Author: Rebecca Mercuri

Publication Overview

Publication period start: 2003
Number of co-authors: 1

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Mercuri, Rebecca (2005): Challenges in forensic computing. In Communications of the ACM, 48 (12) pp. 17-21. https://dl.acm.org/doi/10.1145/1101779.1101796
Mercuri, Rebecca (2004): Superscaled security. In Communications of the ACM, 47 (3) pp. 15-18. https://dl.acm.org/doi/10.1145/971617.971631
Mercuri, Rebecca (2004): The HIPAA-potamus in health care data security. In Communications of the ACM, 47 (7) pp. 25-28. https://dl.acm.org/doi/10.1145/1005817.1005840
Mercuri, Rebecca (2003): On auditing trails. In Communications of the ACM, 46 (1) pp. 17-20. https://dl.acm.org/doi/10.1145/602421.602436
Mercuri, Rebecca (2003): Standards insecurity. In Communications of the ACM, 46 (12) pp. 21-25. https://dl.acm.org/doi/10.1145/953460.953478
Mercuri, Rebecca (2003): Analyzing security costs. In Communications of the ACM, 46 (6) pp. 15-18. https://dl.acm.org/doi/10.1145/777313.777327
Mercuri, Rebecca, Neumann, Peter G. (2003): Security by obscurity. In Communications of the ACM, 46 (11) pp. 160. https://dl.acm.org/doi/10.1145/948383.948413
Mercuri, Rebecca (2002): Uncommon criteria. In Communications of the ACM, 45 (1) pp. 172. https://dl.acm.org/doi/10.1145/502269.502310
Mercuri, Rebecca (2002): Florida 2002: sluggish systems, vanishing votes. In Communications of the ACM, 45 (11) pp. 136. https://dl.acm.org/doi/10.1145/581571.581610
Mercuri, Rebecca (2002): Computer security: quality rather than quantity. In Communications of the ACM, 45 (10) pp. 11-14. https://dl.acm.org/doi/10.1145/570907.570917
Mercuri, Rebecca, Neumann, Peter G. (2001): System integrity revisited. In Communications of the ACM, 44 (1) pp. 160. https://dl.acm.org/doi/10.1145/357489.357517
Mercuri, Rebecca (2000): Voting automation (early and often?). In Communications of the ACM, 43 (11) pp. 176. https://dl.acm.org/doi/10.1145/353360.353378
Mercuri, Rebecca (1998): In Search of Academic Integrity. In Communications of the ACM, 41 (5) pp. 136.
Mercuri, Rebecca (1993): Corrupted Polling. In Communications of the ACM, 36 (11) pp. 122.
Mercuri, Rebecca (1992): Voting-Machine Risks. In Communications of the ACM, 35 (11) pp. 138.
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Get one powerful email each week, like 326,226 others.

Learn to design a life you love.

Next email in
6
days
20
hrs
47
mins
56
secs