Author: Rebecca Mercuri
Publications
Co-authors
Productive Colleagues
- Peter G. Neumann
- 105
Publications
Mercuri, Rebecca (2005): Challenges in forensic computing. In Communications of the ACM, 48 (12) pp. 17-21. https://dl.acm.org/doi/10.1145/1101779.1101796
Mercuri, Rebecca (2004): Superscaled security. In Communications of the ACM, 47 (3) pp. 15-18. https://dl.acm.org/doi/10.1145/971617.971631
Mercuri, Rebecca (2004): The HIPAA-potamus in health care data security. In Communications of the ACM, 47 (7) pp. 25-28. https://dl.acm.org/doi/10.1145/1005817.1005840
Mercuri, Rebecca (2003): On auditing trails. In Communications of the ACM, 46 (1) pp. 17-20. https://dl.acm.org/doi/10.1145/602421.602436
Mercuri, Rebecca (2003): Standards insecurity. In Communications of the ACM, 46 (12) pp. 21-25. https://dl.acm.org/doi/10.1145/953460.953478
Mercuri, Rebecca (2003): Analyzing security costs. In Communications of the ACM, 46 (6) pp. 15-18. https://dl.acm.org/doi/10.1145/777313.777327
Mercuri, Rebecca, Neumann, Peter G. (2003): Security by obscurity. In Communications of the ACM, 46 (11) pp. 160. https://dl.acm.org/doi/10.1145/948383.948413
Mercuri, Rebecca (2002): Uncommon criteria. In Communications of the ACM, 45 (1) pp. 172. https://dl.acm.org/doi/10.1145/502269.502310
Mercuri, Rebecca (2002): Florida 2002: sluggish systems, vanishing votes. In Communications of the ACM, 45 (11) pp. 136. https://dl.acm.org/doi/10.1145/581571.581610
Mercuri, Rebecca (2002): Computer security: quality rather than quantity. In Communications of the ACM, 45 (10) pp. 11-14. https://dl.acm.org/doi/10.1145/570907.570917
Mercuri, Rebecca, Neumann, Peter G. (2001): System integrity revisited. In Communications of the ACM, 44 (1) pp. 160. https://dl.acm.org/doi/10.1145/357489.357517
Mercuri, Rebecca (2000): Voting automation (early and often?). In Communications of the ACM, 43 (11) pp. 176. https://dl.acm.org/doi/10.1145/353360.353378
Mercuri, Rebecca (1998): In Search of Academic Integrity. In Communications of the ACM, 41 (5) pp. 136.
Mercuri, Rebecca (1993): Corrupted Polling. In Communications of the ACM, 36 (11) pp. 122.
Mercuri, Rebecca (1992): Voting-Machine Risks. In Communications of the ACM, 35 (11) pp. 138.