Papers in the Category "Miscellaneous Papers"

N. E. Sanders, A. Ulinich, B. Schneier, Demonstrations of the Potential of AI-based Political Issue Polling, arXiv:2307.04781 [cs.CY], July 10, 2023.

J. Penney and B. Schneier, Platforms, Encryption, and the CFAA: The Case of WhatsApp v NSO Group, Berkeley Technology Law Journal, v. 36, n. 1, 2021.

H. Abelson, R. Anderson, S. M. Bellovin, J. Benaloh, M. Blaze, J. Callas, W. Diffie, S. Landau, P. G. Neumann, R. L. Rivest, J. I. Schiller, B. Schneier, V. Teague, C. Troncoso, Bugs in our Pockets: The Risks of Client-Side Scanning, Journal of Cybersecurity, 2023, 1–18..

N. E. Sanders and B. Schneier, Machine Learning Featurizations for AI Hacking of Political Systems, arXiv:2110.09231 [cs.CY], October 8, 2021.

H. Farrell and B. Schneier, Rechanneling Beliefs: How Information Flows Hinder or Help Democracy, Stavros Niarchos Foundation SNF Agora Institute, Johns Hopkins, May 24, 2021.

B. Schneier, The Coming AI Hackers, Belfer Center for Science and International Affairs, Harvard Kennedy School, April 2021.

G. Corn, J. Daskal, J. Goldsmith, C. Inglis, P. Rozenzweig, S. Sacks, B. Schneier, A. Stamos, V. Stewart, Chinese Technology Platforms Operating in the United States: Assessing the Threat, Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law, February 11, 2021.

R. S. S. Kumar, J. Penney, B. Schneier, K. Albert, Legal Risks of Adversarial Machine Learning Research, arXiv:2006.16179, June 29, 2020.

N. Kim, T. Herr, and B. Schneier, The Reverse Cascade: Enforcing Security on the Global IoT Supply Chain, Atlantic Council, June 2020.

K. Levy and B. Schneier, Privacy Threats in Intimate Relationships, Journal of Cybersecurity, v. 6, n. 1, 2020.

M. Bourdeaux, G. Abiola, B. Edgar, J. Pershing J. Wang, M. Van Loon, B. Schneier, Weaponizing Digital Health Intelligence, Belfer Center for Science and International Affairs, Harvard Kennedy School, January 2020.

K. Albert, J. Penney, B. Schneier, R. Shankar, and S. Kumar, Politics of Adversarial Machine Learning, arXiv:2002.05648, February 2020.

A. Adams, F. Ben-Youssef, B. Schneier, K. Murata, Superheroes on Screen: Real Life Lessons for Security Debates, Security Journal, v. 33, no. 4, pp. 565-582, September 16, 2019.

H. Farrell, B. Schneier, Common-Knowledge Attacks on Democracy, Berkman Klein Center Research Publication No. 2018-7, October 2018. Available at SSRN:

T. Herr, B. Schneier, and C. Morris, Taking Stock: Estimating Vulnerability Rediscovery, July 2017 (Revised October 2017).

O. S. Kerr, B. Schneier, Encryption Workarounds, Georgetown Law Journal, v. 106, 2017, p. 989-1019..

S. Shackelford, B. Schneier, M. Sulmeyer, A. Boustead, B. Buchanan, A. N. Craig Deckard, Trey Herr, J. Malekos Smith, Making Democracy Harder to Hack: Should Elections Be Classified as ‘Critical Infrastructure?’, University of Michigan Journal of Law Reform, v. 50, n. 3, Spring 2017, pp. 629-668.

J. Quinn and B. Schneier, A Proportional Voting System for Awards Nominations Resistant to Voting Blocs, Voting Matters, n. 31, 2016.

B. Schneier, K. Seidel, and S. Vijayakumar, A Worldwide Survey of Encryption Products, February 11, 2016.

U. Gasser, M. G. Olsen, N. Gertner, D. Renan, J. Goldsmith, J. Sanchez, S. Landau, B. Schneier, J. Nye, L. Schwartztol, D. R. O’Brien, and J. Zittrain, Don't Panic: Making Progress on the "Going Dark" Debate, Berkman Center Report, February 1, 2016.

H. Abelson, R. Anderson, S. M. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, M. Green, S. Landau, P. G. Neumann, R. L. Rivest, J. I. Schiller, B. Schneier, M. Specter, and D. J. Weitzner, Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications, Journal of Cybersecurity, November 2015.

B. Schneier, M. Fredrikson, T. Kohno, and T. Ristenpart, Surreptitiously Weakening Cryptographic Systems, Cryptology ePrint Archive, Report 2015/097, 2015.

A. Czeskis, D. Mah, O. Sandoval, I. Smith, K. Koscher, J. Appelbaum, T. Kohno, and B. Schneier, DeadDrop/Strongbox Security Assessment, UW Computer Science and Engineering Technical Report #13-08-02, August 8, 2013.

B. Schneier, Schneier on Security: Privacy and Control, Journal of Privacy and Confidentiality, v. 2, n.1, 2010.

A. Czeskis, D. J. St. Hilaire, K. Koscher, S. D. Gribble, T. Kohno, and B. Schneier, Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications, 3rd Usenix Workshop on Hot Topics in Security, 2008.

B. Schneier, The Psychology of Security, AFRICACRYPT 2008, LNCS 5023, Springer-Verlag, 2008, pp. 50-79.

R. Anderson and B. Schneier, Economics of Information Security, IEEE Security and Privacy, 3 (1), 2005, pp. 12-13.

Bruce Schneier, Managed Security Monitoring: Network Security for the 21st Century, Computers & Security, v. 20, 2001, pp. 491-503.

B. Schneier, The Fallacy of Trusted Client Software, Information Security Magazine, August 2000.

B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, T. Kohno, and M. Stay, The Twofish Team's Final Comments on AES Selection, May 15, 2000.

D. Whiting, B. Schneier, and S. Bellovin, AES Key Agility Issues in High-Speed IPsec Implementations, May 15, 2000.

B. Schneier, The Process of Security, Information Security Magazine, April 2000.

B. Schneier and D. Whiting, A Performance Comparison of the Five AES Finalists, Proceedings of the Third AES Candidate Conference, April 2000, pp. 123-135.

C. Ellison and B. Schneier, Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure, Computer Security Journal, v 16, n 1, 2000, pp. 1-7.

C. Ellison, C. Hall, R. Milbert, and B. Schneier, Protecting Secret Keys with Personal Entropy, Future Generation Computer Systems, v. 16, 2000, pp. 311-318.

B. Schneier, Self-Study Course in Block Cipher Cryptanalysis, Cryptologia, v.24, n.1, Jan 2000, pp. 18-34.

B. Schneier, Attack Trees, Dr. Dobb's Journal, December 1999.

B. Schneier, Security in the Real World: How to Evaluate Security Technology, Computer Security Journal, v 15, n 4, 1999, pp. 1-14.

B. Schneier, A Plea for Simplicity, Information Security Magazine, November 1999.

B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, Performance Comparison of the AES Submissions, Proc. Second AES Candidate Conference, NIST, March 1999, pp. 15-34.

Bruce Schneier and John Kelsey, Secure Audit Logs to Support Computer Forensics, ACM Transactions on Information and System Security, v. 1, n. 3, 1999, pp. 159-176.

B. Schneier, Cryptographic Design Vulnerabilities, IEEE Computer, v. 31, n. 9, Sep 1998, pp. 29-33.

B. Schneier, Scrambled Message, Information Security Magazine, October 1998.

C. Salter, O. Saydjari, B. Schneier, and J. Wallner, Toward a Secure System Engineering Methodology, New Security Paradigms Workshop, September 1998, pp. 2-10.

M. Jones and B. Schneier, Securing the World Wide Web: Smart Tokens and their Implementation, Proceedings of the Fourth International World Wide Web Conference, December 1995, pp. 397-409.

B. Schneier, A Primer on Authentication and Digital Signatures, Computer Security Journal, v. 10, n. 2, 1994, pp. 38-40.

B. Schneier, Designing Encryption Algorithms for Real People, Proceedings of the 1994 ACM SIGSAC New Security Paradigms Workshop, IEEE Computer Society Press, August 1994, pp. 63-71.

B. Schneier, One-Way Hash Functions, Dr. Dobb's Journal, v. 16, n. 9, September 1991, pp. 148-151.

Sidebar photo of Bruce Schneier by Joe MacInnis.