Bruce Schneier
According to our database1, Bruce Schneier
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Homepage:
On csauthors.net:
Bibliography
2018
Artificial Intelligence and the Attack/Defense Balance.
IEEE Security & Privacy, 2018
2017
IoT Security: What's Plan B?
IEEE Security & Privacy, 2017
The Internet of Things Will Upend Our Industry.
IEEE Security & Privacy, 2017
2016
Stop Trying to Fix the User.
IEEE Security & Privacy, 2016
Cryptography Is Harder than It Looks.
IEEE Security & Privacy, 2016
2015
Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement.
RFC, August, 2015
The Security Value of Muddling Through.
IEEE Security & Privacy, 2015
Surreptitiously Weakening Cryptographic Systems.
IACR Cryptology ePrint Archive, 2015
Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecurity, 2015
Keys under doormats.
Commun. ACM, 2015
2014
The Future of Incident Response.
IEEE Security & Privacy, 2014
Metadata = Surveillance.
IEEE Security & Privacy, 2014
2013
Trust in Man/Machine Security Systems.
IEEE Security & Privacy, 2013
IT for Oppression.
IEEE Security & Privacy, 2013
2012
The Importance of Security Engineering.
IEEE Security & Privacy, 2012
How Changing Technology Affects Security.
IEEE Security & Privacy, 2012
2011
Solitaire.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Empathy and Security.
IEEE Security & Privacy, 2011
Detecting Cheaters.
IEEE Security & Privacy, 2011
2010
Special issue on security and trust management for dynamic coalitions.
Security and Communication Networks, 2010
A Taxonomy of Social Networking Data.
IEEE Security & Privacy, 2010
Security and Function Creep.
IEEE Security & Privacy, 2010
Cryptography Engineering - Design Principles and Practical Applications.
Wiley, ISBN: 978-0-470-47424-2, 2010
2009
Security, Group Size, and the Human Brain.
IEEE Security & Privacy, 2009
Architecture of Privacy.
IEEE Security & Privacy, 2009
2008
How the Human Brain Buys Security.
IEEE Security & Privacy, 2008
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008
The Psychology of Security.
Proceedings of the Progress in Cryptology, 2008
Schneier on security.
Wiley, ISBN: 978-0-470-39535-6, 2008
2007
The Death of the Security Industry.
IEEE Security & Privacy, 2007
Nonsecurity Considerations in Security Decisions.
IEEE Security & Privacy, 2007
The psychology of security.
Commun. ACM, 2007
2006
University Networks and Data Security.
IEEE Security & Privacy, 2006
Beyond fear - thinking sensibly about security in an uncertain world.
Springer, ISBN: 978-0-387-02620-6, 2006
Angewandte Kryptographie - Protokolle, Algorithmen und Sourcecode in C: der Klassiker.
Pearson Education, ISBN: 978-3-8273-7228-4, 2006
2005
Attacks on Cryptographic Hashes in Internet Protocols.
RFC, November, 2005
Solitaire.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Attack trends: 2004 and 2005.
ACM Queue, 2005
The Zotob Storm.
IEEE Security & Privacy, 2005
Authentication and Expiration.
IEEE Security & Privacy, 2005
Guest Editors' Introduction: Economics of Information Security.
IEEE Security & Privacy, 2005
Risks of third-party data.
Commun. ACM, 2005
Two-factor authentication: too little, too late.
Commun. ACM, 2005
Second Preimages on n-Bit Hash Functions for Much Less than 2n Work.
Proceedings of the Advances in Cryptology, 2005
2004
Evaluating Security Systems: A Five-Step Process.
Proceedings of the Economics of Information Security, 2004
Sensible Authentication.
ACM Queue, 2004
SIMS: Solution, or Part of the Problem?
IEEE Security & Privacy, 2004
Customers, Passwords, and Web Sites.
IEEE Security & Privacy, 2004
Security and Compliance.
IEEE Security & Privacy, 2004
Voting Security and Technology.
IEEE Security & Privacy, 2004
Second Preimages on n-bit Hash Functions for Much Less than 2n Work.
IACR Cryptology ePrint Archive, 2004
Hacking the Business Climate for Network Security.
IEEE Computer, 2004
The nonsecurity of secrecy.
Commun. ACM, 2004
Insider risks in elections.
Commun. ACM, 2004
Secrets and lies - digital security in a networked world: with new information about post-9/11 security.
Wiley, ISBN: 978-0-471-45380-2, 2004
Secrets and lies - IT-Sicherheit in einer vernetzten Welt.
dpunkt.verlag, ISBN: 978-3-89864-302-3, 2004
2003
Airplane Hackers.
IEEE Security & Privacy, 2003
The Speed of Security.
IEEE Security & Privacy, 2003
Guilty Until Proven Innocent?
IEEE Security & Privacy, 2003
Locks and Full Disclosure.
IEEE Security & Privacy, 2003
We Are All Security Consumers.
IEEE Security & Privacy, 2003
Voting and technology: who gets to count your vote?
Commun. ACM, 2003
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Practical cryptography.
Wiley, ISBN: 978-0-471-22357-3, 2003
2002
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG.
Proceedings of the Information Security, 5th International Conference, 2002
2001
Managed Security Monitoring: Network Security for the 21st Centur.
Computers & Security, 2001
The perils of port 80.
Commun. ACM, 2001
Cyber underwriters lab.
Commun. ACM, 2001
Insurance and the computer industry.
Commun. ACM, 2001
2000
Side Channel Cryptanalysis of Product Ciphers.
Journal of Computer Security, 2000
Protecting secret keys with personal entropy.
Future Generation Comp. Syst., 2000
A Self-Study Course in Block-Cipher Cryptanalysis.
Cryptologia, 2000
Semantic network attacks.
Commun. ACM, 2000
Risks of PKI: E-Commerce.
Commun. ACM, 2000
Risks of PKI: Secure Email.
Commun. ACM, 2000
A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols.
Proceedings of the 9th USENIX Security Symposium, 2000
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Improved Cryptanalysis of Rijndael.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
A Performance Comparison of the Five AES Finalists.
AES Candidate Conference, 2000
Comments on Twofish as an AES Candidate.
AES Candidate Conference, 2000
Preliminary Cryptanalysis of Reduced-Round Serpent.
AES Candidate Conference, 2000
MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants.
AES Candidate Conference, 2000
Security Weaknesses in a Randomized Stream Cipher.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Secure Audit Logs to Support Computer Forensics.
ACM Trans. Inf. Syst. Secur., 1999
The Street Performer Protocol and Digital Copyrights.
First Monday, 1999
Cryptography: The Importance of Not Being Different.
IEEE Computer, 1999
Risks of Relying on Cryptography.
Commun. ACM, 1999
The Trojan Horse Race.
Commun. ACM, 1999
The Uses and Abuses of Biometrics.
Commun. ACM, 1999
Authenticating Secure Tokens Using Slow Memory Access.
Proceedings of the 1st Workshop on Smartcard Technology, 1999
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999
Key-Schedule Cryptanalysis of DEAL.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs.
Recent Advances in Intrusion Detection, 1999
Reaction Attacks against several Public-Key Cryptosystems.
Proceedings of the Information and Communication Security, Second International Conference, 1999
Mod n Cryptanalysis, with Applications Against RC5P and M6.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2).
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999
1998
Security pitfalls in cryptographic design.
Inf. Manag. Comput. Security, 1998
Cryptographic Design Vulnerabilities.
IEEE Computer, 1998
Electronic Commerce and the Street Performer.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998
Cryptographic Support for Secure Logs on Untrusted Machines.
Proceedings of the 7th USENIX Security Symposium, 1998
Cryptanalysis of ORYX.
Proceedings of the Selected Areas in Cryptography '98, 1998
On the Twofish Key Schedule.
Proceedings of the Selected Areas in Cryptography '98, 1998
Cryptanalysis of SPEED.
Proceedings of the Selected Areas in Cryptography '98, 1998
Toward a Secure System Engineering Methodolgy.
Proceedings of the 1998 Workshop on New Security Paradigms, 1998
Environmental Key Generation Towards Clueless Agents.
Proceedings of the Mobile Agents and Security, 1998
Cryptanalytic Attacks on Pseudorandom Number Generators.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Cryptanalysis of TWOPRIME.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Cryptanalysis of SPEED.
Proceedings of the Financial Cryptography, 1998
Side Channel Cryptanalysis of Product Ciphers.
Proceedings of the Computer Security, 1998
Building PRFs from PRPs.
Proceedings of the Advances in Cryptology, 1998
Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP).
Proceedings of the CCS '98, 1998
Twofish on Smart Cards.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
Secure Authentication with Multiple Parallel Keys.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
A Certified E-Mail Protocol.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1997
The risks of key recovery, key escrow, and trusted third-party encryption.
World Wide Web Journal, 1997
Remote auditing of software outputs using a trusted coprocessor.
Future Generation Comp. Syst., 1997
Cryptography, Security, and the Future.
Commun. ACM, 1997
Protocol Interactions and the Chosen Protocol Attack.
Proceedings of the Security Protocols, 1997
Secure Applications of Low-Entropy Keys.
Proceedings of the Information Security, First International Workshop, 1997
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA.
Proceedings of the Information and Communication Security, First International Conference, 1997
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
Cryptanalysis of the Cellular Encryption Algorithm.
Proceedings of the Advances in Cryptology, 1997
Conditional Purchase Orders.
Proceedings of the CCS '97, 1997
An Improved E-Mail Security Protocol.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
Remote Electronic Gambling.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
1996
Securing the World Wide Web: Smart Tokens and Their Implementation.
World Wide Web Journal, 1996
Automatic Event-Stream Notarization Using Digital Signatures.
Proceedings of the Security Protocols, 1996
Unbalanced Feistel Networks and Block Cipher Design.
Proceedings of the Fast Software Encryption, 1996
Distributed Proctoring.
Proceedings of the Computer Security, 1996
Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES.
Proceedings of the Advances in Cryptology, 1996
Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996
An Authenticated Camera.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996
Angewandte Kryptographie - Protokolle, Algorithmen und Sourcecode in C.
Informationssicherheit, Addison-Wesley, ISBN: 978-3-89319-854-2, 1996
Applied cryptography - protocols, algorithms, and source code in C, 2nd Edition.
Wiley, ISBN: 0-471-12845-7, 1996
1994
Designing encryption algorithms for real people.
Proceedings of the 1994 Workshop on New Security Paradigms, 1994
The MacGuffin Block Cipher Algorithm.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
1993
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish).
Proceedings of the Fast Software Encryption, 1993