Ralph Spencer Poore

According to our database1, Ralph Spencer Poore authored at least 43 papers between 1992 and 2011.

Collaborative distances:
  • no known Dijkstra number2.
  • no known Erdős number3.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2011
Message Digests.
Proceedings of the Encyclopedia of Information Assurance, 2011

Information Security Governance: Basic Corporate Organization.
Proceedings of the Encyclopedia of Information Assurance, 2011

Global Transmissions: Jurisdictional Issues.
Proceedings of the Encyclopedia of Information Assurance, 2011

Cryptography: Transitions.
Proceedings of the Encyclopedia of Information Assurance, 2011

Cryptography: Key Management: History and Myths.
Proceedings of the Encyclopedia of Information Assurance, 2011

Covert Channels: Analysis and Recommendations.
Proceedings of the Encyclopedia of Information Assurance, 2011

Tokenization and Other Methods of Security for Cardholder Data.
Inf. Secur. J. A Glob. Perspect., 2011

2010
Guest Editorial: Cryptographic Hardware-A Short, Practical Checklist.
Inf. Secur. J. A Glob. Perspect., 2010

2007
Jurisdictional Issues in Global Transmissions.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Cryptographic Key Management Concepts.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Cryptographic Transitions.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Information Security Governance.
Proceedings of the Information security management handbook, Sixth Edition., 2007

2003
Advances in Cryptography.
Inf. Secur. J. A Glob. Perspect., 2003

Attractive Hazard: Entrapment or Forensic Tool?
Inf. Secur. J. A Glob. Perspect., 2003

2002
The Wonders and Woes of Wireless.
Inf. Secur. J. A Glob. Perspect., 2002

2001
Criminalizing Tool Building.
Inf. Secur. J. A Glob. Perspect., 2001

Conducting E-Business Anonymously.
Inf. Secur. J. A Glob. Perspect., 2001

Identity Theft: Who Are You Anyway?
Inf. Secur. J. A Glob. Perspect., 2001

Information Security Standards: Deluge and Dearth.
Inf. Secur. J. A Glob. Perspect., 2001

Information Security Techniques for Data Tracing.
Inf. Secur. J. A Glob. Perspect., 2001

2000
Computer Forensics and Privacy: At What Price Do We Police the Internet?
Inf. Secur. J. A Glob. Perspect., 2000

Valuing Information Assets for Security Risk Management.
Inf. Secur. J. A Glob. Perspect., 2000

Privacy and the Value of Personal Data.
Inf. Secur. J. A Glob. Perspect., 2000

Access Control Using Attribute Certificates.
Inf. Secur. J. A Glob. Perspect., 2000

1999
CyberScams.
Inf. Secur. J. A Glob. Perspect., 1999

Release for Public Comment.
Inf. Secur. J. A Glob. Perspect., 1999

Anonymity, Privacy, and Trust.
Inf. Secur. J. A Glob. Perspect., 1999

Ethics and the Information Security Profession.
Inf. Secur. J. A Glob. Perspect., 1999

1998
A review of: "Computer Encryptions in Whispering Caves by D. Larry Crumbley, L. Murphy Smith, and Edith Battles, published by Dame Publications, Inc., 1998".
Inf. Secur. J. A Glob. Perspect., 1998

Best Practices.
Inf. Secur. J. A Glob. Perspect., 1998

As I See It ...
Inf. Secur. J. A Glob. Perspect., 1998

Editor's Edition.
Inf. Secur. J. A Glob. Perspect., 1998

The Lowly Password.
Inf. Secur. J. A Glob. Perspect., 1998

1997
Invisible Connections.
Inf. Secur. J. A Glob. Perspect., 1997

Professional Certification.
Inf. Secur. J. A Glob. Perspect., 1997

Passwords: Obsolete Authenticators or Cutting Edge?
Inf. Secur. J. A Glob. Perspect., 1997

1995
Closed Serve at the Open Net.
Inf. Secur. J. A Glob. Perspect., 1995

Business Use of Cryptography.
Inf. Secur. J. A Glob. Perspect., 1995

1994
Remembered Secrets: Multisession Systems, LANs, and Other Hiding Places.
Inf. Secur. J. A Glob. Perspect., 1994

Reference Monitor Technology: Watching Your Every Keystroke.
Inf. Secur. J. A Glob. Perspect., 1994

1993
Security in Open Networks: A Contradiction in Terms?
Inf. Secur. J. A Glob. Perspect., 1993

Is Network Security a Contradiction in Terms?
Inf. Secur. J. A Glob. Perspect., 1993

1992
Ensuring the Timely Destruction of Information.
Inf. Secur. J. A Glob. Perspect., 1992


  Loading...