Jim Davis, Editor | Robert Bruen, Book Review Editor |
Hilarie Orman, Associate Editor | Anish Mathuria, Reader's Guide |
Mary Ellen Zurko, Associate Editor |
Conference and Workshop Announcements
Cipher
calls-for-papers
and
calendar
10 new calls added since Cipher E45: USENIX,
NIST PKI workshop,
IAW, Trust
& Privacy (DEXA 2002), CMS,
NSPW, ESORICS,
WTCP, IASTED,
ICICS
Information on the 2002 IEEE Symposium on Security and Privacy (May 12-15, 2002)
Information on the 15th IEEE Computer Security Foundations Workshop (June 24-26, 2002)
News Briefs
Correspondence from TCSP Chair Mike Reiter
Commentary and Opinion
Robert Bruen's review of Computer Forensics. Incident Response Essentials by Warren G. Kruse II and Jay G. Heiser
Robert Bruen's review
of Building Secure Software. How to Avoid Security Problems
the Right Way by John Viega and Gary McGraw
Robert Bruen's review of Strategic Warfare in Cyberspace by Gregory Rattray
Reader's guide to recent security and privacy literature,
by Anish Mathuria
(last posting November 17, 2001)
Listing of academic positions available by
Cynthia Irvine
Staying in touch....
Please check the list of failed e-mail addresses and send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher Archive - past issues of Cipher | |
IEEE Computer Society's home page | Cipher Privacy Policy |