Author: Bruce Schneier

Publications

Publication period start: 2007
Number of co-authors: 6

Co-authors

Number of publications with favourite co-authors
Paul C. Kocher
1
Stephan Somogyi
1
Carl M. Ellison
2

Productive Colleagues

Most productive colleagues in number of publications
Carl M. Ellison
3
David L. Dill
4
Barbara Simons
18

Publications

Schneier, Bruce (2007): The psychology of security. In Communications of the ACM, 50 (5) pp. 128. https://dl.acm.org/doi/10.1145/1230819.1241693

Schneier, Bruce (2005): Two-factor authentication: too little, too late. In Communications of the ACM, 48 (4) pp. 136. https://dl.acm.org/doi/10.1145/1053291.1053327

Schneier, Bruce (2005): Risks of third-party data. In Communications of the ACM, 48 (5) pp. 136. https://dl.acm.org/doi/10.1145/1060710.1060744

Schneier, Bruce (2004): Hacking the Business Climate for Network Security. In IEEE Computer, 37 (4) pp. 87-89. https://csdl.computer.org/comp/mags/co/2004/04/r4087abs.htm

Kocher, Paul C., Schneier, Bruce (2004): Insider risks in elections. In Communications of the ACM, 47 (7) pp. 104. https://dl.acm.org/doi/10.1145/1005817.1005846

Schneier, Bruce (2004): The nonsecurity of secrecy. In Communications of the ACM, 47 (10) pp. 120. https://dl.acm.org/doi/10.1145/1022594.1022629

Dill, David L., Schneier, Bruce, Simons, Barbara (2003): Voting and technology: who gets to count your vote?. In Communications of the ACM, 46 (8) pp. 29-31. https://dl.acm.org/doi/10.1145/859670.859692

Schneier, Bruce (2001): Insurance and the computer industry. In Communications of the ACM, 44 (3) pp. 114-115. https://dl.acm.org/doi/10.1145/365181.365229

Schneier, Bruce (2001): Cyber underwriters lab. In Communications of the ACM, 44 (4) pp. 128. https://dl.acm.org/doi/10.1145/367211.367296

Somogyi, Stephan, Schneier, Bruce (2001): The perils of port 80. In Communications of the ACM, 44 (10) pp. 168.

Ellison, Carl M., Schneier, Bruce (2000): Risks of PKI: Secure Email. In Communications of the ACM, 43 (1) pp. 160. https://dl.acm.org/doi/10.1145/323830.323850

Ellison, Carl M., Schneier, Bruce (2000): Risks of PKI: E-Commerce. In Communications of the ACM, 43 (2) pp. 152. https://dl.acm.org/doi/10.1145/328236.328123

Schneier, Bruce (2000): Semantic network attacks. In Communications of the ACM, 43 (12) pp. 168. https://dl.acm.org/doi/10.1145/355112.355131

Kelsey, John, Schneier, Bruce (1999): The Street Performer Protocol and Digital Copyrights. In First Monday, 4 (6) pp. . https://www.firstmonday.org/issues/issue4_6/kelsey/index.html

Schneier, Bruce (1999): Cryptography: The Importance of Not Being Different. In IEEE Computer, 32 (3) pp. 108-109. https://doi.ieeecomputersociety.org/10.1109/2.751335

Schneier, Bruce (1999): The Uses and Abuses of Biometrics. In Communications of the ACM, 42 (8) pp. 136. https://dl.acm.org/doi/10.1145/310930.310988

Schneier, Bruce (1999): The Trojan Horse Race. In Communications of the ACM, 42 (9) pp. 128. https://dl.acm.org/doi/10.1145/315762.315785

Schneier, Bruce (1999): Risks of Relying on Cryptography. In Communications of the ACM, 42 (10) pp. 144. https://dl.acm.org/doi/10.1145/317665.317684

Schneier, Bruce (1998): Cryptographic Design Vulnerabilities. In IEEE Computer, 31 (9) pp. 29-33.

Schneier, Bruce (1997): Cryptography, Security, and the Future. In Communications of the ACM, 40 (1) pp. 138.