dblp.uni-trier.dewww.uni-trier.de

Ralph Spencer Poore

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2003
15EERalph Spencer Poore: Attractive Hazard: Entrapment or Forensic Tool? Information Systems Security 11(6): 10-14 (2003)
14EERalph Spencer Poore: Advances in Cryptography. Information Systems Security 12(4): 6-11 (2003)
2002
13EERalph Spencer Poore: The Wonders and Woes of Wireless. Information Systems Security 11(5): 4-9 (2002)
2001
12EERalph Spencer Poore: Information Security Standards: Deluge and Dearth. Information Systems Security 10(1): 1-6 (2001)
11EERalph Spencer Poore: Identity Theft: Who Are You Anyway? Information Systems Security 10(3): 1-6 (2001)
10EERalph Spencer Poore: Conducting E-Business Anonymously. Information Systems Security 10(4): 1-8 (2001)
9EERalph Spencer Poore: Criminalizing Tool Building. Information Systems Security 10(5): 1-5 (2001)
8EERalph Spencer Poore: Information Security Techniques for Data Tracing. Information Systems Security 9(6): 1-6 (2001)
2000
7EERalph Spencer Poore: Access Control Using Attribute Certificates. Information Systems Security 9(1): 1-7 (2000)
6EERalph Spencer Poore: Privacy and the Value of Personal Data. Information Systems Security 9(3): 1-6 (2000)
5EERalph Spencer Poore: Valuing Information Assets for Security Risk Management. Information Systems Security 9(4): 1-7 (2000)
4EERalph Spencer Poore: Computer Forensics and Privacy: At What Price Do We Police the Internet? Information Systems Security 9(5): 1-5 (2000)
1999
3EERalph Spencer Poore: Ethics and the Information Security Profession. Information Systems Security 8(1): 15-17 (1999)
2EERalph Spencer Poore: Anonymity, Privacy, and Trust. Information Systems Security 8(3): 16-20 (1999)
1EERalph Spencer Poore: Release for Public Comment. Information Systems Security 8(3): 27-77 (1999)

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)