Journal: IEEE Security & Privacy

Volume 7, Issue 2

3 -- 4Fred B. Schneider. Accountability for Perfection
8 -- 9Brandi Ortega. News Briefs
10 -- 14Gary McGraw. Silver Bullet Talks with Jeremiah Grossman
15 -- 0Shari Lawrence Pfleeger. Searching for You
16 -- 17Michael A. Caloyannides, Nasir Memon, Wietse Venema. Digital Forensics
18 -- 25Michael A. Caloyannides. Forensics Is So Yesterday
26 -- 29Brian D. Carrier. Digital Forensics Works
30 -- 37Brian Hay, Matt Bishop, Kara L. Nance. Live Analysis: Progress and Challenges
38 -- 44Simson L. Garfinkel, James J. Migletz. New XML-Based Files Implications for Forensics
45 -- 48Gavin Wylie Manes, Elizabeth Downing. Overview of Licensing and Legal Issues for Digital Forensic Investigators
49 -- 55Vassil Roussev. Hashing and Data Fingerprinting in Digital Forensics
56 -- 62Sarah Spiekermann, Sergei Evdokimov. Critical RFID Privacy-Enhancing Technologies
67 -- 70John Harauz, Lori M. Kaufman. A New Era of Presidential Security: The President and His BlackBerry
71 -- 74Jungwoo Ryoo, Angsana A. Techatassanasoontorn, Dongwon Lee. Security Education Using Second Life
75 -- 78Khaled El Emam, Patricia Kosseim. Privacy Interests in Prescription Data, Part 2: Patient Privacy
79 -- 82Julien Brouchier, Tom Kean, Carol Marsh, David Naccache. Temperature Attacks
83 -- 86Martin Gilje Jaatun, Jostein Jensen, Havard Vegge, Finn Michael Halvorsen, Rune Walso Nergard. Fools Download Where Angels Fear to Tread
87 -- 90Michael Zhivich, Robert K. Cunningham. The Real Cost of Software Errors
91 -- 93Gunnar Peterson. Service-Oriented Security Indications for Use
94 -- 95Daniel E. Geer Jr., Daniel G. Conway. Hard Data Is Good to Find
96 -- 0Steven M. Bellovin. The Government and Cybersecurity