3 | -- | 5 | Jeremy Epstein. The Whole Is Less than the Sum of the Parts |
7 | -- | 10 | Gary McGraw. Silver Bullet Talks with Whitfield Diffie |
12 | -- | 13 | Terry Benzel. An Enduring Symposium for Leading Research in Security and Privacy |
14 | -- | 21 | Sai Teja Peddinti, Aleksandra Korolova, Elie Bursztein, Geetanjali Sampemane. Understanding Sensitivity by Analyzing Anonymity [Guest editor's introduction] |
22 | -- | 29 | Susan Hohenberger, Steven Myers, Rafael Pass, Abhi Shelat. An Overview of ANONIZE: A Large-Scale Anonymous Survey System |
30 | -- | 37 | Per Larsen, Stefan Brunthaler, Michael Franz. Automatic Software Diversity |
38 | -- | 46 | Zongwei Zhou, Miao Yu, Virgil D. Gligor. Dancing with Giants: Wimpy Kernels for On-Demand I/O Isolation |
48 | -- | 55 | Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, Radu Sion. Introspections on the Semantic Gap |
56 | -- | 64 | Mike Bond, Marios O. Choudary, Steven J. Murdoch, Sergei P. Skorobogatov, Ross J. Anderson. Be Prepared: The EMV Preplay Attack |
65 | -- | 74 | Vincent Lenders, Axel Tanner, Albert Blarer. Gaining an Edge in Cyberspace with Advanced Situational Awareness |
75 | -- | 80 | Melissa Dark, Jelena Mirkovic. Evaluation Theory and Practice Applied to Cybersecurity Education |
81 | -- | 83 | Graham Steel. Automated Proof and Flaw-Finding Tools in Cryptography |
84 | -- | 88 | Budi Arief, Mohd Azeem Bin Adzmi. Understanding Cybercrime from Its Stakeholders' Perspectives: Part 2-Defenders and Victims |
89 | -- | 93 | Wojciech Mazurczyk, Luca Caviglione. Information Hiding as a Challenge for Malware Detection |
94 | -- | 98 | Sean W. Smith, John S. Erickson. Never Mind Pearl Harbor-What about a Cyber Love Canal? |
99 | -- | 102 | Michael Lesk. Safety Risks-Human Error or Mechanical Failure?: Lessons from Railways |
103 | -- | 107 | Frederik Zuiderveen Borgesius. Informed Consent: We Can Do Better to Defend Privacy |
108 | -- | 0 | Bruce Schneier. The Security Value of Muddling Through |