Journal: IEEE Security & Privacy

Volume 1, Issue 2

6 -- 0George Cybenko. From the Editor: Sapphire/Slammer Redux
7 -- 10. Letters to the Editor
11 -- 13Daniel P. Dern. Privacy Concerns
15 -- 23Lance Spitzner. The Honeynet Project: Trapping the Hackers
24 -- 32Matt Blaze. Rights Amplification in Master-Keyed Mechanical Locks
33 -- 42Salil Prabhakar, Sharath Pankanti, Anil K. Jain. Biometric Recognition: Security and Privacy Concerns
43 -- 52William E. Burr. Selecting the Advanced Encryption Standard
53 -- 55Marc Donner. Post-Apocalypse Now
56 -- 58Jim Davis, Melissa Dark. Teaching Students to Design Secure Systems
59 -- 66Gary McGraw. From the Ground Up: The DIMACS Software Security Workshop
67 -- 69Michael Lesk. Copyright Enforcement or Censorship: New Uses for the DMCA?
70 -- 71Jim Hearn. Moving Forward?
72 -- 76Ivan Arce. The Weakest Link Revisited
77 -- 80Edward Ball, David W. Chadwick, Darren P. Mundy. Patient Privacy in Electronic Prescription Transfer
81 -- 83James A. Whittaker. Why Secure Applications are Difficult to Write
84 -- 87Michael Caloyannides. Engineering or Sloganeering? The Counterattack on Privacy
88 -- 0Bruce Schneier. Locks and Full Disclosure