John Viega

Orcid: 0000-0003-1500-6408

According to our database1, John Viega authored at least 36 papers between 1996 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Struggling With Supply-Chain Security.
Computer, 2021

Hackathons 101.
Computer, 2021

2020
20 Years of Software Security.
Computer, 2020

2014
How Vulnerable Are Unprotected Machines on the Internet?
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

2012
The State of Embedded-Device Security (Spoiler Alert: It's Bad).
IEEE Secur. Priv., 2012

Ten Years On, How Are We Doing? (Spoiler Alert: We Have No Clue).
IEEE Secur. Priv., 2012

Giving Back.
IEEE Secur. Priv., 2012

Cloud Security: Not a Problem.
IEEE Secur. Priv., 2012

2011
Ten Years of Trustworthy Computing: Lessons Learned.
IEEE Secur. Priv., 2011

Reality Check.
IEEE Secur. Priv., 2011

2010
Guest Editors' Introduction: Mobile Device Security.
IEEE Secur. Priv., 2010

2009
Cloud Computing and the Common Man.
Computer, 2009

The Myths of Security - What the Computer Security Industry Doesn't Want You to Know.
O'Reilly, ISBN: 978-0-596-52302-2, 2009

Beautiful Security - Leading Security Experts Explain How They Think.
O'Reilly, ISBN: 978-0-596-52748-8, 2009

2006
The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH.
RFC, May, 2006

Why applying standards to Web services is not enough.
IEEE Secur. Priv., 2006

2005
The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP).
RFC, June, 2005

Building security requirements with CLASP.
ACM SIGSOFT Softw. Eng. Notes, 2005

Security---problem solved?
ACM Queue, 2005

2004
Security is Harder than You Think.
ACM Queue, 2004

The Security and Performance of the Galois/Counter Mode of Operation (Full Version).
IACR Cryptol. ePrint Arch., 2004

The Security and Performance of the Galois/Counter Mode (GCM) of Operation.
Proceedings of the Progress in Cryptology, 2004

2003
CWC: A high-performance conventional authenticated encryption mode.
IACR Cryptol. ePrint Arch., 2003

Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Practical Random Number Generation in Software.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

Secure programming cookbook for C and C++ - recipes for cryptography, authentication, networking, input validation and more.
O'Reilly, ISBN: 978-0-596-00394-4, 2003

2002
Token-based scanning of source code for security problems.
ACM Trans. Inf. Syst. Secur., 2002

Network security using OpenSSL - cryptography for secure communications.
O'Reilly, ISBN: 978-0-596-00270-1, 2002

2001
Trust (and mistrust) in secure applications.
Commun. ACM, 2001

2000
Quality Time - Can Aspect-Oriented Programming Lead to More Reliable Software?
IEEE Softw., 2000

Statically Scanning Java Code: Finding Security Vulnerabilities.
IEEE Softw., 2000

Coping with Java Programming Stress.
Computer, 2000

Automating Delegation in Class-Based Languages.
Proceedings of the TOOLS 2000: 34th International Conference on Technology of Object-Oriented Languages and Systems, 30 July, 2000

ITS4: A Static Vulnerability Scanner for C and C++ Code.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1998
Mailman: The GNU Mailing List Manager.
Proceedings of the 12th Conference on Systems Administration (LISA-98), 1998

1996
3D Magic Lenses.
Proceedings of the 9th Annual ACM Symposium on User Interface Software and Technology, 1996


  Loading...