Papers in the Category “Miscellaneous Papers”
T. Herr, B. Schneier, and C. Morris, Taking Stock: Estimating Vulnerability Rediscovery, July 2017 (Revised October 2017).
O. S. Kerr, B. Schneier, Encryption Workarounds, Georgetown Law Journal, v. 106, 2018, p. 989-1019.
S. Shackelford, B. Schneier, M. Sulmeyer, A. Boustead, B. Buchanan, A. N. Craig Deckard, Trey Herr, J. Malekos Smith, Making Democracy Harder to Hack: Should Elections Be Classified as ‘Critical Infrastructure?’, University of Michigan Journal of Law Reform, v. 50, n. 3, Spring 2017, pp. 629-668.
J. Quinn and B. Schneier, A Proportional Voting System for Awards Nominations Resistant to Voting Blocs, Voting Matters, n. 31, to appear.
B. Schneier, K. Seidel, and S. Vijayakumar, A Worldwide Survey of Encryption Products, February 11, 2016.
U. Gasser, M. G. Olsen, N. Gertner, D. Renan, J. Goldsmith, J. Sanchez, S. Landau, B. Schneier, J. Nye, L. Schwartztol, D. R. O’Brien, and J. Zittrain, Don't Panic: Making Progress on the "Going Dark" Debate, Berkman Center Report, February 1, 2016.
H. Abelson, R. Anderson, S. M. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, M. Green, S. Landau, P. G. Neumann, R. L. Rivest, J. I. Schiller, B. Schneier, M. Specter, and D. J. Weitzner, Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications, Journal of Cybersecurity, November 2015.
B. Schneier, M. Fredrikson, T. Kohno, and T. Ristenpart, Surreptitiously Weakening Cryptographic Systems, Cryptology ePrint Archive, Report 2015/097, 2015.
A. Czeskis, D. Mah, O. Sandoval, I. Smith, K. Koscher, J. Appelbaum, T. Kohno, and B. Schneier, DeadDrop/Strongbox Security Assessment, UW Computer Science and Engineering Technical Report #13-08-02, August 8, 2013.
B. Schneier, Schneier on Security: Privacy and Control, Journal of Privacy and Confidentiality, v. 2, n.1, 2010.
A. Czeskis, D. J. St. Hilaire, K. Koscher, S. D. Gribble, T. Kohno, and B. Schneier, Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications, 3rd Usenix Workshop on Hot Topics in Security, 2008.
B. Schneier, The Psychology of Security, AFRICACRYPT 2008, LNCS 5023, Springer-Verlag, 2008, pp. 50-79.
R. Anderson and B. Schneier, Economics of Information Security, IEEE Security and Privacy, 3 (1), 2005, pp. 12-13.
Bruce Schneier, Managed Security Monitoring: Network Security for the 21st Century, Computers & Security, v. 20, 2001, pp. 491-503.
B. Schneier, The Fallacy of Trusted Client Software, Information Security Magazine, August 2000.
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, T. Kohno, and M. Stay, The Twofish Team's Final Comments on AES Selection, May 15, 2000.
D. Whiting, B. Schneier, and S. Bellovin, AES Key Agility Issues in High-Speed IPsec Implementations, May 15, 2000.
B. Schneier, The Process of Security, Information Security Magazine, April 2000.
B. Schneier and D. Whiting, A Performance Comparison of the Five AES Finalists, Proceedings of the Third AES Candidate Conference, April 2000, pp. 123-135.
C. Ellison and B. Schneier, Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure, Computer Security Journal, v 16, n 1, 2000, pp. 1-7.
C. Ellison, C. Hall, R. Milbert, and B. Schneier, Protecting Secret Keys with Personal Entropy, Future Generation Computer Systems, v. 16, 2000, pp. 311-318.
B. Schneier, Self-Study Course in Block Cipher Cryptanalysis, Cryptologia, v.24, n.1, Jan 2000, pp. 18-34.
B. Schneier, Attack Trees, Dr. Dobb's Journal, December 1999.
B. Schneier, Security in the Real World: How to Evaluate Security Technology, Computer Security Journal, v 15, n 4, 1999, pp. 1-14.
B. Schneier, A Plea for Simplicity, Information Security Magazine, November 1999.
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, Performance Comparison of the AES Submissions, Proc. Second AES Candidate Conference, NIST, March 1999, pp. 15-34.
Bruce Schneier and John Kelsey, Secure Audit Logs to Support Computer Forensics, ACM Transactions on Information and System Security, v. 1, n. 3, 1999, pp. 159-176.
B. Schneier, Cryptographic Design Vulnerabilities, IEEE Computer, v. 31, n. 9, Sep 1998, pp. 29-33.
B. Schneier, Scrambled Message, Information Security Magazine, October 1998.
C. Salter, O. Saydjari, B. Schneier, and J. Wallner, Toward a Secure System Engineering Methodology, New Security Paradigms Workshop, September 1998, pp. 2-10.
M. Jones and B. Schneier, Securing the World Wide Web: Smart Tokens and their Implementation, Proceedings of the Fourth International World Wide Web Conference, December 1995, pp. 397-409.
B. Schneier, A Primer on Authentication and Digital Signatures, Computer Security Journal, v. 10, n. 2, 1994, pp. 38-40.
B. Schneier, Designing Encryption Algorithms for Real People, Proceedings of the 1994 ACM SIGSAC New Security Paradigms Workshop, IEEE Computer Society Press, August 1994, pp. 63-71.
B. Schneier, One-Way Hash Functions, Dr. Dobb's Journal, v. 16, n. 9, September 1991, pp. 148-151.
Photo of Bruce Schneier by Per Ervland.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.