Author: Bruce Schneier

Publication Overview

Publication period start: 2007
Number of co-authors: 6

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Schneier, Bruce (2007): The psychology of security. In Communications of the ACM, 50 (5) pp. 128. https://dl.acm.org/doi/10.1145/1230819.1241693
Schneier, Bruce (2005): Two-factor authentication: too little, too late. In Communications of the ACM, 48 (4) pp. 136. https://dl.acm.org/doi/10.1145/1053291.1053327
Schneier, Bruce (2005): Risks of third-party data. In Communications of the ACM, 48 (5) pp. 136. https://dl.acm.org/doi/10.1145/1060710.1060744
Schneier, Bruce (2004): Hacking the Business Climate for Network Security. In IEEE Computer, 37 (4) pp. 87-89. https://csdl.computer.org/comp/mags/co/2004/04/r4087abs.htm
Kocher, Paul C., Schneier, Bruce (2004): Insider risks in elections. In Communications of the ACM, 47 (7) pp. 104. https://dl.acm.org/doi/10.1145/1005817.1005846
Schneier, Bruce (2004): The nonsecurity of secrecy. In Communications of the ACM, 47 (10) pp. 120. https://dl.acm.org/doi/10.1145/1022594.1022629
Dill, David L., Schneier, Bruce, Simons, Barbara (2003): Voting and technology: who gets to count your vote?. In Communications of the ACM, 46 (8) pp. 29-31. https://dl.acm.org/doi/10.1145/859670.859692
Schneier, Bruce (2001): Insurance and the computer industry. In Communications of the ACM, 44 (3) pp. 114-115. https://dl.acm.org/doi/10.1145/365181.365229
Schneier, Bruce (2001): Cyber underwriters lab. In Communications of the ACM, 44 (4) pp. 128. https://dl.acm.org/doi/10.1145/367211.367296
Somogyi, Stephan, Schneier, Bruce (2001): The perils of port 80. In Communications of the ACM, 44 (10) pp. 168.
Ellison, Carl M., Schneier, Bruce (2000): Risks of PKI: Secure Email. In Communications of the ACM, 43 (1) pp. 160. https://dl.acm.org/doi/10.1145/323830.323850
Ellison, Carl M., Schneier, Bruce (2000): Risks of PKI: E-Commerce. In Communications of the ACM, 43 (2) pp. 152. https://dl.acm.org/doi/10.1145/328236.328123
Schneier, Bruce (2000): Semantic network attacks. In Communications of the ACM, 43 (12) pp. 168. https://dl.acm.org/doi/10.1145/355112.355131
Kelsey, John, Schneier, Bruce (1999): The Street Performer Protocol and Digital Copyrights. In First Monday, 4 (6) pp. . https://www.firstmonday.org/issues/issue4_6/kelsey/index.html
Schneier, Bruce (1999): Cryptography: The Importance of Not Being Different. In IEEE Computer, 32 (3) pp. 108-109. https://doi.ieeecomputersociety.org/10.1109/2.751335
Schneier, Bruce (1999): The Uses and Abuses of Biometrics. In Communications of the ACM, 42 (8) pp. 136. https://dl.acm.org/doi/10.1145/310930.310988
Schneier, Bruce (1999): The Trojan Horse Race. In Communications of the ACM, 42 (9) pp. 128. https://dl.acm.org/doi/10.1145/315762.315785
Schneier, Bruce (1999): Risks of Relying on Cryptography. In Communications of the ACM, 42 (10) pp. 144. https://dl.acm.org/doi/10.1145/317665.317684
Schneier, Bruce (1998): Cryptographic Design Vulnerabilities. In IEEE Computer, 31 (9) pp. 29-33.
Schneier, Bruce (1997): Cryptography, Security, and the Future. In Communications of the ACM, 40 (1) pp. 138.
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Join 326,043+ designers who get one powerful email each week. Learn to design a life you love.

Next email in
1
day
3
hrs
13
mins
58
secs

Free forever. No spam. Unsubscribe anytime.