3 | -- | 4 | Jeremy Epstein. Phishing Our Employees |
6 | -- | 8 | Lee Garber. Security, Privacy, Policy, and Dependability Roundup |
9 | -- | 12 | Gary McGraw. Silver Bullet Talks with Yoshi Kohno |
13 | -- | 14 | Terry Benzel. A Symposium, a Magazine, and a Community |
15 | -- | 17 | Peter G. Neumann, Sean Peisert, Marvin Schaefer. The IEEE Symposium on Security and Privacy, in Retrospect |
18 | -- | 19 | George Cybenko, Kathy Clark-Fisher. IEEE Security & Privacy: The Early Years |
20 | -- | 27 | Michael Z. Lee, Alan M. Dunn, Jonathan Katz, Brent Waters, Emmett Witchel. Anon-Pass: Practical Anonymous Subscriptions |
28 | -- | 36 | Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna. On the Workings and Current Practices of Web-Based Device Fingerprinting |
37 | -- | 44 | Joel Reardon, David A. Basin, Srdjan Capkun. On Secure Data Deletion |
45 | -- | 53 | Laszlo Szekeres, Mathias Payer, Tao Wei, R. Sekar. Eternal War in Memory |
54 | -- | 60 | Arthur Gervais, Ghassan O. Karame, Vedran Capkun, Srdjan Capkun. Is Bitcoin a Decentralized Currency? |
61 | -- | 65 | Deirdre K. Mulligan. The Enduring Importance of Transparency |
66 | -- | 70 | Susan Landau. Educating Engineers: Teaching Privacy in a World of Open Doors |
71 | -- | 73 | Anna Slomovic. Privacy Issues in Identity Verification |
74 | -- | 77 | Milan Broz, Vashek Matyas. The TrueCrypt On-Disk Format-An Independent View |
78 | -- | 81 | Michael Lesk. Does the Cloud of Surveillance Have a Silver Lining? |
82 | -- | 84 | Chris Bonebrake, Lori Ross O'Neil. Attacks on GPS Time Reliability |
85 | -- | 87 | Martin Ortlieb. The Anthropologist's View on Privacy |
88 | -- | 0 | Steven M. Bellovin. Dr. Strangecode |