Biblio

Export 11 results:
Filters: Author is Bruce Schneier  [Clear All Filters]
2013
Schneier B.  2013.  Surveillance, the NSA, and Everything. Presented as part of the 27th Large Installation System Administration Conference.
2008
Czeskis A, Hilaire DJSt., Koscher K, Gribble SD, Schneier B.  2008.  Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications. 3rd USENIX Workshop on Hot Topics in Security (HotSec 08).
Schneier B.  2008.  Reconceptualizing Security. 22nd Large Installation System Administration Conference (LISA 08).
2004
Schneier B.  2004.  Thinking Sensibly About Security in an Uncertain World. 2004 USENIX Annual Technical Conference (USENIX ATC 04).
2002
Schneier B.  2002.  Fixing Network Security by Hacking the Business Climate. 2002 USENIX Annual Technical Conference (USENIX ATC 02).
2000
Katz J, Schneier B.  2000.  A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols. 9th USENIX Security Symposium (USENIX Security 00).
1999
Kelsey J, Schneier B.  1999.  Authenticating Secure Tokens Using Slow Memory Access. USENIX Workshop on Smartcard Technology (Smartcard 99).
1998
Schneier B, Kelsey J.  1998.  Cryptographic Support for Secure Logs on Untrusted Machines. 7th USENIX Security Symposium (USENIX Security 98).
Kelsey J, Schneier B.  1998.  Electronic Commerce and the Street Performer. 3rd USENIX Workshop on Electronic Commerce (EC 98).
1996
Wagner D, Schneier B.  1996.  Analysis of the SSL 3.0 Protocol. 2nd USENIX Workshop on Electronic Commerce (EC 96).
Schneier B, Kelsey J.  1996.  A Peer-to-Peer Software Metering System. 2nd USENIX Workshop on Electronic Commerce (EC 96).