Bruce Schneier

Personal Homepage
Employer
()
Email

Publication Statistics

Publication period start
1997
Publication period end
2007
Number of co-authors
6

Co-authors
Number of publications with favourite co-authors

Productive Colleagues
Most productive colleagues in number of publications

Publications

Schneier, Bruce (2007): The psychology of security. In Communications of the ACM, 50 (5) pp. 128. http://doi.acm.org/10.1145/1230819.1241693

Schneier, Bruce (2005): Risks of third-party data. In Communications of the ACM, 48 (5) pp. 136. http://doi.acm.org/10.1145/1060710.1060744

Schneier, Bruce (2005): Two-factor authentication: too little, too late. In Communications of the ACM, 48 (4) pp. 136. http://doi.acm.org/10.1145/1053291.1053327

Schneier, Bruce (2004): The nonsecurity of secrecy. In Communications of the ACM, 47 (10) pp. 120. http://doi.acm.org/10.1145/1022594.1022629

Schneier, Bruce (2004): Hacking the Business Climate for Network Security. In IEEE Computer, 37 (4) pp. 87-89. http://csdl.computer.org/comp/mags/co/2004/04/r4087abs.htm

Kocher, Paul C., Schneier, Bruce (2004): Insider risks in elections. In Communications of the ACM, 47 (7) pp. 104. http://doi.acm.org/10.1145/1005817.1005846

Dill, David L., Schneier, Bruce, Simons, Barbara (2003): Voting and technology: who gets to count your vote?. In Communications of the ACM, 46 (8) pp. 29-31. http://doi.acm.org/10.1145/859670.859692

Somogyi, Stephan, Schneier, Bruce (2001): The perils of port 80. In Communications of the ACM, 44 (10) pp. 168.

Schneier, Bruce (2001): Cyber underwriters lab. In Communications of the ACM, 44 (4) pp. 128. http://doi.acm.org/10.1145/367211.367296

Schneier, Bruce (2001): Insurance and the computer industry. In Communications of the ACM, 44 (3) pp. 114-115. http://doi.acm.org/10.1145/365181.365229

Schneier, Bruce (2000): Semantic network attacks. In Communications of the ACM, 43 (12) pp. 168. http://doi.acm.org/10.1145/355112.355131

Ellison, Carl M., Schneier, Bruce (2000): Risks of PKI: E-Commerce. In Communications of the ACM, 43 (2) pp. 152. http://doi.acm.org/10.1145/328236.328123

Ellison, Carl M., Schneier, Bruce (2000): Risks of PKI: Secure Email. In Communications of the ACM, 43 (1) pp. 160. http://doi.acm.org/10.1145/323830.323850

Schneier, Bruce (1999): Cryptography: The Importance of Not Being Different. In IEEE Computer, 32 (3) pp. 108-109. http://doi.ieeecomputersociety.org/10.1109/2.751335

Schneier, Bruce (1999): The Uses and Abuses of Biometrics. In Communications of the ACM, 42 (8) pp. 136. http://doi.acm.org/10.1145/310930.310988

Schneier, Bruce (1999): The Trojan Horse Race. In Communications of the ACM, 42 (9) pp. 128. http://doi.acm.org/10.1145/315762.315785

Schneier, Bruce (1999): Risks of Relying on Cryptography. In Communications of the ACM, 42 (10) pp. 144. http://doi.acm.org/10.1145/317665.317684

Kelsey, John, Schneier, Bruce (1999): The Street Performer Protocol and Digital Copyrights. In First Monday, 4 (6) pp. . http://www.firstmonday.org/issues/issue4_6/kelsey/index.html

Schneier, Bruce (1998): Cryptographic Design Vulnerabilities. In IEEE Computer, 31 (9) pp. 29-33.

Schneier, Bruce (1997): Cryptography, Security, and the Future. In Communications of the ACM, 40 (1) pp. 138.