IEEE Security & Privacy cover image for year 2014 issue number 04

IEEE Security & Privacy

Volume 12, Issue 4

Jul.-Aug. 2014

Table of Contents

Seeking IEEE Security & Security Editor in ChiefFreely available from IEEE.pp. c2-c2
Table of contentsFreely available from IEEE.pp. 1-2
[Masthead]Freely available from IEEE.pp. 7-7
Silver Bullet Talks with Nate FickFreely available from IEEE.pp. 11-13
Adapting Law Enforcement Frameworks to Address the Ethical Problems of CCTV Product PropagationFull-text access may be available. Sign in or learn about subscription options.pp. 14-21
Can We Sniff Wi-Fi?: Implications of Joffe v. GoogleFull-text access may be available. Sign in or learn about subscription options.pp. 22-28
The Untapped Potential of Trusted Execution Environments on Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 29-37
China's Data Privacy Regulations: A Tricky Tradeoff between ICT's Productive Utilization and CybercontrolFull-text access may be available. Sign in or learn about subscription options.pp. 38-45
Inviting More HeartbleedFull-text access may be available. Sign in or learn about subscription options.pp. 46-50
Willis Ware's Lasting Contribution to Privacy: Fair Information PracticesFull-text access may be available. Sign in or learn about subscription options.pp. 51-54
Improving App Privacy: Nudging App Developers to Protect User PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 55-58
Honey Encryption: Encryption beyond the Brute-Force BarrierFull-text access may be available. Sign in or learn about subscription options.pp. 59-62
Heartbleed 101Full-text access may be available. Sign in or learn about subscription options.pp. 63-67
Toward a Science of Secure EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 68-70
Staffing for Security: Don't OptimizeFull-text access may be available. Sign in or learn about subscription options.pp. 71-73
The Eyes Have It: Surveillance and How It EvolvedFull-text access may be available. Sign in or learn about subscription options.pp. 74-79
By Any Means Possible: How Intelligence Agencies Have Gotten Their DataFull-text access may be available. Sign in or learn about subscription options.pp. 80-84
Aligning the Compasses: A Journey through Compliance and TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 85-89
Personal Data and Government SurveillanceFreely available from IEEE.pp. 90-96
Showing 21 out of 21