillance: Technical Issues with Remote Computer Searches. | 0 | 0.34 | 2016 |
Transactional Information Is Remarkably Revelatory | 1 | 0.40 | 2016 |
Is It Legal? Is It Right? The Can and Should of Use. | 0 | 0.34 | 2016 |
Keys under doormats: mandating insecurity by requiring government access to all data and communications. | 9 | 0.70 | 2015 |
Keys under doormats | 10 | 0.85 | 2015 |
Educating Engineers: Teaching Privacy in a World of Open Doors | 2 | 0.38 | 2014 |
Going Bright: Wiretapping without Weakening Communications Infrastructure | 4 | 0.46 | 2013 |
Politics, love, and death in a world of no privacy | 1 | 0.63 | 2013 |
The Large Immortal Machine and the Ticking Time Bomb. | 1 | 0.53 | 2013 |
Making Sense from Snowden: What's Significant in the NSA Surveillance Revelations | 29 | 1.81 | 2013 |
Privacy and Cybersecurity: The Next 100 Years. | 3 | 0.40 | 2012 |
Economic tussles in federated identity management. | 11 | 0.76 | 2012 |
The problem isn't attribution: it's multi-stage attacks | 11 | 0.61 | 2010 |
Achieving Privacy in a Federated Identity Management System | 8 | 0.53 | 2009 |
Communications surveillance: privacy and security at risk | 0 | 0.34 | 2009 |
The NRC Takes on Data Mining, Behavioral Surveillance, and Privacy | 0 | 0.34 | 2009 |
I'm Pc01002/SpringPeeper/ED288l.6; Who are You? | 0 | 0.34 | 2008 |
Security and Privacy Landscape in Emerging Technologies | 2 | 0.45 | 2008 |
Privacy and security: A multidimensional problem | 10 | 0.58 | 2008 |
Risking Communications Security: Potential Hazards of the Protect America Act | 19 | 2.76 | 2008 |
Privacy on the line: the politics of wiretapping and encryption | 18 | 5.74 | 2008 |
Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition | 4 | 1.46 | 2008 |
Internal surveillance, external risks | 1 | 0.35 | 2007 |
Consumers, fans, and control: what the games industry can teach Hollywood about DRM | 2 | 0.40 | 2006 |
National Security on the Line. | 1 | 1.12 | 2006 |
The real national-security needs for VoIP | 4 | 0.61 | 2005 |
Overview of Cyber Security: A Crisis of Prioritization | 3 | 0.43 | 2005 |
What lessons are we teaching? | 0 | 0.34 | 2005 |
Polynomials in the Nation's Service: Using Algebra to Design the Advanced Encryption Standard | 5 | 0.63 | 2004 |
Designing Cryptography For The New Century | 3 | 0.88 | 2000 |
Crypto policy perspectives | 4 | 2.07 | 1994 |
Some remarks on computing the square parts of integers | 6 | 0.65 | 1988 |