August 24, 2012

Articles not available in full text can be requested at no cost via DocumentExpress.

  • Cryptology EPrint Archive – new items [Full Text]:
  • Gallagher, R. (2012, August 20). How government grade-spytech used a fake scandal to dupe journalists. Slate. [Read]
  • Goodin, D. (2012, August 20). Why passwords have never been weaker and crackers have never been stronger. Ars Technica. [Read]
  • Information Security Journal – new articles [Abstracts / Request]:
  • Kravets, D. (2012, August 22). Landmark California location-privacy bill nears governor’s desk . Wired. [Read]
  • Network Security – new articles [Full Text]:
  • 9th International Conference on Trust, Privacy and Security in Digital Business. (2012, September 3-7) – papers to be presented [Abstracts / Request]:
  • 9th VLBD Workshop. (2012, August 27) – papers to be presented [Abstracts / Request]:
  • Perlroth, N. (2012, August 23). Hackers lay claim to Saudi Aramco attack. New York Times. [Read]
  • Poitras, L. (2012, August 22). The program [profile of NSA whistleblower / anti-surveillance activist William Binney]. New York Times. [Read]
  • 17th European Symposium on Research in Computer Security (2012, September 10-12) – papers to be presented [Abstracts / Request]:
  • United States. Congressional Research Service. (2012, August 16). Pipeline cybersecurity. [Read]
  • United States. Department of Homeland Security. (2012, August 21). Key management errors in Ruggedcom’s Rugged operating system. [Read]
  • United States. Government Accountability Office. (2012, July 19). Environmental Protection Agency needs to resolve weaknesses. [Read]
  • United States. National Institute of Standards and Technology.  (2012, August 23). The role of the National Institute of Standards and Technology in mobile security. [Read]
  • Viswanath, B., Kiciman, E., & Saroiu, S. (2012, August 17). Keeping information safe from social networking apps [Microsoft Research]. [Read]

Calls for Papers



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: