For centuries, private international law, the branch of law concerning conflicts of law across international borders and jurisdictions, established rules based ... Read More »
Although biometric techniques offer robust authentication, they could violate privacy when used for public security. This survey explores Hong Kong residents' t... Read More »
This article describes and compares four approaches to storing payment keys and executing payment applications on mobile phones via near-field communication at ... Read More »
In Victoria, Australia, the vVote verifiable voting system allowed blind voters and voters in remote locations to cast fully secret ballots in a verifiable way.... Read More »
By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.
... Read More »
Articles due for review (in ScholarOne): CLOSED
Publication date: November/December 2017
Modern societies are becoming increasingly dependent on open networks ... Read More »
A cybersecurity economics model is presented for public policy regarding electricity transmission infrastructure combining the US style (a mostly rules-based mo... Read More »
Because Web 2.0 applications often result in novel exploits, data leaks, or identity theft, the solution is to understand the attacks and assess how best to pre... Read More »
A taxonomy helps delineate between jamming in the original electronic warfare sense and wireless cybersecurity attacks, classifying communication jammers' theor... Read More »
IEEE Security & Privacy’s primary objective is to stimulate and track advances in security, privacy, and dependability and present these advances in a form that can be useful to a broad cross-section of the professional community — ranging from academic researchers to industry practitioners.