Ben Rothke

According to our database1, Ben Rothke authored at least 22 papers between 1998 and 2014.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents - By Jean-François Blanchette.
J. Assoc. Inf. Sci. Technol., 2014

2011
Radio Frequency Identification (RFID).
Proceedings of the Encyclopedia of Information Assurance, 2011

Pod Slurping: Concepts.
Proceedings of the Encyclopedia of Information Assurance, 2011

Personnel: Security Screening.
Proceedings of the Encyclopedia of Information Assurance, 2011

Proceedings of the Encyclopedia of Information Assurance, 2011

Firewalls: Checkpoint Security Review.
Proceedings of the Encyclopedia of Information Assurance, 2011

Fax Machines.
Proceedings of the Encyclopedia of Information Assurance, 2011

Cryptography: Quantum.
Proceedings of the Encyclopedia of Information Assurance, 2011

Common Criteria.
Proceedings of the Encyclopedia of Information Assurance, 2011

Advanced Encryption Standard (AES).
Proceedings of the Encyclopedia of Information Assurance, 2011

2007
A Look at Java Security.
Proceedings of the Information security management handbook, Sixth Edition., 2007

A Look at the Advanced Encryption Standard (AES).
Proceedings of the Information security management handbook, Sixth Edition., 2007

An Overview of Quantum Cryptography.
Proceedings of the Information security management handbook, Sixth Edition., 2007

A Look at RFID Security.
Proceedings of the Information security management handbook, Sixth Edition., 2007

2003
Who Guards the Computer Security Guards?
Inf. Secur. J. A Glob. Perspect., 2003

2001
Corporate Espionage and What Can Be Done to Prevent It.
Inf. Secur. J. A Glob. Perspect., 2001

Doomed to Fail: The Secure Digital Music Initiative.
Inf. Secur. J. A Glob. Perspect., 2001

The Arrival of the MSP.
Inf. Secur. J. A Glob. Perspect., 2001

2000
The Growing Problem of Virus Hoaxes.
Inf. Secur. J. A Glob. Perspect., 2000

Should You Trust the NSA?
Inf. Secur. J. A Glob. Perspect., 2000

1999
Government Mandated Key Escrow: A Bad Idea That Won't Go Away?
Inf. Secur. J. A Glob. Perspect., 1999

1998
DES Is Dead! Long Live ????
Inf. Secur. J. A Glob. Perspect., 1998


  Loading...