2003 | ||
---|---|---|
15 | EE | Ralph Spencer Poore: Attractive Hazard: Entrapment or Forensic Tool? Information Systems Security 11(6): 10-14 (2003) |
14 | EE | Ralph Spencer Poore: Advances in Cryptography. Information Systems Security 12(4): 6-11 (2003) |
2002 | ||
13 | EE | Ralph Spencer Poore: The Wonders and Woes of Wireless. Information Systems Security 11(5): 4-9 (2002) |
2001 | ||
12 | EE | Ralph Spencer Poore: Information Security Standards: Deluge and Dearth. Information Systems Security 10(1): 1-6 (2001) |
11 | EE | Ralph Spencer Poore: Identity Theft: Who Are You Anyway? Information Systems Security 10(3): 1-6 (2001) |
10 | EE | Ralph Spencer Poore: Conducting E-Business Anonymously. Information Systems Security 10(4): 1-8 (2001) |
9 | EE | Ralph Spencer Poore: Criminalizing Tool Building. Information Systems Security 10(5): 1-5 (2001) |
8 | EE | Ralph Spencer Poore: Information Security Techniques for Data Tracing. Information Systems Security 9(6): 1-6 (2001) |
2000 | ||
7 | EE | Ralph Spencer Poore: Access Control Using Attribute Certificates. Information Systems Security 9(1): 1-7 (2000) |
6 | EE | Ralph Spencer Poore: Privacy and the Value of Personal Data. Information Systems Security 9(3): 1-6 (2000) |
5 | EE | Ralph Spencer Poore: Valuing Information Assets for Security Risk Management. Information Systems Security 9(4): 1-7 (2000) |
4 | EE | Ralph Spencer Poore: Computer Forensics and Privacy: At What Price Do We Police the Internet? Information Systems Security 9(5): 1-5 (2000) |
1999 | ||
3 | EE | Ralph Spencer Poore: Ethics and the Information Security Profession. Information Systems Security 8(1): 15-17 (1999) |
2 | EE | Ralph Spencer Poore: Anonymity, Privacy, and Trust. Information Systems Security 8(3): 16-20 (1999) |
1 | EE | Ralph Spencer Poore: Release for Public Comment. Information Systems Security 8(3): 27-77 (1999) |