Journal: IEEE Security & Privacy

Volume 5, Issue 2

4 -- 5Fred B. Schneider. Trusted Computing in Context
7 -- 10Brandi Ortega. News Briefs
11 -- 14Gary McGraw. Silver Bullet Speaks with Dorothy Denning
15 -- 16Ivan Arce. A Surprise Party (on Your Computer)?
17 -- 25Luca Carettoni, Claudio Merloni, Stefano Zanero. Studying Bluetooth Malware Propagation: The BlueBag Project
26 -- 31Vanessa Gratzer, David Naccache. Alien vs. Quine
32 -- 39Carsten Willems, Thorsten Holz, Felix C. Freiling. Toward Automated Dynamic Malware Analysis Using CWSandbox
40 -- 45Robert Lyda, James Hamrock. Using Entropy Analysis to Find Encrypted and Packed Malware
46 -- 54Danilo Bruschi, Lorenzo Martignoni, Mattia Monga. Code Normalization for Self-Mutating Malware
55 -- 63Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino. Trust Negotiation in Identity Management
64 -- 67Marianthi Theoharidou, Dimitris Gritzalis. Common Body of Knowledge for Information Security
68 -- 71Keye Martin. Secure Communication without Encryption?
72 -- 75E. Michael Power, Jonathan Gilhen, Roland L. Trope. Setting Boundaries at Borders: Reconciling Laptop Searches and Privacy
76 -- 79Patrick P. Tsang. When Cryptographers Turn Lead into Gold
80 -- 84Apu Kapadia. A Case (Study) For Usability in Secure Email Communication
85 -- 87Michael Lesk. South Korea s Way to the Future
88 -- 91Elizabeth A. Nichols, Gunnar Peterson. A Metrics Framework to Drive Application Security Improvement
92 -- 96Ramaswamy Chandramouli, Philip Lee. Infrastructure Standards for Smart ID Card Deployment