obren.io / 359°

History of Security & Privacy in 134 Chapters

About

  • This is a curated and experimental site, offering historical and visual index of all collected sources.
  • The site does not host any of the files. It only provides an index and links to full text files.
  • Full text of many sources is behind a paywall. You may need to obtain a subscription to read full text.

Latest Issue

2025
2025, no. 2: Secure Software Beyond Code/ing

Latest Issue:
Secure Software Beyond Code/ing

  • With Great Power Comes Great Responsibility: Security and Privacy Issues of Modern Browser Application Programming Interfaces
  • Data Acquisition Framework for Micromobility Vehicles Toward Driving Risk Prediction Against Cyberphysical Security Attack
  • The Everyday Security of Living With Conflict
  • Cyber Hard Problems: The Next Generation [From the Editors]
  • Contextualizing Formal Verification for Systems Security Engineering
  • ...

History

·
2024
2024, no. 2: Hot Topics

A Year Ago:
Hot Topics

  • Trust in Data Security Protocols and Knowledge of Privacy and Security Technology
  • Privacy Engineering From Principles to Practice: A Roadmap
  • Narrowing the Software Supply Chain Attack Vectors: The SSDF Is Wonderful but not Enough
  • AI Safety: A Poisoned Chalice?
  • Secure Access Service Edge Convergence: Recent Progress and Open Issues
  • ...
·
·
·
·
2020
2020, no. 2: Quantitative Issues in Cyberinsurance

5 Years Ago:
Quantitative Issues in Cyberinsurance

  • Permissions and Privacy
  • You Could Be Mine(d): The Rise of Cryptojacking
  • Bringing Cyber to School: Integrating Cybersecurity Into Secondary School Education
  • Quantitative Issues in Cyberinsurance: Lessons From Behavioral Economics, Counterfactuals, and Causal Inference
  • Policies on Privacy
  • ...
·
·
·
·
·
2015
2015, no. 2: IEEE Security & Privacy Symposium

10 Years Ago:
IEEE Security & Privacy Symposium

  • Gaining an Edge in Cyberspace with Advanced Situational Awareness
  • Informed Consent: We Can Do Better to Defend Privacy
  • The Security Value of Muddling Through
  • Dancing with Giants: Wimpy Kernels for On-Demand I/O Isolation
  • An Enduring Symposium for Leading Research in Security and Privacy
  • ...
·
·
·
·
·
2010
2010, no. 2: Mobile Device Security

15 Years Ago:
Mobile Device Security

  • A Mobile Biometric System-on-Token System for Signing Digital Transactions
  • International Blues
  • Guest Editors' Introduction: Mobile Device Security
  • Crypto: Not Just for the Defensive Team
  • The Limits of Notice and Choice
  • ...
·
·
·
·
·
2005
2005, no. 2: Trusted Computing

20 Years Ago:
Trusted Computing

  • Worm Propagation and Generic Attacks
  • Does Trusted Computing Remedy Computer Security Problems?
  • Averting Security Missteps in Outsourcing
  • Canning Spam: Proposed Solutions to Unwanted Email
  • Crypto 2004
  • ...
·
·
·
2003
2003, no. 1: Fact over Fiction

Premiere Issue:
Fact over Fiction

  • What Is Computer Security?
  • A Critical Need, An Ambitious Mission, A New Magazine
  • Software Security for Open-Source Systems
  • AI Bites Man?
  • Copyright Extension: Eldred v. Ashcroft
  • ...