Bruce Schneier
Orcid: 0000-0003-1453-1083Affiliations:
- Harvard Kennedy School, USA
According to our database1,
Bruce Schneier
authored at least 159 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on imdb.com
-
on twitter.com
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on schneier.com
On csauthors.net:
Bibliography
2024
J. Cybersecur., January, 2024
IEEE Access, 2024
2023
CoRR, 2023
2022
2021
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
2020
2019
2018
2017
2016
2015
Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement.
RFC, August, 2015
Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015
2014
2013
2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
2010
Secur. Commun. Networks, 2010
Wiley, ISBN: 978-0-470-47424-2, 2010
2009
2008
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008
Schneier on security.
Wiley, ISBN: 978-0-470-39535-6, 2008
2007
2006
Springer, ISBN: 978-0-387-02620-6, 2006
Angewandte Kryptographie - Protokolle, Algorithmen und Sourcecode in C: der Klassiker.
Pearson Education, ISBN: 978-3-8273-7228-4, 2006
2005
IEEE Secur. Priv., 2005
2004
Proceedings of the Economics of Information Security, 2004
IACR Cryptol. ePrint Arch., 2004
Secrets and lies - digital security in a networked world: with new information about post-9/11 security.
Wiley, ISBN: 978-0-471-45380-2, 2004
Secrets and lies - IT-Sicherheit in einer vernetzten Welt.
dpunkt.verlag, ISBN: 978-3-89864-302-3, 2004
2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Practical cryptography.
Wiley, ISBN: 978-0-471-22357-3, 2003
2002
Proceedings of the Information Security, 5th International Conference, 2002
2001
Comput. Secur., 2001
2000
Proceedings of the 9th USENIX Security Symposium, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
A Performance Comparison of the Five AES Finalists.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000
Comments on Twofish as an AES Candidate.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000
Preliminary Cryptanalysis of Reduced-Round Serpent.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000
MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Proceedings of the 1st Workshop on Smartcard Technology, 1999
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999
1998
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998
Proceedings of the 7th USENIX Security Symposium, 1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the 1998 Workshop on New Security Paradigms, 1998
Proceedings of the Mobile Agents and Security, 1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Proceedings of the CCS '98, 1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1997
The risks of key recovery, key escrow, and trusted third-party encryption.
World Wide Web J., 1997
Future Gener. Comput. Syst., 1997
Proceedings of the Security Protocols, 1997
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
Proceedings of the Advances in Cryptology, 1997
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
1996
Securing the World Wide Web: Smart Tokens and Their Implementation.
World Wide Web J., 1996
Proceedings of the Security Protocols, 1996
Proceedings of the Fast Software Encryption, 1996
Proceedings of the Advances in Cryptology, 1996
Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996
Angewandte Kryptographie - Protokolle, Algorithmen und Sourcecode in C.
Informationssicherheit, Addison-Wesley, ISBN: 978-3-89319-854-2, 1996
Wiley, ISBN: 0-471-12845-7, 1996
1994
Proceedings of the 1994 Workshop on New Security Paradigms, 1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
1993
Proceedings of the Fast Software Encryption, 1993