2006 |
23 | EE | Rebecca T. Mercuri,
Vincent J. Lipsio,
Beth Feehan:
COTS and other electronic voting backdoors.
Commun. ACM 49(11): 112 (2006) |
22 | EE | Rebecca T. Mercuri:
Scoping identity theft.
Commun. ACM 49(5): 17-21 (2006) |
2005 |
21 | EE | Rebecca Mercuri:
Challenges in forensic computing.
Commun. ACM 48(12): 17-21 (2005) |
20 | EE | Rebecca T. Mercuri:
Trusting in transparency.
Commun. ACM 48(5): 15-19 (2005) |
2004 |
19 | EE | Rebecca T. Mercuri,
L. Jean Camp:
The code of elections.
Commun. ACM 47(10): 52-57 (2004) |
18 | EE | Rebecca T. Mercuri:
The many colors of multimedia security.
Commun. ACM 47(12): 25-29 (2004) |
17 | EE | Rebecca Mercuri:
Superscaled security.
Commun. ACM 47(3): 15-18 (2004) |
16 | EE | Rebecca Mercuri:
The HIPAA-potamus in health care data security.
Commun. ACM 47(7): 25-28 (2004) |
2003 |
15 | EE | Maria Hristova,
Ananya Misra,
Megan Rutter,
Rebecca Mercuri:
Identifying and correcting Java programming errors for introductory computer science students.
SIGCSE 2003: 153-156 |
14 | EE | Rebecca Mercuri:
On auditing trails.
Commun. ACM 46(1): 17-20 (2003) |
13 | EE | Rebecca Mercuri,
Peter G. Neumann:
Security by obscurity.
Commun. ACM 46(11): 160 (2003) |
12 | EE | Rebecca Mercuri:
Standards insecurity.
Commun. ACM 46(12): 21-25 (2003) |
11 | EE | Rebecca Mercuri:
Analyzing security costs.
Commun. ACM 46(6): 15-18 (2003) |
2002 |
10 | EE | Rebecca Mercuri:
Uncommon criteria.
Commun. ACM 45(1): 172 (2002) |
9 | EE | Rebecca Mercuri:
Computer security: quality rather than quantity.
Commun. ACM 45(10): 11-14 (2002) |
8 | EE | Rebecca Mercuri:
Florida 2002: sluggish systems, vanishing votes.
Commun. ACM 45(11): 136 (2002) |
2001 |
7 | EE | Rebecca Mercuri,
Peter G. Neumann:
System integrity revisited.
Commun. ACM 44(1): 160 (2001) |
2000 |
6 | EE | Rebecca Mercuri:
Voting automation (early and often?).
Commun. ACM 43(11): 176 (2000) |
1998 |
5 | EE | Rebecca T. Mercuri,
Nira Herrmann,
Jeffrey L. Popyack:
Using HTML and JavaScript in introductory programming courses.
SIGCSE 1998: 176-180 |
4 | | Rebecca Mercuri:
In Search of Academic Integrity.
Commun. ACM 41(5): 136 (1998) |
1995 |
3 | | Dorée D. Seligmann,
Rebecca Mercuri,
John T. Edmark:
Providing Assurances in a Multimedia Interactive Environment.
CHI 1995: 250-256 |
1993 |
2 | | Rebecca Mercuri:
Corrupted Polling.
Commun. ACM 36(11): 122 (1993) |
1992 |
1 | | Rebecca Mercuri:
Voting-Machine Risks.
Commun. ACM 35(11): 138 (1992) |