Author: Bruce Schneier
Publication Overview
Publication period start: 2007
Number of co-authors: 6
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Schneier,
Bruce
(2007):
The psychology of security.
In
Communications of the ACM,
50
(5)
pp. 128.
https://dl.acm.org/doi/10.1145/1230819.1241693
Schneier,
Bruce
(2005):
Two-factor authentication: too little, too late.
In
Communications of the ACM,
48
(4)
pp. 136.
https://dl.acm.org/doi/10.1145/1053291.1053327
Schneier,
Bruce
(2005):
Risks of third-party data.
In
Communications of the ACM,
48
(5)
pp. 136.
https://dl.acm.org/doi/10.1145/1060710.1060744
Schneier,
Bruce
(2004):
Hacking the Business Climate for Network Security.
In
IEEE Computer,
37
(4)
pp. 87-89.
https://csdl.computer.org/comp/mags/co/2004/04/r4087abs.htm
Kocher,
Paul C.,
Schneier,
Bruce
(2004):
Insider risks in elections.
In
Communications of the ACM,
47
(7)
pp. 104.
https://dl.acm.org/doi/10.1145/1005817.1005846
Schneier,
Bruce
(2004):
The nonsecurity of secrecy.
In
Communications of the ACM,
47
(10)
pp. 120.
https://dl.acm.org/doi/10.1145/1022594.1022629
Dill,
David L.,
Schneier,
Bruce,
Simons,
Barbara
(2003):
Voting and technology: who gets to count your vote?.
In
Communications of the ACM,
46
(8)
pp. 29-31.
https://dl.acm.org/doi/10.1145/859670.859692
Schneier,
Bruce
(2001):
Insurance and the computer industry.
In
Communications of the ACM,
44
(3)
pp. 114-115.
https://dl.acm.org/doi/10.1145/365181.365229
Schneier,
Bruce
(2001):
Cyber underwriters lab.
In
Communications of the ACM,
44
(4)
pp. 128.
https://dl.acm.org/doi/10.1145/367211.367296
Somogyi,
Stephan,
Schneier,
Bruce
(2001):
The perils of port 80.
In
Communications of the ACM,
44
(10)
pp. 168.
Ellison,
Carl M.,
Schneier,
Bruce
(2000):
Risks of PKI: Secure Email.
In
Communications of the ACM,
43
(1)
pp. 160.
https://dl.acm.org/doi/10.1145/323830.323850
Ellison,
Carl M.,
Schneier,
Bruce
(2000):
Risks of PKI: E-Commerce.
In
Communications of the ACM,
43
(2)
pp. 152.
https://dl.acm.org/doi/10.1145/328236.328123
Schneier,
Bruce
(2000):
Semantic network attacks.
In
Communications of the ACM,
43
(12)
pp. 168.
https://dl.acm.org/doi/10.1145/355112.355131
Kelsey,
John,
Schneier,
Bruce
(1999):
The Street Performer Protocol and Digital Copyrights.
In
First Monday,
4
(6)
pp. .
https://www.firstmonday.org/issues/issue4_6/kelsey/index.html
Schneier,
Bruce
(1999):
Cryptography: The Importance of Not Being Different.
In
IEEE Computer,
32
(3)
pp. 108-109.
https://doi.ieeecomputersociety.org/10.1109/2.751335
Schneier,
Bruce
(1999):
The Uses and Abuses of Biometrics.
In
Communications of the ACM,
42
(8)
pp. 136.
https://dl.acm.org/doi/10.1145/310930.310988
Schneier,
Bruce
(1999):
The Trojan Horse Race.
In
Communications of the ACM,
42
(9)
pp. 128.
https://dl.acm.org/doi/10.1145/315762.315785
Schneier,
Bruce
(1999):
Risks of Relying on Cryptography.
In
Communications of the ACM,
42
(10)
pp. 144.
https://dl.acm.org/doi/10.1145/317665.317684
Schneier,
Bruce
(1998):
Cryptographic Design Vulnerabilities.
In
IEEE Computer,
31
(9)
pp. 29-33.
Schneier,
Bruce
(1997):
Cryptography, Security, and the Future.
In
Communications of the ACM,
40
(1)
pp. 138.