ieee-sp.bib

@article{bellovin:what,
  author = {Bellovin, Steven M.},
  journal = {{IEEE} Security \& Privacy},
  month = {May/June},
  number = {3},
  pages = {88--88},
  title = {What a Real Cybersecurity Bill Should Address},
  url = {http://www.computer.org/cms/Computer.org/ComputingNow/pdfs/real-cybersecurity-bill.pdf},
  volume = {13},
  year = {2015},
  bdsk-url-1 = {http://www.computer.org/cms/Computer.org/ComputingNow/pdfs/real-cybersecurity-bill.pdf}
}
@article{bellovin:what*1,
  author = {Bellovin, Steven M.},
  date-added = {2015-03-31 19:59:01 +0000},
  date-modified = {2015-03-31 20:15:53 +0000},
  doi = {10.1109/MSP.2014.131},
  issn = {1540-7993},
  journal = {{IEEE} Security \& Privacy},
  keywords = {Computer security;Cryptography;Electronic
		  mail;Encryption;Failure
		  analysis;Usability;cryptanalysis;cryptography;email
		  security;encryption;key handling;security},
  month = {November},
  number = {6},
  pages = {108--108},
  title = {What Should Crypto Look Like?},
  volume = {12},
  year = {2014},
  bdsk-url-1 = {http://dx.doi.org/10.1109/MSP.2014.131}
}
@article{bellovin:major,
  author = {Bellovin, Steven M.},
  date = {2012-11/2012-12},
  doi = {10.1109/MSP.2012.158},
  issn = {1540-7993},
  journal = {{IEEE} Security \& Privacy},
  month = {November--December},
  number = {6},
  pages = {96},
  title = {The Major Cyberincident Investigations Board},
  volume = {10},
  year = {2012},
  bdsk-url-1 = {http://dx.doi.org/10.1109/MSP.2012.158}
}
@article{bellovin:military,
  author = {Bellovin, Steven M.},
  date = {2013-05/2013-06},
  date-modified = {2014-08-07 18:11:54 +0000},
  journal = {IEEE Security \& Privacy},
  month = {May--June},
  number = {3},
  pages = {88},
  publisher = {IEEE Computer Society},
  title = {Military Cybersomethings},
  url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6521321},
  volume = {11},
  year = {2013},
  bdsk-url-1 = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6521321}
}
@article{bellovin:dr--strangecode,
  author = {Bellovin, Steven M.},
  date = {2014-05/2014-06},
  date-added = {2014-08-07 18:08:58 +0000},
  date-modified = {2014-08-14 02:43:22 +0000},
  journal = {{IEEE} Security \& Privacy},
  month = {May--June},
  number = {3},
  publisher = {IEEE Computer Society},
  title = {{Dr. Strangecode}},
  url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6824548},
  volume = {12},
  year = {2014},
  bdsk-url-1 = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6824548}
}
@article{bellovin:walls,
  author = {Steven M. Bellovin},
  journal = {{IEEE} Security \& Privacy},
  month = {November-December},
  number = {11},
  title = {Walls and Gates},
  url = {https://www.cs.columbia.edu/~smb/papers/Walls_and_Gates.pdf},
  volume = {6},
  year = {2013},
  bdsk-url-1 = {https://www.cs.columbia.edu/~smb/papers/Walls_and_Gates.pdf}
}
@article{bellovin:security,
  author = {Steven M. Bellovin},
  date = {2005-05/2005-06},
  journal = {{IEEE} Security \& Privacy},
  month = {May--June},
  number = {3},
  title = {Security and Privacy: Enemies or Allies?},
  url = {https://www.cs.columbia.edu/~smb/papers/01439512.pdf},
  volume = {3},
  year = {2005},
  bdsk-url-1 = {https://www.cs.columbia.edu/~smb/papers/01439512.pdf}
}
@article{bellovin:unconventional,
  author = {Steven M. Bellovin},
  date = {2006-01/2006-02},
  journal = {{IEEE} Security \& Privacy},
  month = {January--February},
  number = {1},
  title = {Unconventional Wisdom},
  url = {https://www.cs.columbia.edu/~smb/papers/01588836.pdf},
  volume = {4},
  year = {2006},
  bdsk-url-1 = {https://www.cs.columbia.edu/~smb/papers/01588836.pdf}
}
@article{bellovin:on,
  author = {Steven M. Bellovin},
  date = {2006-07/2006-08},
  journal = {{IEEE} Security \& Privacy},
  month = {July--August},
  number = {4},
  title = {On the Brittleness of Software and the Infeasibility of
		  Security Metrics},
  url = {https://www.cs.columbia.edu/~smb/papers/01668014.pdf},
  volume = {4},
  year = {2006},
  bdsk-url-1 = {https://www.cs.columbia.edu/~smb/papers/01668014.pdf}
}
@article{bellovin:drm,
  author = {Steven M. Bellovin},
  date = {2007-01/2007-02},
  journal = {{IEEE} Security \& Privacy},
  month = {January--February},
  number = {1},
  title = {{DRM}, Complexity, and Correctness},
  url = {https://www.cs.columbia.edu/~smb/papers/04085601.pdf},
  volume = {5},
  year = {2007},
  bdsk-url-1 = {https://www.cs.columbia.edu/~smb/papers/04085601.pdf}
}
@article{bellovin:seers,
  author = {Steven M. Bellovin},
  date = {2007-09/2007-10},
  journal = {{IEEE} Security \& Privacy},
  month = {September--October},
  number = {5},
  title = {Seers and Craftspeople},
  url = {https://www.cs.columbia.edu/~smb/papers/04336288.pdf},
  volume = {5},
  year = {2007},
  bdsk-url-1 = {https://www.cs.columbia.edu/~smb/papers/04336288.pdf}
}
@article{bellovin:security*1,
  author = {Steven M. Bellovin},
  date = {2008-03/2008-04},
  journal = {{IEEE} Security \& Privacy},
  month = {March--April},
  number = {2},
  title = {Security by Checklist},
  url = {https://www.cs.columbia.edu/~smb/papers/04489860.pdf},
  volume = {6},
  year = {2008},
  bdsk-url-1 = {https://www.cs.columbia.edu/~smb/papers/04489860.pdf}
}
@article{bellovin:puzzle,
  author = {Steven M. Bellovin},
  date = {2008-09/2008-10},
  journal = {{IEEE} Security \& Privacy},
  month = {September--October},
  number = {5},
  title = {The Puzzle of Privacy},
  url = {https://www.cs.columbia.edu/~smb/papers/cleartext-2008-09.pdf},
  volume = {6},
  year = {2008},
  bdsk-url-1 = {https://www.cs.columbia.edu/~smb/papers/cleartext-2008-09.pdf}
}
@article{bellovin:government,
  author = {Steven M. Bellovin},
  date = {2009-03/2009-04},
  journal = {{IEEE} Security \& Privacy},
  month = {March--April},
  note = {(Ignore the part that says I work for Microsoft---I
		  don't\ldots The editor and I both missed that in the
		  galleys.)},
  number = {2},
  title = {The Government and Cybersecurity},
  url = {https://www.cs.columbia.edu/~smb/papers/cleartext-2009-03.pdf},
  volume = {7},
  year = {2009},
  bdsk-url-1 = {https://www.cs.columbia.edu/~smb/papers/cleartext-2009-03.pdf}
}
@article{bellovin:security*2,
  author = {Steven M. Bellovin},
  date = {2009-09/2009-10},
  journal = {{IEEE} Security \& Privacy},
  month = {September--October},
  number = {5},
  title = {Security as a Systems Property},
  url = {https://www.cs.columbia.edu/~smb/papers/cleartext-2009-09.pdf},
  volume = {7},
  year = {2009},
  bdsk-url-1 = {https://www.cs.columbia.edu/~smb/papers/cleartext-2009-09.pdf}
}
@article{bellovin:identity,
  author = {Steven M. Bellovin},
  date = {2010-03/2010-04},
  journal = {{IEEE} Security \& Privacy},
  month = {March--April},
  number = {2},
  title = {Identity and Security},
  url = {https://www.cs.columbia.edu/~smb/papers/cleartext-2010-02.pdf},
  volume = {8},
  year = {2010},
  bdsk-url-1 = {https://www.cs.columbia.edu/~smb/papers/cleartext-2010-02.pdf}
}
@article{bellovin:perceptions,
  author = {Steven M. Bellovin},
  date = {2010-09/2010-10},
  journal = {{IEEE} Security \& Privacy},
  month = {September--October},
  number = {5},
  title = {Perceptions and Reality},
  url = {https://www.cs.columbia.edu/~smb/papers/cleartext-2010-09.pdf},
  volume = {8},
  year = {2010},
  bdsk-url-1 = {https://www.cs.columbia.edu/~smb/papers/cleartext-2010-09.pdf}
}
@article{bellovin:clouds,
  author = {Steven M. Bellovin},
  date = {2011-05/2011-06},
  journal = {{IEEE} Security \& Privacy},
  month = {May--June},
  number = {3},
  title = {Clouds from Both Sides},
  url = {https://www.cs.columbia.edu/~smb/papers/cloud.pdf},
  volume = {9},
  year = {2011},
  bdsk-url-1 = {https://www.cs.columbia.edu/~smb/papers/cloud.pdf}
}
@article{bellovin:security*3,
  author = {Steven M. Bellovin},
  date = {2011-11/2011-12},
  journal = {{IEEE} Security \& Privacy},
  month = {November--December},
  number = {6},
  title = {Security Think},
  url = {https://www.cs.columbia.edu/~smb/papers/cleartext-2011-12.pdf},
  volume = {9},
  year = {2011},
  bdsk-url-1 = {https://www.cs.columbia.edu/~smb/papers/cleartext-2011-12.pdf}
}
@article{bellovin:fighting,
  author = {Steven M. Bellovin},
  date = {2012-05/2012-06},
  journal = {{IEEE} Security \& Privacy},
  month = {May--June},
  number = {3},
  title = {Fighting the Last War},
  url = {http://doi.ieeecomputersociety.org/10.1109/MSP.2012.66},
  volume = {10},
  year = {2012},
  bdsk-url-1 = {http://doi.ieeecomputersociety.org/10.1109/MSP.2012.66}
}