Rebecca Mercuri
List of publications from the DBLP Bibliography Server - FAQ
2006 | ||
---|---|---|
23 | EE | Rebecca T. Mercuri, Vincent J. Lipsio, Beth Feehan: COTS and other electronic voting backdoors. Commun. ACM 49(11): 112 (2006) |
22 | EE | Rebecca T. Mercuri: Scoping identity theft. Commun. ACM 49(5): 17-21 (2006) |
2005 | ||
21 | EE | Rebecca Mercuri: Challenges in forensic computing. Commun. ACM 48(12): 17-21 (2005) |
20 | EE | Rebecca T. Mercuri: Trusting in transparency. Commun. ACM 48(5): 15-19 (2005) |
2004 | ||
19 | EE | Rebecca T. Mercuri, L. Jean Camp: The code of elections. Commun. ACM 47(10): 52-57 (2004) |
18 | EE | Rebecca T. Mercuri: The many colors of multimedia security. Commun. ACM 47(12): 25-29 (2004) |
17 | EE | Rebecca Mercuri: Superscaled security. Commun. ACM 47(3): 15-18 (2004) |
16 | EE | Rebecca Mercuri: The HIPAA-potamus in health care data security. Commun. ACM 47(7): 25-28 (2004) |
2003 | ||
15 | EE | Maria Hristova, Ananya Misra, Megan Rutter, Rebecca Mercuri: Identifying and correcting Java programming errors for introductory computer science students. SIGCSE 2003: 153-156 |
14 | EE | Rebecca Mercuri: On auditing trails. Commun. ACM 46(1): 17-20 (2003) |
13 | EE | Rebecca Mercuri, Peter G. Neumann: Security by obscurity. Commun. ACM 46(11): 160 (2003) |
12 | EE | Rebecca Mercuri: Standards insecurity. Commun. ACM 46(12): 21-25 (2003) |
11 | EE | Rebecca Mercuri: Analyzing security costs. Commun. ACM 46(6): 15-18 (2003) |
2002 | ||
10 | EE | Rebecca Mercuri: Uncommon criteria. Commun. ACM 45(1): 172 (2002) |
9 | EE | Rebecca Mercuri: Computer security: quality rather than quantity. Commun. ACM 45(10): 11-14 (2002) |
8 | EE | Rebecca Mercuri: Florida 2002: sluggish systems, vanishing votes. Commun. ACM 45(11): 136 (2002) |
2001 | ||
7 | EE | Rebecca Mercuri, Peter G. Neumann: System integrity revisited. Commun. ACM 44(1): 160 (2001) |
2000 | ||
6 | EE | Rebecca Mercuri: Voting automation (early and often?). Commun. ACM 43(11): 176 (2000) |
1998 | ||
5 | EE | Rebecca T. Mercuri, Nira Herrmann, Jeffrey L. Popyack: Using HTML and JavaScript in introductory programming courses. SIGCSE 1998: 176-180 |
4 | Rebecca Mercuri: In Search of Academic Integrity. Commun. ACM 41(5): 136 (1998) | |
1995 | ||
3 | Dorée D. Seligmann, Rebecca Mercuri, John T. Edmark: Providing Assurances in a Multimedia Interactive Environment. CHI 1995: 250-256 | |
1993 | ||
2 | Rebecca Mercuri: Corrupted Polling. Commun. ACM 36(11): 122 (1993) | |
1992 | ||
1 | Rebecca Mercuri: Voting-Machine Risks. Commun. ACM 35(11): 138 (1992) |
1 | L. Jean Camp | [19] |
2 | John T. Edmark | [3] |
3 | Beth Feehan | [23] |
4 | Nira Herrmann | [5] |
5 | Maria Hristova | [15] |
6 | Vincent J. Lipsio | [23] |
7 | Ananya Misra | [15] |
8 | Peter G. Neumann | [7] [13] |
9 | Jeffrey L. Popyack | [5] |
10 | Megan Rutter | [15] |
11 | Dorée D. Seligmann | [3] |