Author: Bruce Schneier
Publications
Co-authors
Productive Colleagues
Publications
Schneier, Bruce (2007): The psychology of security. In Communications of the ACM, 50 (5) pp. 128. https://dl.acm.org/doi/10.1145/1230819.1241693
Schneier, Bruce (2005): Two-factor authentication: too little, too late. In Communications of the ACM, 48 (4) pp. 136. https://dl.acm.org/doi/10.1145/1053291.1053327
Schneier, Bruce (2005): Risks of third-party data. In Communications of the ACM, 48 (5) pp. 136. https://dl.acm.org/doi/10.1145/1060710.1060744
Schneier, Bruce (2004): Hacking the Business Climate for Network Security. In IEEE Computer, 37 (4) pp. 87-89. https://csdl.computer.org/comp/mags/co/2004/04/r4087abs.htm
Kocher, Paul C., Schneier, Bruce (2004): Insider risks in elections. In Communications of the ACM, 47 (7) pp. 104. https://dl.acm.org/doi/10.1145/1005817.1005846
Schneier, Bruce (2004): The nonsecurity of secrecy. In Communications of the ACM, 47 (10) pp. 120. https://dl.acm.org/doi/10.1145/1022594.1022629
Dill, David L., Schneier, Bruce, Simons, Barbara (2003): Voting and technology: who gets to count your vote?. In Communications of the ACM, 46 (8) pp. 29-31. https://dl.acm.org/doi/10.1145/859670.859692
Schneier, Bruce (2001): Insurance and the computer industry. In Communications of the ACM, 44 (3) pp. 114-115. https://dl.acm.org/doi/10.1145/365181.365229
Schneier, Bruce (2001): Cyber underwriters lab. In Communications of the ACM, 44 (4) pp. 128. https://dl.acm.org/doi/10.1145/367211.367296
Somogyi, Stephan, Schneier, Bruce (2001): The perils of port 80. In Communications of the ACM, 44 (10) pp. 168.
Ellison, Carl M., Schneier, Bruce (2000): Risks of PKI: Secure Email. In Communications of the ACM, 43 (1) pp. 160. https://dl.acm.org/doi/10.1145/323830.323850
Ellison, Carl M., Schneier, Bruce (2000): Risks of PKI: E-Commerce. In Communications of the ACM, 43 (2) pp. 152. https://dl.acm.org/doi/10.1145/328236.328123
Schneier, Bruce (2000): Semantic network attacks. In Communications of the ACM, 43 (12) pp. 168. https://dl.acm.org/doi/10.1145/355112.355131
Kelsey, John, Schneier, Bruce (1999): The Street Performer Protocol and Digital Copyrights. In First Monday, 4 (6) pp. . https://www.firstmonday.org/issues/issue4_6/kelsey/index.html
Schneier, Bruce (1999): Cryptography: The Importance of Not Being Different. In IEEE Computer, 32 (3) pp. 108-109. https://doi.ieeecomputersociety.org/10.1109/2.751335
Schneier, Bruce (1999): The Uses and Abuses of Biometrics. In Communications of the ACM, 42 (8) pp. 136. https://dl.acm.org/doi/10.1145/310930.310988
Schneier, Bruce (1999): The Trojan Horse Race. In Communications of the ACM, 42 (9) pp. 128. https://dl.acm.org/doi/10.1145/315762.315785
Schneier, Bruce (1999): Risks of Relying on Cryptography. In Communications of the ACM, 42 (10) pp. 144. https://dl.acm.org/doi/10.1145/317665.317684
Schneier, Bruce (1998): Cryptographic Design Vulnerabilities. In IEEE Computer, 31 (9) pp. 29-33.
Schneier, Bruce (1997): Cryptography, Security, and the Future. In Communications of the ACM, 40 (1) pp. 138.