Export 11 results:
Filters: Author is Bruce Schneier  [Clear All Filters]
Schneier B.  2013.  Surveillance, the NSA, and Everything. Presented as part of the 27th Large Installation System Administration Conference.
Czeskis A, Hilaire DJSt., Koscher K, Gribble SD, Schneier B.  2008.  Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications. 3rd USENIX Workshop on Hot Topics in Security (HotSec 08).
Schneier B.  2008.  Reconceptualizing Security. 22nd Large Installation System Administration Conference (LISA 08).
Schneier B.  2004.  Thinking Sensibly About Security in an Uncertain World. 2004 USENIX Annual Technical Conference (USENIX ATC 04).
Schneier B.  2002.  Fixing Network Security by Hacking the Business Climate. 2002 USENIX Annual Technical Conference (USENIX ATC 02).
Katz J, Schneier B.  2000.  A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols. 9th USENIX Security Symposium (USENIX Security 00).
Kelsey J, Schneier B.  1999.  Authenticating Secure Tokens Using Slow Memory Access. USENIX Workshop on Smartcard Technology (Smartcard 99).
Schneier B, Kelsey J.  1998.  Cryptographic Support for Secure Logs on Untrusted Machines. 7th USENIX Security Symposium (USENIX Security 98).
Kelsey J, Schneier B.  1998.  Electronic Commerce and the Street Performer. 3rd USENIX Workshop on Electronic Commerce (EC 98).
Wagner D, Schneier B.  1996.  Analysis of the SSL 3.0 Protocol. 2nd USENIX Workshop on Electronic Commerce (EC 96).
Schneier B, Kelsey J.  1996.  A Peer-to-Peer Software Metering System. 2nd USENIX Workshop on Electronic Commerce (EC 96).