Title :
Insecurity through Obscurity
Author_Institution :
Associate Editor in Chief
Abstract :
Figuring out how to gather and share data might not be as glamorous as cracking a tough cipher or thwarting an exploit, but it does have great leverage.
Keywords :
cipher; data sharing; exploit; system design; Computer security; Costs; Finance; Privacy; cipher; data sharing; exploit; system design;
Journal_Title :
Security & Privacy, IEEE
DOI :
10.1109/MSP.2006.123