BibTeX records: Bruce Schneier

download as .bib file

@article{DBLP:journals/access/HeidingSVBP24,
  author       = {Fredrik Heiding and
                  Bruce Schneier and
                  Arun Vishwanath and
                  Jeremy Bernstein and
                  Peter S. Park},
  title        = {Devising and Detecting Phishing Emails Using Large Language Models},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {42131--42146},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3375882},
  doi          = {10.1109/ACCESS.2024.3375882},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HeidingSVBP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/AbelsonABBBCDLNRSSTT24,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Jon Callas and
                  Whitfield Diffie and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Vanessa Teague and
                  Carmela Troncoso},
  title        = {Bugs in our pockets: the risks of client-side scanning},
  journal      = {J. Cybersecur.},
  volume       = {10},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1093/cybsec/tyad020},
  doi          = {10.1093/CYBSEC/TYAD020},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBCDLNRSSTT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier23,
  author       = {Bruce Schneier},
  title        = {Trustworthy {AI} Means Public {AI} [Last Word]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {6},
  pages        = {95--96},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3301262},
  doi          = {10.1109/MSEC.2023.3301262},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-04781,
  author       = {Nathan E. Sanders and
                  Alex Ulinich and
                  Bruce Schneier},
  title        = {Demonstrations of the Potential of AI-based Political Issue Polling},
  journal      = {CoRR},
  volume       = {abs/2307.04781},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.04781},
  doi          = {10.48550/ARXIV.2307.04781},
  eprinttype    = {arXiv},
  eprint       = {2307.04781},
  timestamp    = {Mon, 24 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-04781.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-12287,
  author       = {Fredrik Heiding and
                  Bruce Schneier and
                  Arun Vishwanath and
                  Jeremy Bernstein},
  title        = {Devising and Detecting Phishing: Large Language Models vs. Smaller
                  Human Models},
  journal      = {CoRR},
  volume       = {abs/2308.12287},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.12287},
  doi          = {10.48550/ARXIV.2308.12287},
  eprinttype    = {arXiv},
  eprint       = {2308.12287},
  timestamp    = {Fri, 01 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-12287.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc9446,
  author       = {Stephen Farrell and
                  Farzaneh Badii and
                  Bruce Schneier and
                  Steven M. Bellovin},
  title        = {Reflections on Ten Years Past the Snowden Revelations},
  journal      = {{RFC}},
  volume       = {9446},
  pages        = {1--29},
  year         = {2023},
  url          = {https://doi.org/10.17487/RFC9446},
  doi          = {10.17487/RFC9446},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc9446.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier22,
  author       = {Bruce Schneier},
  title        = {Robot Hacking Games},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {1},
  pages        = {119--120},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2021.3121885},
  doi          = {10.1109/MSEC.2021.3121885},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier22a,
  author       = {Bruce Schneier},
  title        = {NIST's Post-Quantum Cryptography Standards Competition},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {5},
  pages        = {107--108},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2022.3184235},
  doi          = {10.1109/MSEC.2022.3184235},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PeisertSOMBLMMP21,
  author       = {Sean Peisert and
                  Bruce Schneier and
                  Hamed Okhravi and
                  Fabio Massacci and
                  Terry Benzel and
                  Carl E. Landwehr and
                  Mohammad Mannan and
                  Jelena Mirkovic and
                  Atul Prakash and
                  James Bret Michael},
  title        = {Perspectives on the SolarWinds Incident},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {2},
  pages        = {7--13},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3051235},
  doi          = {10.1109/MSEC.2021.3051235},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PeisertSOMBLMMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier21,
  author       = {Bruce Schneier},
  title        = {What Will It Take?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {3},
  pages        = {63--64},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3063800},
  doi          = {10.1109/MSEC.2021.3063800},
  timestamp    = {Thu, 27 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/Schneier21,
  author       = {Bruce Schneier},
  editor       = {Shlomi Dolev and
                  Oded Margalit and
                  Benny Pinkas and
                  Alexander A. Schwarzmann},
  title        = {Invited Talk: The Coming {AI} Hackers},
  booktitle    = {Cyber Security Cryptography and Machine Learning - 5th International
                  Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12716},
  pages        = {336--360},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78086-9\_26},
  doi          = {10.1007/978-3-030-78086-9\_26},
  timestamp    = {Mon, 03 Jan 2022 22:32:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cscml/Schneier21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-07450,
  author       = {Hal Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Jon Callas and
                  Whitfield Diffie and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Vanessa Teague and
                  Carmela Troncoso},
  title        = {Bugs in our Pockets: The Risks of Client-Side Scanning},
  journal      = {CoRR},
  volume       = {abs/2110.07450},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.07450},
  eprinttype    = {arXiv},
  eprint       = {2110.07450},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-07450.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-09231,
  author       = {Nathan E. Sanders and
                  Bruce Schneier},
  title        = {Machine Learning Featurizations for {AI} Hacking of Political Systems},
  journal      = {CoRR},
  volume       = {abs/2110.09231},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.09231},
  eprinttype    = {arXiv},
  eprint       = {2110.09231},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-09231.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Schneier20,
  author       = {Bruce Schneier},
  title        = {Attacking Machine Learning Systems},
  journal      = {Computer},
  volume       = {53},
  number       = {5},
  pages        = {78--80},
  year         = {2020},
  url          = {https://doi.org/10.1109/MC.2020.2980761},
  doi          = {10.1109/MC.2020.2980761},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Schneier20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/LevyS20,
  author       = {Karen Levy and
                  Bruce Schneier},
  title        = {Privacy threats in intimate relationships},
  journal      = {J. Cybersecur.},
  volume       = {6},
  number       = {1},
  pages        = {tyaa006},
  year         = {2020},
  url          = {https://doi.org/10.1093/cybsec/tyaa006},
  doi          = {10.1093/CYBSEC/TYAA006},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/LevyS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier20,
  author       = {Bruce Schneier},
  title        = {Technologists vs. Policy Makers},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {1},
  pages        = {72--71},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2019.2951825},
  doi          = {10.1109/MSEC.2019.2951825},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier20a,
  author       = {Bruce Schneier},
  title        = {Hacking the Tax Code},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {5},
  pages        = {79--80},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2020.3007049},
  doi          = {10.1109/MSEC.2020.3007049},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-05648,
  author       = {Kendra Albert and
                  Jonathon Penney and
                  Bruce Schneier and
                  Ram Shankar Siva Kumar},
  title        = {Politics of Adversarial Machine Learning},
  journal      = {CoRR},
  volume       = {abs/2002.05648},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.05648},
  eprinttype    = {arXiv},
  eprint       = {2002.05648},
  timestamp    = {Fri, 14 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-05648.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-03907,
  author       = {Karen Levy and
                  Bruce Schneier},
  title        = {Privacy threats in intimate relationships},
  journal      = {CoRR},
  volume       = {abs/2006.03907},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.03907},
  eprinttype    = {arXiv},
  eprint       = {2006.03907},
  timestamp    = {Fri, 12 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-03907.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-16179,
  author       = {Ram Shankar Siva Kumar and
                  Jonathon Penney and
                  Bruce Schneier and
                  Kendra Albert},
  title        = {Legal Risks of Adversarial Machine Learning Research},
  journal      = {CoRR},
  volume       = {abs/2006.16179},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.16179},
  eprinttype    = {arXiv},
  eprint       = {2006.16179},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-16179.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier19,
  author       = {Bruce Schneier},
  title        = {Cybersecurity for the Public Interest},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {1},
  pages        = {84--83},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2018.2889891},
  doi          = {10.1109/MSEC.2018.2889891},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier18,
  author       = {Bruce Schneier},
  title        = {Artificial Intelligence and the Attack/Defense Balance},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {2},
  pages        = {96},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1870857},
  doi          = {10.1109/MSP.2018.1870857},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier18a,
  author       = {Bruce Schneier},
  title        = {Cryptography after the Aliens Land},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {5},
  pages        = {86--88},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3761724},
  doi          = {10.1109/MSP.2018.3761724},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier18b,
  author       = {Bruce Schneier},
  title        = {Unnoticed Consent [Last Word]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {6},
  pages        = {80--79},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSEC.2018.2882121},
  doi          = {10.1109/MSEC.2018.2882121},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier17,
  author       = {Bruce Schneier},
  title        = {The Internet of Things Will Upend Our Industry},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {2},
  pages        = {108},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.39},
  doi          = {10.1109/MSP.2017.39},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier17a,
  author       = {Bruce Schneier},
  title        = {IoT Security: What's Plan B?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {5},
  pages        = {96},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.3681066},
  doi          = {10.1109/MSP.2017.3681066},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier16,
  author       = {Bruce Schneier},
  title        = {Cryptography Is Harder than It Looks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {1},
  pages        = {87--88},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.7},
  doi          = {10.1109/MSP.2016.7},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier16a,
  author       = {Bruce Schneier},
  title        = {Stop Trying to Fix the User},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {5},
  pages        = {96},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.101},
  doi          = {10.1109/MSP.2016.101},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/AbelsonABBBDGGL15,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Whitfield Diffie and
                  John Gilmore and
                  Matthew Green and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Michael A. Specter and
                  Daniel J. Weitzner},
  title        = {Keys under doormats},
  journal      = {Commun. {ACM}},
  volume       = {58},
  number       = {10},
  pages        = {24--26},
  year         = {2015},
  url          = {https://doi.org/10.1145/2814825},
  doi          = {10.1145/2814825},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/AbelsonABBBDGGL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/AbelsonABBBDGG015,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Whitfield Diffie and
                  John Gilmore and
                  Matthew Green and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Michael A. Specter and
                  Daniel J. Weitzner},
  title        = {Keys under doormats: mandating insecurity by requiring government
                  access to all data and communications},
  journal      = {J. Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {69--79},
  year         = {2015},
  url          = {https://doi.org/10.1093/cybsec/tyv009},
  doi          = {10.1093/CYBSEC/TYV009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBDGG015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier15,
  author       = {Bruce Schneier},
  title        = {The Security Value of Muddling Through},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {2},
  pages        = {108},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2015.42},
  doi          = {10.1109/MSP.2015.42},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tasm/Schneir15,
  author       = {Bruce Schneier},
  title        = {Ubiquitous Surveillance and Security [Keynote]},
  journal      = {{IEEE} Technol. Soc. Mag.},
  volume       = {34},
  number       = {3},
  pages        = {39--40},
  year         = {2015},
  url          = {https://doi.org/10.1109/MTS.2015.2461232},
  doi          = {10.1109/MTS.2015.2461232},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tasm/Schneir15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchneierFKR15,
  author       = {Bruce Schneier and
                  Matthew Fredrikson and
                  Tadayoshi Kohno and
                  Thomas Ristenpart},
  title        = {Surreptitiously Weakening Cryptographic Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {97},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchneierFKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc7624,
  author       = {Richard L. Barnes and
                  Bruce Schneier and
                  Cullen Jennings and
                  Ted Hardie and
                  Brian Trammell and
                  Christian Huitema and
                  Daniel Borkmann},
  title        = {Confidentiality in the Face of Pervasive Surveillance: {A} Threat
                  Model and Problem Statement},
  journal      = {{RFC}},
  volume       = {7624},
  pages        = {1--24},
  year         = {2015},
  url          = {https://doi.org/10.17487/RFC7624},
  doi          = {10.17487/RFC7624},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc7624.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier14,
  author       = {Bruce Schneier},
  title        = {Metadata = Surveillance},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {2},
  pages        = {84},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.28},
  doi          = {10.1109/MSP.2014.28},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier14a,
  author       = {Bruce Schneier},
  title        = {The Future of Incident Response},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {96},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.102},
  doi          = {10.1109/MSP.2014.102},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier13,
  author       = {Bruce Schneier},
  title        = {{IT} for Oppression},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {11},
  number       = {2},
  pages        = {96},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2013.36},
  doi          = {10.1109/MSP.2013.36},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier13a,
  author       = {Bruce Schneier},
  title        = {Trust in Man/Machine Security Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {11},
  number       = {5},
  pages        = {96},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2013.128},
  doi          = {10.1109/MSP.2013.128},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/weis/2011s,
  editor       = {Bruce Schneier},
  title        = {Economics of Information Security and Privacy {III} [papers from the
                  Tenth Workshop on Economics and Information Security, {WEIS} 2011]},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-1981-5},
  doi          = {10.1007/978-1-4614-1981-5},
  isbn         = {978-1-4614-1980-8},
  timestamp    = {Fri, 16 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/2011s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier12,
  author       = {Bruce Schneier},
  title        = {How Changing Technology Affects Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {10},
  number       = {2},
  pages        = {104},
  year         = {2012},
  url          = {https://doi.org/10.1109/MSP.2012.39},
  doi          = {10.1109/MSP.2012.39},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier12a,
  author       = {Bruce Schneier},
  title        = {The Importance of Security Engineering},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {10},
  number       = {5},
  pages        = {88},
  year         = {2012},
  url          = {https://doi.org/10.1109/MSP.2012.132},
  doi          = {10.1109/MSP.2012.132},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier11,
  author       = {Bruce Schneier},
  title        = {Detecting Cheaters},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {9},
  number       = {2},
  pages        = {96},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSP.2011.28},
  doi          = {10.1109/MSP.2011.28},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier11a,
  author       = {Bruce Schneier},
  title        = {Empathy and Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {9},
  number       = {5},
  pages        = {88},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSP.2011.133},
  doi          = {10.1109/MSP.2011.133},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schneier11,
  author       = {Bruce Schneier},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Solitaire},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1229--1230},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_479},
  doi          = {10.1007/978-1-4419-5906-5\_479},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schneier11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0024293,
  author       = {Niels Ferguson and
                  Bruce Schneier and
                  Tadayoshi Kohno},
  title        = {Cryptography Engineering - Design Principles and Practical Applications},
  publisher    = {Wiley},
  year         = {2010},
  url          = {http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470474246.html},
  isbn         = {978-0-470-47424-2},
  timestamp    = {Mon, 13 Mar 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0024293.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier10,
  author       = {Bruce Schneier},
  title        = {Security and Function Creep},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {8},
  number       = {1},
  pages        = {88},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSP.2010.47},
  doi          = {10.1109/MSP.2010.47},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier10a,
  author       = {Bruce Schneier},
  title        = {A Taxonomy of Social Networking Data},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {8},
  number       = {4},
  pages        = {88},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSP.2010.118},
  doi          = {10.1109/MSP.2010.118},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Schneier10,
  author       = {Bruce Schneier},
  title        = {Schneier on Security: Privacy and Control},
  journal      = {J. Priv. Confidentiality},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v2i1.579},
  doi          = {10.29012/JPC.V2I1.579},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/Schneier10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DimitrakosMS10,
  author       = {Theo Dimitrakos and
                  Fabio Martinelli and
                  Bruce Schneier},
  title        = {Special issue on security and trust management for dynamic coalitions},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {6},
  pages        = {453--455},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.282},
  doi          = {10.1002/SEC.282},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DimitrakosMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier09,
  author       = {Bruce Schneier},
  title        = {Architecture of Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {7},
  number       = {1},
  pages        = {88},
  year         = {2009},
  url          = {https://doi.org/10.1109/MSP.2009.1},
  doi          = {10.1109/MSP.2009.1},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier09a,
  author       = {Bruce Schneier},
  title        = {Security, Group Size, and the Human Brain},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {7},
  number       = {4},
  pages        = {88},
  year         = {2009},
  url          = {https://doi.org/10.1109/MSP.2009.105},
  doi          = {10.1109/MSP.2009.105},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0021657,
  author       = {Bruce Schneier},
  title        = {Schneier on security},
  publisher    = {Wiley},
  year         = {2008},
  isbn         = {978-0-470-39535-6},
  timestamp    = {Wed, 16 Mar 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0021657.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier08,
  author       = {Bruce Schneier},
  title        = {How the Human Brain Buys Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {4},
  pages        = {80},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.85},
  doi          = {10.1109/MSP.2008.85},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/Schneier08,
  author       = {Bruce Schneier},
  editor       = {Serge Vaudenay},
  title        = {The Psychology of Security},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
                  on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5023},
  pages        = {50--79},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68164-9\_5},
  doi          = {10.1007/978-3-540-68164-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/Schneier08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CzeskisHKGKS08,
  author       = {Alexei Czeskis and
                  David J. St. Hilaire and
                  Karl Koscher and
                  Steven D. Gribble and
                  Tadayoshi Kohno and
                  Bruce Schneier},
  editor       = {Niels Provos},
  title        = {Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and
                  the Case of the Tattling {OS} and Applications},
  booktitle    = {3rd {USENIX} Workshop on Hot Topics in Security, HotSec'08, San Jose,
                  CA, USA, July 29, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/hotsec08/tech/full\_papers/czeskis/czeskis.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CzeskisHKGKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Schneier07,
  author       = {Bruce Schneier},
  title        = {The psychology of security},
  journal      = {Commun. {ACM}},
  volume       = {50},
  number       = {5},
  pages        = {128},
  year         = {2007},
  url          = {https://doi.org/10.1145/1230819.1241693},
  doi          = {10.1145/1230819.1241693},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Schneier07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier07,
  author       = {Bruce Schneier},
  title        = {Nonsecurity Considerations in Security Decisions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {5},
  number       = {3},
  pages        = {88},
  year         = {2007},
  url          = {https://doi.org/10.1109/MSP.2007.68},
  doi          = {10.1109/MSP.2007.68},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier07a,
  author       = {Bruce Schneier},
  title        = {The Death of the Security Industry},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {5},
  number       = {6},
  pages        = {88},
  year         = {2007},
  url          = {https://doi.org/10.1109/MSP.2007.179},
  doi          = {10.1109/MSP.2007.179},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0021092,
  author       = {Bruce Schneier},
  title        = {Beyond fear - thinking sensibly about security in an uncertain world},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/b97547},
  doi          = {10.1007/B97547},
  isbn         = {978-0-387-02620-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0021092.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0014649,
  author       = {Bruce Schneier},
  title        = {Angewandte Kryptographie - Protokolle, Algorithmen und Sourcecode
                  in {C:} der Klassiker},
  publisher    = {Pearson Education},
  year         = {2006},
  url          = {http://www.pearson-studium.de/main/main.asp?page=bookdetails\&\#38;ProductID=116135},
  isbn         = {978-3-8273-7228-4},
  timestamp    = {Thu, 03 Feb 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0014649.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier06,
  author       = {Bruce Schneier},
  title        = {University Networks and Data Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {4},
  number       = {5},
  pages        = {88--88},
  year         = {2006},
  url          = {https://doi.org/10.1109/MSP.2006.138},
  doi          = {10.1109/MSP.2006.138},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Schneier05,
  author       = {Bruce Schneier},
  title        = {Two-factor authentication: too little, too late},
  journal      = {Commun. {ACM}},
  volume       = {48},
  number       = {4},
  pages        = {136},
  year         = {2005},
  url          = {https://doi.org/10.1145/1053291.1053327},
  doi          = {10.1145/1053291.1053327},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Schneier05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Schneier05a,
  author       = {Bruce Schneier},
  title        = {Risks of third-party data},
  journal      = {Commun. {ACM}},
  volume       = {48},
  number       = {5},
  pages        = {136},
  year         = {2005},
  url          = {https://doi.org/10.1145/1060710.1060744},
  doi          = {10.1145/1060710.1060744},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Schneier05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AndersonS05,
  author       = {Ross J. Anderson and
                  Bruce Schneier},
  title        = {Guest Editors' Introduction: Economics of Information Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {3},
  number       = {1},
  pages        = {12--13},
  year         = {2005},
  url          = {https://doi.org/10.1109/MSP.2005.14},
  doi          = {10.1109/MSP.2005.14},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AndersonS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier05,
  author       = {Bruce Schneier},
  title        = {Authentication and Expiration},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {3},
  number       = {1},
  pages        = {88},
  year         = {2005},
  url          = {https://doi.org/10.1109/MSP.2005.4},
  doi          = {10.1109/MSP.2005.4},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier05a,
  author       = {Bruce Schneier},
  title        = {The Zotob Storm},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {3},
  number       = {6},
  pages        = {96},
  year         = {2005},
  url          = {https://doi.org/10.1109/MSP.2005.163},
  doi          = {10.1109/MSP.2005.163},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Schneier05,
  author       = {Bruce Schneier},
  title        = {Attack trends: 2004 and 2005},
  journal      = {{ACM} Queue},
  volume       = {3},
  number       = {5},
  pages        = {52--53},
  year         = {2005},
  url          = {https://doi.org/10.1145/1071713.1071729},
  doi          = {10.1145/1071713.1071729},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/queue/Schneier05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KelseyS05,
  author       = {John Kelsey and
                  Bruce Schneier},
  editor       = {Ronald Cramer},
  title        = {Second Preimages on n-Bit Hash Functions for Much Less than 2\({}^{\mbox{n}}\)
                  Work},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {474--490},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_28},
  doi          = {10.1007/11426639\_28},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KelseyS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schneier05,
  author       = {Bruce Schneier},
  editor       = {Henk C. A. van Tilborg},
  title        = {Solitaire},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_408},
  doi          = {10.1007/0-387-23483-7\_408},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schneier05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4270,
  author       = {Paul E. Hoffman and
                  Bruce Schneier},
  title        = {Attacks on Cryptographic Hashes in Internet Protocols},
  journal      = {{RFC}},
  volume       = {4270},
  pages        = {1--12},
  year         = {2005},
  url          = {https://doi.org/10.17487/RFC4270},
  doi          = {10.17487/RFC4270},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4270.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0011416,
  author       = {Bruce Schneier},
  title        = {Secrets and lies - IT-Sicherheit in einer vernetzten Welt},
  publisher    = {dpunkt.verlag},
  year         = {2004},
  isbn         = {978-3-89864-302-3},
  timestamp    = {Tue, 12 Apr 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0011416.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0013520,
  author       = {Bruce Schneier},
  title        = {Secrets and lies - digital security in a networked world: with new
                  information about post-9/11 security},
  publisher    = {Wiley},
  year         = {2004},
  isbn         = {978-0-471-45380-2},
  timestamp    = {Thu, 14 Apr 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0013520.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/KocherS04,
  author       = {Paul C. Kocher and
                  Bruce Schneier},
  title        = {Insider risks in elections},
  journal      = {Commun. {ACM}},
  volume       = {47},
  number       = {7},
  pages        = {104},
  year         = {2004},
  url          = {https://doi.org/10.1145/1005817.1005846},
  doi          = {10.1145/1005817.1005846},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/KocherS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Schneier04,
  author       = {Bruce Schneier},
  title        = {The nonsecurity of secrecy},
  journal      = {Commun. {ACM}},
  volume       = {47},
  number       = {10},
  pages        = {120},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022594.1022629},
  doi          = {10.1145/1022594.1022629},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Schneier04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Schneier04,
  author       = {Bruce Schneier},
  title        = {Hacking the Business Climate for Network Security},
  journal      = {Computer},
  volume       = {37},
  number       = {4},
  pages        = {87--89},
  year         = {2004},
  url          = {https://doi.org/10.1109/MC.2004.1297316},
  doi          = {10.1109/MC.2004.1297316},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Schneier04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier04,
  author       = {Bruce Schneier},
  title        = {Voting Security and Technology},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {84},
  year         = {2004},
  url          = {https://doi.org/10.1109/MSECP.2004.1264863},
  doi          = {10.1109/MSECP.2004.1264863},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier04a,
  author       = {Bruce Schneier},
  title        = {Security and Compliance},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {2},
  number       = {3},
  pages        = {96},
  year         = {2004},
  url          = {https://doi.org/10.1109/MSP.2004.22},
  doi          = {10.1109/MSP.2004.22},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier04b,
  author       = {Bruce Schneier},
  title        = {Customers, Passwords, and Web Sites},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {2},
  number       = {4},
  pages        = {88},
  year         = {2004},
  url          = {https://doi.org/10.1109/MSP.2004.39},
  doi          = {10.1109/MSP.2004.39},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier04b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier04c,
  author       = {Bruce Schneier},
  title        = {{SIMS:} Solution, or Part of the Problem?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {2},
  number       = {5},
  pages        = {88},
  year         = {2004},
  url          = {https://doi.org/10.1109/MSP.2004.83},
  doi          = {10.1109/MSP.2004.83},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier04c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Schneier04,
  author       = {Bruce Schneier},
  title        = {Sensible Authentication},
  journal      = {{ACM} Queue},
  volume       = {1},
  number       = {10},
  pages        = {74--78},
  year         = {2004},
  url          = {https://doi.org/10.1145/971564.971595},
  doi          = {10.1145/971564.971595},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/queue/Schneier04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Schneier04,
  author       = {Bruce Schneier},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Evaluating Security Systems: {A} Five-Step Process},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {289--293},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_20},
  doi          = {10.1007/1-4020-8090-5\_20},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Schneier04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KelseyS04,
  author       = {John Kelsey and
                  Bruce Schneier},
  title        = {Second Preimages on n-bit Hash Functions for Much Less than 2\({}^{\mbox{n}}\)
                  Work},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {304},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/304},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KelseyS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0019473,
  author       = {Niels Ferguson and
                  Bruce Schneier},
  title        = {Practical cryptography},
  publisher    = {Wiley},
  year         = {2003},
  isbn         = {978-0-471-22357-3},
  timestamp    = {Thu, 14 Apr 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0019473.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/DillSS03,
  author       = {David L. Dill and
                  Bruce Schneier and
                  Barbara Simons},
  title        = {Voting and technology: who gets to count your vote?},
  journal      = {Commun. {ACM}},
  volume       = {46},
  number       = {8},
  pages        = {29--31},
  year         = {2003},
  url          = {https://doi.org/10.1145/859670.859692},
  doi          = {10.1145/859670.859692},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/DillSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier03,
  author       = {Bruce Schneier},
  title        = {We Are All Security Consumers},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {1},
  pages        = {104},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1177006},
  doi          = {10.1109/MSECP.2003.1177006},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier03a,
  author       = {Bruce Schneier},
  title        = {Locks and Full Disclosure},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {88},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1193220},
  doi          = {10.1109/MSECP.2003.1193220},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier03b,
  author       = {Bruce Schneier},
  title        = {Guilty Until Proven Innocent?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {88, 87},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203231},
  doi          = {10.1109/MSECP.2003.1203231},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier03c,
  author       = {Bruce Schneier},
  title        = {The Speed of Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {96},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219081},
  doi          = {10.1109/MSECP.2003.1219081},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier03c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Schneier03d,
  author       = {Bruce Schneier},
  title        = {Airplane Hackers},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {6},
  pages        = {92},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1266367},
  doi          = {10.1109/MSECP.2003.1266367},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Schneier03d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FergusonWSKLK03,
  author       = {Niels Ferguson and
                  Doug Whiting and
                  Bruce Schneier and
                  John Kelsey and
                  Stefan Lucks and
                  Tadayoshi Kohno},
  editor       = {Thomas Johansson},
  title        = {Helix: Fast Encryption and Authentication in a Single Cryptographic
                  Primitive},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {330--346},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_24},
  doi          = {10.1007/978-3-540-39887-5\_24},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/FergusonWSKLK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/JalladKS02,
  author       = {Kahil Jallad and
                  Jonathan Katz and
                  Bruce Schneier},
  editor       = {Agnes Hui Chan and
                  Virgil D. Gligor},
  title        = {Implementation of Chosen-Ciphertext Attacks against {PGP} and GnuPG},
  booktitle    = {Information Security, 5th International Conference, {ISC} 2002 Sao
                  Paulo, Brazil, September 30 - October 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2433},
  pages        = {90--101},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45811-5\_7},
  doi          = {10.1007/3-540-45811-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/JalladKS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Schneier01,
  author       = {Bruce Schneier},
  title        = {Insurance and the computer industry},
  journal      = {Commun. {ACM}},
  volume       = {44},
  number       = {3},
  pages        = {114--115},
  year         = {2001},
  url          = {https://doi.org/10.1145/365181.365229},
  doi          = {10.1145/365181.365229},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Schneier01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Schneier01a,
  author       = {Bruce Schneier},
  title        = {Cyber underwriters lab},
  journal      = {Commun. {ACM}},
  volume       = {44},
  number       = {4},
  pages        = {128},
  year         = {2001},
  url          = {https://doi.org/10.1145/367211.367296},
  doi          = {10.1145/367211.367296},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Schneier01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/SomogyiS01,
  author       = {Stephan Somogyi and
                  Bruce Schneier},
  title        = {The perils of port 80},
  journal      = {Commun. {ACM}},
  volume       = {44},
  number       = {10},
  pages        = {168},
  year         = {2001},
  url          = {https://doi.org/10.1145/383845.383875},
  doi          = {10.1145/383845.383875},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/SomogyiS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schneier01,
  author       = {Bruce Schneier},
  title        = {Managed Security Monitoring: Network Security for the 21st Centur},
  journal      = {Comput. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {491--503},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0167-4048(01)00607-1},
  doi          = {10.1016/S0167-4048(01)00607-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Schneier01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2000,
  editor       = {Bruce Schneier},
  title        = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44706-7},
  doi          = {10.1007/3-540-44706-7},
  isbn         = {3-540-41728-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/EllisonS00,
  author       = {Carl M. Ellison and
                  Bruce Schneier},
  title        = {Risks of {PKI:} Secure Email},
  journal      = {Commun. {ACM}},
  volume       = {43},
  number       = {1},
  pages        = {160},
  year         = {2000},
  url          = {https://doi.org/10.1145/323830.323850},
  doi          = {10.1145/323830.323850},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/EllisonS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/EllisonS00a,
  author       = {Carl M. Ellison and
                  Bruce Schneier},
  title        = {Risks of {PKI:} E-Commerce},
  journal      = {Commun. {ACM}},
  volume       = {43},
  number       = {2},
  pages        = {152},
  year         = {2000},
  url          = {https://doi.org/10.1145/328236.328123},
  doi          = {10.1145/328236.328123},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/EllisonS00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Schneier00,
  author       = {Bruce Schneier},
  title        = {Semantic network attacks},
  journal      = {Commun. {ACM}},
  volume       = {43},
  number       = {12},
  pages        = {168},
  year         = {2000},
  url          = {https://doi.org/10.1145/355112.355131},
  doi          = {10.1145/355112.355131},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Schneier00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schneier00,
  author       = {Bruce Schneier},
  title        = {A Self-Study Course in Block-Cipher Cryptanalysis},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {1},
  pages        = {18--33},
  year         = {2000},
  url          = {https://doi.org/10.1080/0161-110091888754},
  doi          = {10.1080/0161-110091888754},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schneier00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/EllisonHMS00,
  author       = {Carl M. Ellison and
                  Chris Hall and
                  Randy Milbert and
                  Bruce Schneier},
  title        = {Protecting secret keys with personal entropy},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {16},
  number       = {4},
  pages        = {311--318},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0167-739X(99)00055-2},
  doi          = {10.1016/S0167-739X(99)00055-2},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/EllisonHMS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KelseySWH00,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner and
                  Chris Hall},
  title        = {Side Channel Cryptanalysis of Product Ciphers},
  journal      = {J. Comput. Secur.},
  volume       = {8},
  number       = {2/3},
  pages        = {141--158},
  year         = {2000},
  url          = {https://doi.org/10.3233/jcs-2000-82-304},
  doi          = {10.3233/JCS-2000-82-304},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KelseySWH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FergusonSW00,
  author       = {Niels Ferguson and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Security Weaknesses in a Randomized Stream Cipher},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {234--241},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_19},
  doi          = {10.1007/10718964\_19},
  timestamp    = {Sat, 19 Oct 2019 20:34:19 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FergusonSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/SchneierW00,
  author       = {Bruce Schneier and
                  Doug Whiting},
  title        = {A Performance Comparison of the Five {AES} Finalists},
  booktitle    = {The Third Advanced Encryption Standard Candidate Conference, April
                  13-14, 2000, New York, New York, {USA}},
  pages        = {123--135},
  publisher    = {National Institute of Standards and Technology,},
  year         = {2000},
  timestamp    = {Thu, 08 Aug 2019 17:13:16 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/SchneierW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/KelseyS00,
  author       = {John Kelsey and
                  Bruce Schneier},
  title        = {{MARS} Attacks! Preliminary Cryptanalysis of Reduced-Round {MARS}
                  Variants},
  booktitle    = {The Third Advanced Encryption Standard Candidate Conference, April
                  13-14, 2000, New York, New York, {USA}},
  pages        = {169--185},
  publisher    = {National Institute of Standards and Technology,},
  year         = {2000},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/KelseyS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/KohnoKS00,
  author       = {Tadayoshi Kohno and
                  John Kelsey and
                  Bruce Schneier},
  title        = {Preliminary Cryptanalysis of Reduced-Round Serpent},
  booktitle    = {The Third Advanced Encryption Standard Candidate Conference, April
                  13-14, 2000, New York, New York, {USA}},
  pages        = {195--211},
  publisher    = {National Institute of Standards and Technology,},
  year         = {2000},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/KohnoKS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/SchneierKWWF00,
  author       = {Bruce Schneier and
                  John Kelsey and
                  Doug Whiting and
                  David A. Wagner and
                  Niels Ferguson},
  title        = {Comments on Twofish as an {AES} Candidate},
  booktitle    = {The Third Advanced Encryption Standard Candidate Conference, April
                  13-14, 2000, New York, New York, {USA}},
  pages        = {355--356},
  publisher    = {National Institute of Standards and Technology,},
  year         = {2000},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/SchneierKWWF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KelseyKS00,
  author       = {John Kelsey and
                  Tadayoshi Kohno and
                  Bruce Schneier},
  editor       = {Bruce Schneier},
  title        = {Amplified Boomerang Attacks Against Reduced-Round {MARS} and Serpent},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {75--93},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_6},
  doi          = {10.1007/3-540-44706-7\_6},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KelseyKS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FergusonKLSSWW00,
  author       = {Niels Ferguson and
                  John Kelsey and
                  Stefan Lucks and
                  Bruce Schneier and
                  Michael Stay and
                  David A. Wagner and
                  Doug Whiting},
  editor       = {Bruce Schneier},
  title        = {Improved Cryptanalysis of Rijndael},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {213--230},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_15},
  doi          = {10.1007/3-540-44706-7\_15},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/FergusonKLSSWW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KatzS00,
  author       = {Jonathan Katz and
                  Bruce Schneier},
  editor       = {Steven M. Bellovin and
                  Greg Rose},
  title        = {A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols},
  booktitle    = {9th {USENIX} Security Symposium, Denver, Colorado, USA, August 14-17,
                  2000},
  publisher    = {{USENIX} Association},
  year         = {2000},
  url          = {https://www.usenix.org/conference/9th-usenix-security-symposium/chosen-ciphertext-attack-against-several-e-mail-encryption},
  timestamp    = {Mon, 01 Feb 2021 08:43:02 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KatzS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cardis/1998,
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10721064},
  doi          = {10.1007/10721064},
  isbn         = {3-540-67923-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Schneier99,
  author       = {Bruce Schneier},
  title        = {The Uses and Abuses of Biometrics},
  journal      = {Commun. {ACM}},
  volume       = {42},
  number       = {8},
  pages        = {136},
  year         = {1999},
  url          = {https://doi.org/10.1145/310930.310988},
  doi          = {10.1145/310930.310988},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Schneier99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Schneier99a,
  author       = {Bruce Schneier},
  title        = {The Trojan Horse Race},
  journal      = {Commun. {ACM}},
  volume       = {42},
  number       = {9},
  pages        = {128},
  year         = {1999},
  url          = {https://doi.org/10.1145/315762.315785},
  doi          = {10.1145/315762.315785},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Schneier99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Schneier99b,
  author       = {Bruce Schneier},
  title        = {Risks of Relying on Cryptography},
  journal      = {Commun. {ACM}},
  volume       = {42},
  number       = {10},
  pages        = {144},
  year         = {1999},
  url          = {https://doi.org/10.1145/317665.317684},
  doi          = {10.1145/317665.317684},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Schneier99b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Schneider99,
  author       = {Bruce Schneier},
  title        = {Cryptography: The Importance of Not Being Different},
  journal      = {Computer},
  volume       = {32},
  number       = {3},
  pages        = {108--109},
  year         = {1999},
  url          = {https://doi.org/10.1109/2.751335},
  doi          = {10.1109/2.751335},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Schneider99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/firstmonday/KelseyS99,
  author       = {John Kelsey and
                  Bruce Schneier},
  title        = {The Street Performer Protocol and Digital Copyrights},
  journal      = {First Monday},
  volume       = {4},
  number       = {6},
  year         = {1999},
  url          = {https://doi.org/10.5210/fm.v4i6.673},
  doi          = {10.5210/FM.V4I6.673},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/firstmonday/KelseyS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SchneierK99,
  author       = {Bruce Schneier and
                  John Kelsey},
  title        = {Secure Audit Logs to Support Computer Forensics},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {159--176},
  year         = {1999},
  url          = {https://doi.org/10.1145/317087.317089},
  doi          = {10.1145/317087.317089},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SchneierK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cqre/SchneierMW99,
  author       = {Bruce Schneier and
                  Mudge and
                  David A. Wagner},
  editor       = {Rainer Baumgart},
  title        = {Cryptanalysis of Microsoft's {PPTP} Authentication Extensions (MS-CHAPv2)},
  booktitle    = {Secure Networking - {CQRE} (Secure) '99, International Exhibition
                  and Congress D{\"{u}}sseldorf, Germany, November 30 - December
                  2, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1740},
  pages        = {192--203},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46701-7\_17},
  doi          = {10.1007/3-540-46701-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cqre/SchneierMW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KelseySW99,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Lars R. Knudsen},
  title        = {Mod n Cryptanalysis, with Applications Against {RC5P} and {M6}},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {139--155},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_11},
  doi          = {10.1007/3-540-48519-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KelseySW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HallGS99,
  author       = {Chris Hall and
                  Ian Goldberg and
                  Bruce Schneier},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Reaction Attacks against several Public-Key Cryptosystems},
  booktitle    = {Information and Communication Security, Second International Conference,
                  ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1726},
  pages        = {2--12},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-47942-0\_2},
  doi          = {10.1007/978-3-540-47942-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/HallGS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KelseyS99,
  author       = {John Kelsey and
                  Bruce Schneier},
  title        = {Minimizing Bandwidth for Remote Access to Cryptographically Protected
                  Audit Logs},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Kelsey.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/KelseyS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KelseySF99,
  author       = {John Kelsey and
                  Bruce Schneier and
                  Niels Ferguson},
  editor       = {Howard M. Heys and
                  Carlisle M. Adams},
  title        = {Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic
                  Pseudorandom Number Generator},
  booktitle    = {Selected Areas in Cryptography, 6th Annual International Workshop,
                  SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1758},
  pages        = {13--33},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46513-8\_2},
  doi          = {10.1007/3-540-46513-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/KelseySF99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KelseyS99,
  author       = {John Kelsey and
                  Bruce Schneier},
  editor       = {Howard M. Heys and
                  Carlisle M. Adams},
  title        = {Key-Schedule Cryptanalysis of {DEAL}},
  booktitle    = {Selected Areas in Cryptography, 6th Annual International Workshop,
                  SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1758},
  pages        = {118--134},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46513-8\_9},
  doi          = {10.1007/3-540-46513-8\_9},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/KelseyS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcard/KelseyS99,
  author       = {John Kelsey and
                  Bruce Schneier},
  editor       = {Scott B. Guthery and
                  Peter Honeyman},
  title        = {Authenticating Secure Tokens Using Slow Memory Access},
  booktitle    = {Proceedings of the 1st Workshop on Smartcard Technology, Smartcard
                  1999, Chicago, Illinois, USA, May 10-11, 1999},
  publisher    = {{USENIX} Association},
  year         = {1999},
  url          = {https://www.usenix.org/conference/usenix-workshop-smartcard-technology/authenticating-secure-tokens-using-slow-memory},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcard/KelseyS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Schneier98,
  author       = {Bruce Schneier},
  title        = {Cryptographic Design Vulnerabilities},
  journal      = {Computer},
  volume       = {31},
  number       = {9},
  pages        = {29--33},
  year         = {1998},
  url          = {https://doi.org/10.1109/2.708447},
  doi          = {10.1109/2.708447},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Schneier98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Schneier98,
  author       = {Bruce Schneier},
  title        = {Security pitfalls in cryptographic design},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {133--137},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810225038},
  doi          = {10.1108/09685229810225038},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Schneier98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchneierR98,
  author       = {Bruce Schneier and
                  James Riordan},
  title        = {A Certified E-Mail Protocol},
  booktitle    = {14th Annual Computer Security Applications Conference {(ACSAC} 1998),
                  7-11 December 1998, Scottsdale, AZ, {USA}},
  pages        = {347--352},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/CSAC.1998.738655},
  doi          = {10.1109/CSAC.1998.738655},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchneierR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/KelseyS98,
  author       = {John Kelsey and
                  Bruce Schneier},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {Secure Authentication with Multiple Parallel Keys},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {150--156},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_13},
  doi          = {10.1007/10721064\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/KelseyS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/SchneierW98,
  author       = {Bruce Schneier and
                  Doug Whiting},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {Twofish on Smart Cards},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {265--276},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_25},
  doi          = {10.1007/10721064\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/SchneierW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchneierM98,
  author       = {Bruce Schneier and
                  Mudge},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol {(PPTP)}},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {132--141},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288119},
  doi          = {10.1145/288090.288119},
  timestamp    = {Tue, 10 Nov 2020 20:00:11 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchneierM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HallWKS98,
  author       = {Chris Hall and
                  David A. Wagner and
                  John Kelsey and
                  Bruce Schneier},
  editor       = {Hugo Krawczyk},
  title        = {Building PRFs from PRPs},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {370--389},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055742},
  doi          = {10.1007/BFB0055742},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HallWKS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KelseySWH98,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner and
                  Chris Hall},
  editor       = {Jean{-}Jacques Quisquater and
                  Yves Deswarte and
                  Catherine Meadows and
                  Dieter Gollmann},
  title        = {Side Channel Cryptanalysis of Product Ciphers},
  booktitle    = {Computer Security - {ESORICS} 98, 5th European Symposium on Research
                  in Computer Security, Louvain-la-Neuve, Belgium, September 16-18,
                  1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1485},
  pages        = {97--110},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055858},
  doi          = {10.1007/BFB0055858},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KelseySWH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HallKSW98,
  author       = {Chris Hall and
                  John Kelsey and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Rafael Hirschfeld},
  title        = {Cryptanalysis of {SPEED}},
  booktitle    = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
                  British West Indies, February 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1465},
  pages        = {309--310},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055491},
  doi          = {10.1007/BFB0055491},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/HallKSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CoppersmithWSK98,
  author       = {Don Coppersmith and
                  David A. Wagner and
                  Bruce Schneier and
                  John Kelsey},
  editor       = {Serge Vaudenay},
  title        = {Cryptanalysis of {TWOPRIME}},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {32--48},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_3},
  doi          = {10.1007/3-540-69710-1\_3},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CoppersmithWSK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KelseySWH98,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner and
                  Chris Hall},
  editor       = {Serge Vaudenay},
  title        = {Cryptanalytic Attacks on Pseudorandom Number Generators},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {168--188},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_12},
  doi          = {10.1007/3-540-69710-1\_12},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/KelseySWH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mas/RiordanS98,
  author       = {James Riordan and
                  Bruce Schneier},
  editor       = {Giovanni Vigna},
  title        = {Environmental Key Generation Towards Clueless Agents},
  booktitle    = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  pages        = {15--24},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1\_2},
  doi          = {10.1007/3-540-68671-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/RiordanS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/SlaterSSW98,
  author       = {Chris Slater and
                  O. Sami Saydjari and
                  Bruce Schneier and
                  Jim Wallner},
  editor       = {Bob Blakley and
                  Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald},
  title        = {Toward a Secure System Engineering Methodolgy},
  booktitle    = {Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville,
                  VA, USA, September 22-25, 1998},
  pages        = {2--10},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/310889.310900},
  doi          = {10.1145/310889.310900},
  timestamp    = {Thu, 09 Sep 2021 18:23:55 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/SlaterSSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/SchneierKWWH98,
  author       = {Bruce Schneier and
                  John Kelsey and
                  Doug Whiting and
                  David A. Wagner and
                  Chris Hall},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {On the Twofish Key Schedule},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {27--42},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_3},
  doi          = {10.1007/3-540-48892-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/SchneierKWWH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/WagnerSDKMS98,
  author       = {David A. Wagner and
                  Leonie Simpson and
                  Ed Dawson and
                  John Kelsey and
                  William Millan and
                  Bruce Schneier},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {Cryptanalysis of {ORYX}},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {296--305},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_23},
  doi          = {10.1007/3-540-48892-8\_23},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/WagnerSDKMS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/HallKRSW98,
  author       = {Chris Hall and
                  John Kelsey and
                  Vincent Rijmen and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {Cryptanalysis of {SPEED}},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {319--338},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_25},
  doi          = {10.1007/3-540-48892-8\_25},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/HallKRSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SchneierK98,
  author       = {Bruce Schneier and
                  John Kelsey},
  editor       = {Aviel D. Rubin},
  title        = {Cryptographic Support for Secure Logs on Untrusted Machines},
  booktitle    = {Proceedings of the 7th {USENIX} Security Symposium, San Antonio, TX,
                  USA, January 26-29, 1998},
  publisher    = {{USENIX} Association},
  year         = {1998},
  url          = {https://www.usenix.org/conference/7th-usenix-security-symposium/cryptographic-support-secure-logs-untrusted-machines},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SchneierK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uwec/KelseyS98,
  author       = {John Kelsey and
                  Bruce Schneier},
  editor       = {Bennet S. Yee},
  title        = {Electronic Commerce and the Street Performer},
  booktitle    = {Proceedings of the 3rd {USENIX} Workshop on Electronic Commerce, Boston,
                  Massachusetts, USA, August 31 - September 3, 1998},
  publisher    = {{USENIX} Association},
  year         = {1998},
  url          = {https://www.usenix.org/conference/3rd-usenix-workshop-electronic-commerce/electronic-commerce-and-street-performer},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/uwec/KelseyS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Schneier97,
  author       = {Bruce Schneier},
  title        = {Cryptography, Security, and the Future},
  journal      = {Commun. {ACM}},
  volume       = {40},
  number       = {1},
  pages        = {138},
  year         = {1997},
  url          = {https://doi.org/10.1145/242857.263692},
  doi          = {10.1145/242857.263692},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Schneier97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/SchneierK97,
  author       = {Bruce Schneier and
                  John Kelsey},
  title        = {Remote auditing of software outputs using a trusted coprocessor},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {13},
  number       = {1},
  pages        = {9--18},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-739X(97)00004-6},
  doi          = {10.1016/S0167-739X(97)00004-6},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/SchneierK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wwwj/AbelsonABBBDGNR97,
  author       = {Hal Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Whitfield Diffie and
                  John Gilmore and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier},
  title        = {The risks of key recovery, key escrow, and trusted third-party encryption},
  journal      = {World Wide Web J.},
  volume       = {2},
  pages        = {241--257},
  year         = {1997},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wwwj/AbelsonABBBDGNR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchneierH97,
  author       = {Bruce Schneier and
                  Chris Hall},
  title        = {An Improved E-Mail Security Protocol},
  booktitle    = {13th Annual Computer Security Applications Conference {(ACSAC} 1997),
                  8-12 December 1997, San Diego, CA, {USA}},
  pages        = {227},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/CSAC.1997.646194},
  doi          = {10.1109/CSAC.1997.646194},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchneierH97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HallS97,
  author       = {Chris Hall and
                  Bruce Schneier},
  title        = {Remote Electronic Gambling},
  booktitle    = {13th Annual Computer Security Applications Conference {(ACSAC} 1997),
                  8-12 December 1997, San Diego, CA, {USA}},
  pages        = {232--238},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/CSAC.1997.646195},
  doi          = {10.1109/CSAC.1997.646195},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HallS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KelseyS97,
  author       = {John Kelsey and
                  Bruce Schneier},
  editor       = {Richard Graveman and
                  Philippe A. Janson and
                  Clifford Neuman and
                  Li Gong},
  title        = {Conditional Purchase Orders},
  booktitle    = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and
                  Communications Security, Zurich, Switzerland, April 1-4, 1997},
  pages        = {117--124},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/266420.266446},
  doi          = {10.1145/266420.266446},
  timestamp    = {Tue, 10 Nov 2020 20:00:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KelseyS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WagnerSK97,
  author       = {David A. Wagner and
                  Bruce Schneier and
                  John Kelsey},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Cryptanalysis of the Cellular Encryption Algorithm},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {526--537},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052260},
  doi          = {10.1007/BFB0052260},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WagnerSK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SchneierW97,
  author       = {Bruce Schneier and
                  Doug Whiting},
  editor       = {Eli Biham},
  title        = {Fast Software Encryption: Designing Encryption Algorithms for Optimal
                  Software Speed on the Intel Pentium Processor},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {242--259},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052351},
  doi          = {10.1007/BFB0052351},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SchneierW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/KelseySW97,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES,
                  RC2, and {TEA}},
  booktitle    = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  pages        = {233--246},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028479},
  doi          = {10.1007/BFB0028479},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/KelseySW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KelseySHW97,
  author       = {John Kelsey and
                  Bruce Schneier and
                  Chris Hall and
                  David A. Wagner},
  editor       = {Eiji Okamoto and
                  George I. Davida and
                  Masahiro Mambo},
  title        = {Secure Applications of Low-Entropy Keys},
  booktitle    = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi,
                  Japan, September 17-19, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1396},
  pages        = {121--134},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0030415},
  doi          = {10.1007/BFB0030415},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KelseySHW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KelseySW97,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {Protocol Interactions and the Chosen Protocol Attack},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {91--104},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028162},
  doi          = {10.1007/BFB0028162},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KelseySW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0084524,
  author       = {Bruce Schneier},
  title        = {Angewandte Kryptographie - Protokolle, Algorithmen und Sourcecode
                  in {C}},
  series       = {Informationssicherheit},
  publisher    = {Addison-Wesley},
  year         = {1996},
  isbn         = {978-3-89319-854-2},
  timestamp    = {Wed, 27 Apr 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0084524.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0078909,
  author       = {Bruce Schneier},
  title        = {Applied cryptography - protocols, algorithms, and source code in C,
                  2nd Edition},
  publisher    = {Wiley},
  year         = {1996},
  url          = {https://www.worldcat.org/oclc/32311687},
  isbn         = {978-0-471-11709-4},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0078909.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wwwj/JonesS96,
  author       = {Michael F. Jones and
                  Bruce Schneier},
  title        = {Securing the World Wide Web: Smart Tokens and Their Implementation},
  journal      = {World Wide Web J.},
  volume       = {1},
  number       = {1},
  year         = {1996},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wwwj/JonesS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KelseySH96,
  author       = {John Kelsey and
                  Bruce Schneier and
                  Chris Hall},
  title        = {An Authenticated Camera},
  booktitle    = {12th Annual Computer Security Applications Conference {(ACSAC} 1996),
                  9-13 December 1996, San Diego, CA, {USA}},
  pages        = {24--30},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSAC.1996.569666},
  doi          = {10.1109/CSAC.1996.569666},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KelseySH96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/SchneierK96,
  author       = {Bruce Schneier and
                  John Kelsey},
  title        = {Authenticating Outputs of Computer Software Using a Cryptographic
                  Coprocessor},
  booktitle    = {Proceedings of the Second Smart Card Research and Advanced Application
                  Conference, {CARDIS} 1996, September 18-20, 1996, CWI, Amsterdam,
                  The Netherlands},
  year         = {1996},
  timestamp    = {Fri, 15 Oct 2004 16:01:14 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/SchneierK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KelseySW96,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Neal Koblitz},
  title        = {Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES},
  booktitle    = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {237--251},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68697-5\_19},
  doi          = {10.1007/3-540-68697-5\_19},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KelseySW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SchneierKW96,
  author       = {Bruce Schneier and
                  John Kelsey and
                  Jay Walker},
  editor       = {Elisa Bertino and
                  Helmut Kurth and
                  Giancarlo Martella and
                  Emilio Montolivo},
  title        = {Distributed Proctoring},
  booktitle    = {Computer Security - {ESORICS} 96, 4th European Symposium on Research
                  in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1146},
  pages        = {172--182},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61770-1\_36},
  doi          = {10.1007/3-540-61770-1\_36},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SchneierKW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SchneierK96,
  author       = {Bruce Schneier and
                  John Kelsey},
  editor       = {Dieter Gollmann},
  title        = {Unbalanced Feistel Networks and Block Cipher Design},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {121--144},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_49},
  doi          = {10.1007/3-540-60865-6\_49},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SchneierK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/SchneierK96,
  author       = {Bruce Schneier and
                  John Kelsey},
  editor       = {T. Mark A. Lomas},
  title        = {Automatic Event-Stream Notarization Using Digital Signatures},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {155--169},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_15},
  doi          = {10.1007/3-540-62494-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/SchneierK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/JonesS95,
  author       = {Michael F. Jones and
                  Bruce Schneier},
  editor       = {Albert Vezza and
                  Ira Goldstein and
                  Tim Berners{-}Lee},
  title        = {Securing the World Wide Web: Smart Tokens and Their Implementation},
  booktitle    = {Proceedings of the Fourth International Conference on World Wide Web,
                  WWW4, Boston, Massachusetts, USA, December 11-14, 1995},
  pages        = {397--409},
  publisher    = {{ACM}},
  year         = {1995},
  url          = {https://doi.org/10.1145/3592626.3592658},
  doi          = {10.1145/3592626.3592658},
  timestamp    = {Thu, 21 Sep 2023 16:48:52 +0200},
  biburl       = {https://dblp.org/rec/conf/www/JonesS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlazeS94,
  author       = {Matt Blaze and
                  Bruce Schneier},
  editor       = {Bart Preneel},
  title        = {The MacGuffin Block Cipher Algorithm},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {97--110},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_8},
  doi          = {10.1007/3-540-60590-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BlazeS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Schneier94,
  author       = {Bruce Schneier},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Eric Leighninger},
  title        = {Designing encryption algorithms for real people},
  booktitle    = {Proceedings of the 1994 Workshop on New Security Paradigms, Little
                  Compton, Rhode Island, USA, August 3-5,1994},
  pages        = {98--101},
  publisher    = {{IEEE} Computer Society Press},
  year         = {1994},
  url          = {https://doi.org/10.1109/NSPW.1994.656244},
  doi          = {10.1109/NSPW.1994.656244},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/Schneier94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Schneier93,
  author       = {Bruce Schneier},
  editor       = {Ross J. Anderson},
  title        = {Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {191--204},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_24},
  doi          = {10.1007/3-540-58108-1\_24},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Schneier93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics