%% This BibTeX bibliography file was created using BibDesk.
%% http://bibdesk.sourceforge.net/
%% Created for Simson Garfinkel at 2009-04-13 14:04:04 -0700 
%% Saved with string encoding Unicode (UTF-8) 

                  
%%%%%
%%%%% 2017
%%%%%
@article{acar-2017,
 title="Comparing the Usability of Cryptographic APIs",
 author="Yasemin Acar and Michael Backes and Sascha Fahl and Simson Garfinkel and Doowon Kim and Michelle Mazurek and Christian Stransky",
 booktitle="Proceedings of the IEEE Symposium on Security and Privacy",
 year=2017,
 address="San Jose, CA",
 month=May
}
                  

@article{pridgen-dfrwseu-2017,
 author="Adam Pridgen and Simson Garfinkel and Dan S. Wallach",
 title="Picking up the trash: Exploiting generational GC for memory analysis",
 booktitle="Proceedings of the Fourth Annual DFRWS Europe",
 month=Mar,
 year=2017
}

@article{pridgen-hicss-50,
  month=Jan,
  year=2017,
  author="Adam Pridgen and Simson Garfinkel and Dan Wallach",
  title="Present but Unreachable, reducing persistent latent secrets in HotSpot JVM",
  booktitle="Hawaii International Conference on System Sciences (HICSS-50)",
  address="Hilton Waikoloa Village, Hawaii",
  note="Best Paper Award"
}

%%%%%
%%%%% 2016
%%%%%
@techreport{NIST.IR.8150,
  title="Government Data De-Identification Stakeholder's Meeting June 29, 2016 Meeting Report",
  author="Simson Garfinkel",
 institution="National Institute of Science and Technology",
  number="NIST IR 8150",
  year=2016,
  month=Sep
} 

@techreport{NIST.SP.800-188,
  title="De-Identifying Government Data",
  number="SP 800-188",
  institution="National Institute of Science and Technology",
  author="Simson Garfinkel",
  year="2016",
 note="DRAFT"
}



@article{theofanos:secure-cac,
 title="Secure and Usable Enterprise Authentication: Lessons from the Field",
 author="Mary Theofanos and Simson Garfinkel  and Yee-Yin Choong",
 year=2016,
 journal="IEEE Security and Privacy",
 month="Sept/Oct"
}

@inproceedings{pridgen:hicss50,
 title="Present but unreachable: Reducing persistent latent secrets in HotSpot JVM",
 author="Adam Pridgen and Simson L. Garfinkel and Dan S. Wallach",
 year=2017,
 booktitle="Hawaii International Conference on System Sciences",
 month="Jan. 4--7",
 address="Hilton Waikoloa Village"
}
 
 


%%%%%
%%%%% 2015
%%%%%

@inproceedings{garfinkel:hashdb,
 title="Hash-Based Carving: Searching media for complete files and file fragments with sector hashing and hashdb",
  author="Simson Garfinkel and Michael McCarrin",
  booktitle="Proc. of the Fifteenth Annual DFRWS Conference",
  address="Philadelphia, PA",
  year=2015,
  month="Aug. 10--12",
  arate="36\% (16/44)"
}
                  
@techreport{NIST.SP.800-177,
  title="Trustworthy Email",
  number="SP 800-177",
  institution="National Institute of Science and Technology",
  author="Ramaswamy Chandramouli and Simson Garfinkel and Stephen Nightingale and Scott Rose",
  year="2015"
}

@techreport{NIST.IR.8053,
  title="De-Identification of Personally Identifiable Information",
  author="Simson Garfinkel",
 institution="National Institute of Science and Technology",
  number="NIST IR 8053",
  year=2015,
  month=Nov
} 

%%%%%
%%%%% 2014
%%%%%

              
@inproceedings{garfinkel:xor,
  title="A Survey of XOR as a Digital Obfuscation Technique in a Corpus of Real Data",
  author="Carolina Zarate and Simson Garfinkel and Aubin Hefferman and Scott Horras and Kyle Gorak",
  year=2014,
  booktitle="The Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics",
  address="Vienna, Austria",
  arate="44\% (24/54)"
}
                  
@article{garfinkel:compressed-data,
author="Simson Garfinkel",
journal="Journal of Forensic Sciences",
month="Summer",
year=2014,
title="The Prevalence Of Encoded Digital Trace Evidence in the Non-File Space of Computer Media",
publisher="Wiley"
}                  
                  
@book{garfinkel:usable-security2,
author="Simson Garfinkel and Heather Lipford",
title="Usable Security: History, Themes, and Challenges",
year=2014,
publisher="Morgan \& Claypool",
note="Synthesis Lextures on Information Security, Privacy and Trust"
}                  

@article{garfinkel:sniff,
author="Simson Garfinkel and Michael McCarrin",
title="Can We Sniff Wi-FI?",
month="July/August",
journal="IEEE Security and Privacy",
year=2014
}

@article{garfinkel:leaking, 
author={Simson Garfinkel}, 
journal={Security Privacy, IEEE}, 
title={Leaking Sensitive Information In Complex Document Files---and How to Prevent It}, 
year={2014}, 
month={Jan}, 
pages={20-27}, 
keywords={Computers;Government;Portable document format;Printing;Privacy;Security;Software}, 
doi={10.1109/MSP.2013.131}, 
ISSN={1540-7993},
Volume=12,
issue=1
}

@techreport{NPS-CS-13-005,
 title="A Survey of XOR as a Digital Obfuscation Technique in a Corpus of Real Data",
 year=2014,
 author="Carolina M. Zarate and Simson L. Garfinkel and Aubin Hefferman and  Scott Horras and Kyle Gorak",
 month=Jan # " 17",
 url="http://calhoun.nps.edu/public/handle/10945/38680",
 address="Monterey, CA",
 institution="Naval Postgraduate School",
 number="NPS-CS-13-005"
}


%%%%%
%%%%% 2013
%%%%%

@techreport{NPS-CS-13-003,
 title="Passive TCP Reconstruction and Forensic Analysis with tcpflow",
 author="Simson Garfinkel and Mike Shick",
 year=2013,
 url="http://calhoun.nps.edu/public/handle/10945/36026",
 month=Sep,
 number="NPS-CS-13-003",
 address="Monterey, CA",
 institution="Naval Postgraduate School"
}
 
@techreport{NPS-CS-13-006,
 title="Bulk Extractor 1.4 User's Manual",
 author="Jessica Bradley and Simson Garfinkel",
 number="NPS-CS-13-006",
 address="Monterey, CA",
 institution="Naval Postgraduate School"
}

@techreport{NPS-CS-13-007,
 title="Bulk Extractor 1.4 Programmers Manual for Developing Scanner Plug-Ins",
 author="Jessica Bradley and Simson Garfinkel",
 number="NPS-CS-13-007",
 address="Monterey, CA",
 institution="Naval Postgraduate School"
}
                    

@inproceedings{garfinkel:ieee-hst-2013,
 title="Detecting Threatening Insiders with Lightweight Media Forensics",
 author="Simson Garfinkel and Nicole Beebe and Lishu Liu and Michele Maasberg",
 booktitle={Proc. of 2013 IEEE International Conference on Technologies for Homeland Security},
 month=Nov,
 year=2013,
 address="Waltham, MA"
}                  

@misc{due-1140938,
 title="DUE-1140938: Developing Materials to Teach Technical Privacy Auditing with Digital Forensics Tools and Realistic Digital Forensics Datasets",
 author={{NSF}},
 year="2013--2014"
}

@misc{8433959,
 author="Simson L. Garfinkel and Alex Nelson",
 title="Method for Determining Hard Drive Contents through Statistical Drive Sampling",
 month=Apr,
 day=30,
 year=2013,
 monthfiled=Sep,
 dayfiled=7,
 yearfile=2010,
 note="US Patent 8433959",
 number={US 8433959}
}

@article{garfinkel:american-scientist-digital-forensics,
 author="Simson Garfinkel",                   
 title="Digital Forensics",
 journal="American Scientist",
 month="Sept--Oct",
 publisher="Sigma Xi",
 year=2013,
 url="http://www.simson.net/clips/academic/2013.AmericanScientist.pdf"
}
                  

@inproceedings{rowe:language-translation,
 author="Neil Rowe and Riqui Schwamm and Simson Garfinkel",
 title="Language Translation for File Paths",
 publisher="Elsevier",
 booktitle={Proc. of the Thirteenth Annual DFRWS Conference},
 volume=10,
 year=2013,
 address="Monterey, CA",
 arate=" 26.5\% (13/49)"
}

@article{garfinkel:bulk-extractor,
  author="Simson Garfinkel",
  title="Digital media triage with bulk data analysis and bulk\_extractor",
  journal="Computers \& Security",
 publisher="Elsevier",
 month=Feb,
 year=2013,
 pages="57--72",
 volume=32
}
                  

%%%%%
%%%%% 2012
%%%%%
                  
@article{garfinkel:cacm-cybersecurity,
 title="The Cybersecurity Risk",
 author="Simson L. Garfinkel",
 volume=55,
 number=6,
 pages="29--32",
 year=2012,
 journal="Commun. of the ACM",
 publisher="Association for Computing Machinery",
 url="http://simson.net/clips/academic/2012.CACM.Cybersecurity.pdf"
}

@article{garfinkel:cacm-cybersecurity-presentation,
 title="The Cybersecurity Mess",
 author="Simson L. Garfinkel",
 url="http://simson.net/ref/2012/2012-04-25_Cybersecurity.pdf",
 note="Presented at MIT Sloan"
}

@article{garfinkel:unicode,
 title="Programming Unicode",
 author="Simson L. Garfinkel",
 year=2012, 
 journal=";login:",
 publisher="Usenix",
 month=Apr,
 pages="25--37",
 url="http://simson.net/clips/academic/2012.Login.Unicode.pdf"
}
                  
@article{fairbanks:data-decay,
 url="http://simson.net/clips/academic/2012.JCDFSL.DataDecay.pdf",
 title="Column: Factors Affecting Data Decay",
 journal="Journal of Digital Forensics, Security and Law",
 publisher="Association of Digital Forensics, Security and Law (ADFSL)",
 year=2012,
 volume=7,
 issue=2,
 pages="7--10",
 author="Kevin Fairbanks and Simson Garfinkel"                  
}

@article{young:distinct,
 title="Distinct Sector Hashing for Target Detection",
 author="Joel Young and Kristina Foster and Simson Garfinkel and Kevin Fairbanks",
 year=2012,
 month=Dec,
 journal="IEEE Computer",
 publisher="IEEE Computing Society",
 url="http://simson.net/clips/academic/2012.IEEE.SectorHashing.pdf",
 pages="28--35",
}                  


@inproceedings{garfinkel:lessons,
 author="Simson Garfinkel",
 journal="Digital Investigation",
 publisher="Elsevier",
 booktitle = {Proc. of the Twelfth Annual DFRWS Conference},
 title = "Lessons Learned Writing Computer Forensics Tools and Managing a Large Digital Evidence Corpus",
 volume=9,
 year = 2012,
 address="Washington, DC"
}

@inproceedings{garfinkel:differencing,
 author="Simson Garfinkel and Alex Nelson and Joel Young",
 journal="Digital Investigation",
 publisher="Elsevier",
 booktitle = {Proc. of the Twelfth Annual DFRWS Conference},
 title = "A General Strategy for Differential Forensic Analysis",
 volume=9,
 year = 2012,
 address="Washington, DC"
}


@article{garfinkel:dfxml,
  author="Simson Garfinkel",
  title="{Digital Forensics XML}",
  journal="Digital Investigation",                   
  year=2012,
  publisher="Elsevier",
  volume=8,
  issue= "3--4",
  pages="161--174",
  month=Feb
}


%%%%%
%%%%% 2011
%%%%%
                  
@misc{dod-2011-strategy,
 title="Department of Defense Strategy for Operating in Cyberspace",
 year=2011,
 month=Jul,
 url="http://www.defense.gov/news/d20110714cyber.pdf",
 author={{US Department of Defense}}
}                  
                  
@techreport{NPS-CS-11-006,
 title="Timothy Courrejou and Simson Garfinkel",
 author="A comparative analysis of file carving software",
 number="NPS-CS-11-007",
 address="Monterey, CA",
 institution="Naval Postgraduate School"
}


@techreport{nps-cs-11-011,
 title="The New {NPS} \LaTeX{} Report And Thesis Format                  ",
 author="Simson L. Garfinkel and Travis W. Axtell",
 year=2011,
 number="NPS-CS-11-011",
 address="Monterey, CA",
 institution="Naval Postgraduate School"
}

@article{garfinkel:degraded,
 title="Operations with Degraded Security",
 journal="IEEE Security and Privacy",
 month=nov,
 year=2011,
 pages="18--23",
 volume=9,
 issue=6,
 publisher="IEEE Computing Society",
 author="Simson L. Garfinkel and George Dinolt"
}

@article{garfinkel:every-last-byte,
 title="Every Last Byte",
 journal="J. of Digital Forensics, Security and Law",
 volume=6,
 number=2,
 pages="7--8",
 author="Simson Garfinkel",
 year=2011,
 publisher="Association of Digital Forensics, Security and Law (ADFSL)"
}

@article{garfinkel:file-cabinet,
 title="File Cabinet Forensics",
 journal="J. of Digital Forensics, Security and Law",
 volume=6,
 number=4,
 pages="7--8",
 author="Simson Garfinkel",
 year=2011,
 publisher="Association of Digital Forensics, Security and Law (ADFSL)"
}

@article{garfinkel:kurzweil-mind,
 author="Simson Garfinkel",
 journal="The Washington Post",
 title="`How to Create a Mind: The Secret of Human Thought Revealed' by Ray Kurzweil",
 publisher="The Washington Post Co",
 year=2013,
 month=Jan # " 18",
 url="http://articles.washingtonpost.com/2013-01-18/opinions/36475120_1_human-brain-artificial-intelligence-ray-kurzweil"
}

@article{garfinkel:smiley-review,
 author="Simson Garfinkel",
 journal="The Washington Post",
 title="Jane Smiley's nonfiction tale of the invention of the computer",
 year=2011,
 month=Jan # " 6",
 note="Review of The Man Who Invented The Computer, The Biography of John Atanasoff, Digital Pioneer, by Jane Smiley",
 publisher="The Washington Post"
}                  

@inproceedings{rowe:icdf2c-2011,
 author="Neil C. Rowe and Simson L. Garfinkel",
 title="Finding anomalous and suspicious files from directory metadata on a large corpus",
 booktitle="3rd International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C)",
 address="Dublin, Ireland",
 publisher="Springer",
 year=2011
}

@article{RoweGBY11,
  author = {Rowe, Neil C. and Garfinkel, Simson L. and Beverly, Robert and Yannakogeorgos, Panayotis},
  biburl = {http://www.bibsonomy.org/bibtex/23162d92a14e412ac26d3dc45a12c1bf9/dblp},
  ee = {http://dx.doi.org/10.4018/ijcwt.2011040104},
  interhash = {8cd3c298784e2ed120c15b33f82f46fd},
  intrahash = {3162d92a14e412ac26d3dc45a12c1bf9},
  journal = {IJCWT},
  keywords = {dblp},
  number = 2,
  publisher="IGI Global",                     
  pages = {35-48},
  title = {Challenges in Monitoring Cyberarms Compliance},
  url = {http://dblp.uni-trier.de/db/journals/ijcwt/ijcwt1.html},
  volume = 1,
  year = 2011
}
                  
@inproceedings{beverly:ipcarving,
 author = "Robert Beverly and Simson Garfinkel and Gregory Cardwell",
 journal = "Digital Investigation",
 publisher="Elsevier",
 booktitle = {Proc. of the Eleventh Annual DFRWS Conference},
 title = "Forensic Carving of Network Packets and Associated Data Structures",
 volume=8,
 year = 2011,
 abstract="Using validated carving techniques, we show that 
  popular operating systems (\eg Windows, Linux, and OSX) 
  frequently have residual IP packets, Ethernet frames, 
  and associated data structures present in system memory
  from long-terminated network traffic. Such information is useful
  for many forensic purposes including establishment of
  prior connection activity and services used;
  identification of other
  systems present on the system's LAN or WLAN; geolocation of the
  host computer system; and cross-drive analysis. We show that network structures can also be
  recovered from memory that is persisted onto a mass storage medium
  during the course of system swapping or hibernation. 
  We present our network carving techniques, algorithms and tools,
  and validate these against both purpose-built memory images and a readily
  available forensic corpora.  These techniques are
  valuable to both forensics tasks, particularly
  in analyzing mobile devices, and to cyber-security objectives such
  as malware analysis.",
  arate=" 23\%, 14/62; BEST PAPER AWARD"
}
                  
@inproceedings{rowe:eciw2011,
 title="Steps towards Monitoring Cyberarms Compliance",
 year=2011,
 author="Neil C. Rowe and Simson L. Garfinkel and Robert Beverly and Panayotis Yannakogeorgos",
 booktitle="10th European Conference on i-Warfare and Security",
 month="7--8 " # jul,
 address="Tallinn, Estonia",
 publisher="Academic Conferences Ltd.",
 arate="65\%, 54/83"
}
                  

@article{phillips:facebook,
 author="Kenneth N Phillips and Aaron Pickett and Simson Garfinkel",
 title="Embedded with Facebook: DoD Faces Risks from Social Media",
 journal="CrossTalk",
 publisher="US Department of Defense",
 month=may # "/" # jun,
 pages="25--29",
 year=2011
}


@inproceedings{woods:jcdl-m57,
  title="Extending Digital Repository Architectures To Support Disk Image Preservation And Access",
  author="Kam Woods and Christopher A. Lee and Simson Garfinkel",
  booktitle="2011 Joint Conference on Digital Libraries (JCDL)", 
  year=2011,
  address="Ottawa, Canada",
  publisher={{ACM}},
  arate="28\%, 22/99"
}

@inproceedings{woods:adfsl-m57,
  author="Kam Woods and Christopher Lee and Simson Garfinkel and David Dittrich and Adam Russell and Kris Kearton",
  title="Creating Realistic Corpora for Forensic and Security Education",
  booktitle="2011 ADFSL Conference on Digital Forensics, Security and Law",
  publisher="Elsevier",
  year=2011,
  address="Richmond, VA",
  arate="50\%, 32/16"
}

%%%%%
%%%%% 2010
%%%%%
                  
@article{garfinkel:ascription,
  author="Simson Garfinkel and Aleatha Parker-Wood and Daniel Huynh and James Migletz",
  title="A Solution to the Multi-User Carved Data Ascription Problem",
  journal="IEEE Transactions on Information Forensics and Security",
  month=Dec,
  volume=5,
  number=4,
  pages="868--882",
  year=2010,
  publisher="IEEE Computing Society",
}
                  
@inproceedings{garfinkel:10years,
 title="Digital Forensics: The Next 10 Years",
 author="Simson Garfinkel",                   
 journal="Digital Investigation",
 volume=7,                   
 booktitle="Proc. of the Tenth Annual DFRWS Conference",
 address="Portland, OR",
 publisher="Elsevier",
 year=2010,
 arate="40\%, 16/39"
}                  

@inproceedings{garfinkel:sector-id,
 title="Using purpose-built functions and block hashes to enable small block and sub-file forensics",
 author="Simson Garfinkel and Alex Nelson and Douglas White and Vassil Roussev",
 publisher="Elsevier",
 booktitle="Proc. of the Tenth Annual DFRWS Conference",
 address="Portland, OR",
 year=2010,
 arate="40\%, 16/39",
 pages="S13--S23",
 url="http://simson.net/clips/academic/2010.DFRWS.SmallBlockForensics.pdf"
}

@article{garfinkel:cacm-irbs,
  author="Simson Garfinkel and Lorrie Cranor",
  title="Institutional Review Boards and Your Research",
  publisher="ACM",
  journal="Commun. of the ACM",
  pages="38--40",
  month=Jun,
  year=2010
}

@inproceedings{garfinkel:global-analysis,
  author="Simson Garfinkel and Neil Rowe",
  title="Global analysis of drive file times",
  booktitle="Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering",
  publisher="IEEE Computing Society",                   
  address="Oakland, CA",
  year=2010,
 pages="97--108",
  month=May
}

@techreport{NPS-CS-10-010,
author="Timothy Courrejou and Simson Garfinkel",
 title="A Comparative Analysis of File Carving Software",
 number="NPS-CS-10-010",
 month=Sep,
 year=2010,
 institution="Naval Postgraduate School",
 address="Monterey, CA",
 note="For Official Use Only"
}

@techreport{NPS-CS-10-004,
author="Simson Garfinkel",
 title="Counter Intelligence Risks Posed By Information Stored in
  {DOD411}---The {DISA} Global Directory Service",
 number="NPS-CS-10-004",
 month=Sep,
 year=2010,
 institution="Naval Postgraduate School",
  address="Monterey, CA",
 note="For Official Use Only"
}

@techreport{NPS-CS-10-003,
 author="Simson Garfinkel",
 title="Residual Data Found on Guardian Edge-Protected Removable Storage Media",
 number="NPS-CS-10-003",
 month=Sep,
 year=2010,
 institution="Naval Postgraduate School",
  address="Monterey, CA",
 note="For Official Use Only"
}

@techreport{NPS-CS-10-011,
 author="George Dinolt and Bruce Allen and David Canright and Simson Garfinkel",
 title="Parallelizing {SHA}-256, {SHA}-1 {MD5} and {AES} on the {Cell Broadband Engine}",
 number="NPS-CS-10-11",
 month=Sep,
 year=2010,
 address="Monterey, CA",
 institution="Naval Postgraduate School"
}



%%%%%
%%%%% 2009
%%%%%
                  
@techreport{NPS-MA-09-001,
  author="David Canright and George Dinolt and Simson Garfinkel and Jonathan Herzog and Bruce Allen",
  title="Implementing AES on the CellBE",
  number="NPS-MA-09-001",
  institution="Naval Postgraduate School",
  address="Monterey, CA",
  year=2009,
  month=Jan
}

@techreport{NPS-CS-09-003,
author="Loren E. Pietso and Simson Garfinkel",
 title="Methods for Creating Realistic Disk Images for Forensic Tool Testing and Education",
 number="NPS-CS-09-003",
 month=Mar,
 year=2009,
  address="Monterey, CA",
 institution="Naval Postgraduate School"
}

@article{garfinkel:affcrypto,
	Author = {Simson L. Garfinkel},
	Issue = 1,
	Journal = {The International Journal of Digital Crime and Forensics},
	Month = Jan # {--} # Mar,
	Title = {Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools},
        publisher="IGI Global",
	Volume = 1,
         pages="1--28",
	Year = 2009}

@inproceedings{garfinkel:aff4,
  author="Michael I.\ Cohen and Simson Garfinkel and Bradley Schatz",
  title="Extending the Advanced Forensic Format to Accommodate Multiple Data Sources, Logical Evidence, Arbitrary Information and Forensic Workflow",
  booktitle="Proceedings of DFRWS 2009",
  address="Montreal, Canada.",
  publisher="Elsevier",
  arate="36\% (15/41)",
  year=2009
}

@techreport{NPS-CS-08-014,
   author={Simson L. Garfinkel},
   title="Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools",
   year=2008,
   institution="NPS",
   number="NPS-CS-08-014",
   address="Monterey, CA"
}

@inproceedings{garfinkel:fragments,
  author="Vassil Roussev and Simson Garfinkel",
  title="File Fragment Classification---The Case for Specialized Approaches",
  booktitle={Systematic Approaches to Digital Forensics Engineering (IEEE/SADFE 2009)},
  month=May,
  year=2009,
  arate="32\% (7/22)",
  pages="3--14",
  publisher="Springer"
}

@inproceedings{garfinkel:corpora,
  author={Simson L. Garfinkel and Paul Farrell and Vassil Roussev and George Dinolt},
  Booktitle={Proceedings of the 9th Annual Digital Forensic Research Workshop (DFRWS)},
                    publisher="Elsevier",
	Journal = {Digital Investigation},
	Address = {Quebec, CA},
	Month = Aug,
	Title = {Bringing Science to Digital Forensics with Standardized Forensic Corpora},
	Year = 2009,
        arate="36\% (15/41); BEST PAPER AWARD"
}

@inproceedings{garfinkel:xml-forensics,
 author={Simson L. Garfinkel},
 Booktitle ={Proceedings of the Fourth International IEEE Workshop on 
      Systematic Approaches to Digital Forensic Engineering},
 organization="IEEE",
 year=2009,
 title="Automating Disk Forensic Processing with {SleuthKit}, {XML} and {Python}",
 publisher="IEEE",
 address="Oakland, CA",
 pages="73--84",
 arate="32\%, 7/22"
}

@misc{garfinkel:frag-find,
  author="Simson L. Garfinkel",
  title="Announcing frag\_find: finding file fragments in disk images using sector hashing",
  url="http://tech.groups.yahoo.com/group/linux_forensics/message/3063",
  month=Mar,
  year=2009
}                  

@article{garfinkel:docx,
  author="Simson Garfinkel and James Migletz",
  title="New {XML}-Based Files: Implications for Forensics",
  journal="IEEE Security \& Privacy Magazine",
  year=2009,
publisher="IEEE",
  month = Mar # " / " # Apr,
  volume=7,
  number=2,
 pages="38--44"
}

@inproceedings{garfinkel:internet-footprint,
  year=2009,
  author="Simson Garfinkel and David Cox",
  title="Finding and Archiving the Internet Footprint",
  booktitle="The First Digital Lives Research Conference",
  publisher="The British Library",
  month=Feb # " 9--11",
  address="London, England"
}


%%%%%
%%%%% 2008
%%%%%
                  
@techreport{NPS-CS-08-008,
  author="Simon McLaren and Simson Garfinkel",
  title="A Field Study of an Iris Identification System",
  number="NPS-CS-08-008",
  institution="Naval Postgraduate School",
  address="Monterey, CA",
  month=May,
  year=2008
}

@article{garfinkel:secviz-review,
	author={Simson Garfinkel},
	title="Sharp Figures, Fuzzy Purpose",
	note="Review of Security Data Visualization: Graphical Techniques for Network Analysis by Greg Conti",
  	journal="IEEE Security \& Privacy Magazine",
  publisher="IEEE Computing Society",
	month=Mar # {/} # Apr,
	year=2008,
	volume=6,
	number=2,
	pages="5"
}

@inproceedings{garfinkel:s3grids,
	Author = {M. Palankar and A. Iamnitchi and M. Ripeanu and S. Garfinkel},
	Booktitle = {International Workshop on Data-Aware Distributed Computing (DADC'08)},
	Address = {Boston, MA},
	Month = Jun # { 23--27},
	Title = {Amazon {S3} for Science Grids: a Viable Solution?},
                    publisher="{ACM}",
	Year = 2008}

@inproceedings{garfinkel:bloom,
	Author = {Paul Farrell and Simson Garfinkel and Doug White},
	Booktitle = {Computer Security Applications Conference, 2008. ACSAC 2008. Annual},
	Address = {Anaheim, California},
	Month = Dec,
        pages="13-22",
        publisher="{ACM}",
	Title = {Practical Applications of Bloom filters to the {NIST RDS} and hard drive triage},
        Year = 2008,
         arate="24\%, 42/173"
}

@article{garfinkel:wikipedia,
	Author = {Simson L. Garfinkel},
	Journal = {Technology Review},
	Month = Nov # {/} # Dec,
	Title = {Wikipedia and the Meaning of Truth},
	Url = {https://www.technologyreview.com/web/21558/},
	Year = 2008,
	url = {https://www.technologyreview.com/web/21558/}}
                  
@misc{garfinkel:afflib,
	Author = {Simson L. Garfinkel},
	Title = {{AFFLIB}},
	Url = {http://www.afflib.org/},
	Year = 2008,
	url = {http://www.afflib.org/}}

@inproceedings{garfinkel:irb2008,
	Author = {Simson L. Garfinkel},
	Booktitle = {Usability, Psychology and Security 2008 (Co-located with the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI '08))},
	Address = {San Francisco, CA},
	Month = Apr,
	Title = {{IRBs} and Security Research: Myths, Facts and Mission Creep},
	Year = 2008,
        publisher="Usenix",
	url = {http://www.simson.net/clips/academic/2008.UPS2008.pdf}}

                  
%%%%%
%%%%% 2007
%%%%%
                  
@article{garfinkel:domex07,
	Author = {Simson L. Garfinkel},
	Journal = {Queue},
	Month = {November/December},
	Publisher = {ACM},
	Title = {Document and Media Exploitation},
	Year = 2007,
     pages="22--30",
 volume=5,
 number=7,
	url = {http://www.simson.net/clips/academic/2007.ACM.Domex.pdf}}


@techreport{garfinkel:aws07,
	Author = {Simson L. Garfinkel},
	Institution = {School for Engineering and Applied Sciences, Harvard University},
	Month = Jul,
	Number = {TR-08-07},
	Title = {An Evaluation of {Amazon's} Grid Computing Services: {EC2}, {S3} and {SQS} },
	Year = 2007,
	url = {http://www.simson.net/clips/academic/2007.Harvard.S3.pdf}}

@inproceedings{garfinkel:carving07,
	Author = {Simson L. Garfinkel},
	Booktitle = {Proceedings of the 7th Annual Digital Forensic Research Workshop (DFRWS)},
	Journal = {Digital Investigation},
	Address = {Pittsburgh, PA},
	Month = Sep,
	Title = {Carving Contiguous and Fragmented Files with Fast Object Validation},
	Year = 2007,
        publisher="Elsevier", arate="47\%, 17/36",
        volume=4,
         pages="2--12"
}

@inproceedings{garfinkel:2007:AA,
	Address = {Monterey, CA},
	Author = {Simson L. Garfinkel},
	Booktitle = {Proceedings of the 2nd International Conference on i-Warfare and Security ({ICIW})},
	Month = {8-9 March},
	Organization = {Naval Postgraduate School},
	Title = {Anti-Forensics: Techniques, Detection and Countermeasures},
	arate="55\%",
      publisher="Academic Conferences Ltd.",
	Year = {2007}}

@article{Garfinkel:2007:AB,
	Author = {Simson L. Garfinkel},
	Date-Added = {2007-08-29 13:21:28 -0400},
	Date-Modified = {2009-04-13 14:04:03 -0700},
	Journal = {Operating Systems Review},
       volume=41,
       number=1,
        publisher="Association for Computing Machinery",
        pages="42--44",
	Month = {January},
	Title = {Complete Delete vs. Time Machine Computing},
	Year = {2007}}

@article{garfinkel:logins3,
  title="Commodity Grid and Computing with Amazon's {S3} and {EC2}",
  journal=";LOGIN:",
  month=Feb,
 year=2007,
 pages="7--13",
 publisher="Usenix",
 author="Simson L. Garfinkel"
}

@inproceedings{garfinkel:automatic-provenance,
 author="Uri Braun and  Simson Garfinkel and David A. Holland and  Kiran-Kumar Muniswamy-Reddy and Margo I. Seltzer",
 booktitle="International Provenance and Annotation Workshop (IPAW'06)",
 title="Issues in Automatic Provenance Collection",
 address="Chicago, IL.",
 editor="Juliana Freire and David Koop and Luc Moreau",
 publisher="Springer",
 month=May # " 3--5",
 year=2006
}
                  

@inproceedings{DBLP:conf/chi/WuMG06,
  author    = {Min Wu and
               Robert C. Miller and
               Simson L. Garfinkel},
  title     = {Do security toolbars actually prevent phishing attacks?},
  booktitle = {CHI},
  year      = {2006},
  pages     = {601-610},
  ee        = {http://doi.acm.org/10.1145/1124772.1124863},
  crossref  = {DBLP:conf/chi/2006},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
                  
@proceedings{DBLP:conf/chi/2006,
  editor    = {Rebecca E. Grinter and Tom Rodden and Paul M. Aoki and Edward Cutrell and Robin Jeffries and Gary M. Olson},
  title     = {Proceedings of the 2006 Conference on Human Factors in Computing Systems, CHI 2006, Montreal, Quebec, Canada, April 22-27, 2006},
  booktitle = {CHI},
  publisher = {ACM},
  year      = {2006},
  isbn      = {1-59593-372-7},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
                  

@inproceedings{SOUPS2007:Garfinkel,
	address="Pittsburgh, PA",
	author="Simson Garfinkel and Ivan Krstic",
	booktitle="Proceedings of the Symposium On Usable Privacy and Security (SOUPS 2007)",
	month=Jul,
	title="The One Laptop Per Child Security Model",
	year="2007",
    pages="132--142",
       publisher="Association for Computing Machinery",
 arate="32\%, 13/41"
}

%%%%%
%%%%% 2006
%%%%%
                  
@incollection{garfinkel:bookchapter-smime,
	Author = {Simson Garfinkel},
	Booktitle = { Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft},
	Editor = {Markus Jakobsson and Steven Myers},
	Publisher = {Wiley},
	Title = {Using {S/MIME}},
	Year = 2006}

@incollection{garfinkel:wireless-chapter,
      author="Mya Poe and Simson Garfinkel",
 title="Security and Privacy in the Wireless Composition Classroom",
 booktitle="Going Wireless; A Critical Exploration of Wireless and Mobile Technologies for Composition Teachers and Scholars",
 editor="Amy C. Kimme Hae",
  publisher="Hampton Press",
 year=2006
}

@incollection{garfinkel:rfid-chapter,
  title="RFID in Ubiquitious Commerce",
  booktitle="Ubiquitous and Pervasive Commerce",
  author="Simson Garfinkel",
  editor="George Roussos",
  publisher="Springer SMB",
 month=Nov,
 year=2005
}
                  
                  

@misc{garfinkel:dfrws2006-carving,
  author={Simson L. Garfinkel},
  Title="DFRWS 2006 Challenge Report",
  year=2006,
  url="http://sandbox.dfrws.org/2006/garfinkel/part1.txt"
}                  

@article{garfinkel:2006:data-surveillance,
	publisher = "IEEE",
	issue = Nov # " / " # Dec,
	year=2006,
        journal = "IEEE Security \& Privacy",
volume=4,
number=6,
        title="Data Surveillance: Guest Editors' Introduction",
 pages="15--17",
	Author = {Simson L. Garfinkel and {Michael D. Smith}}}

@inproceedings{garfinkel:cda,
        Publisher = "Elsevier",
	Address = {Lafayette, Indiana},
	Author = {Simson L. Garfinkel},
	Booktitle = {Proceedings of the 6th Annual Digital Forensic Research Workshop (DFRWS)},
	Journal = {Digital Investigation},
	Month = Aug,
	Title = {Forensic feature extraction and cross-drive analysis},
	Year = 2006,
        arate="43\%, 16/37",
	url = {http://www.dfrws.org/2006/proceedings/10-Garfinkel.pdf}}

@inproceedings{garfinkel:aff,
	Author = {Simson L. Garfinkel and David {J.} Malan and Karl-Alexander Dubec and Christopher {C.} Stevens and Cecile Pham},
	Booktitle = {Research Advances in Digital Forensics (Second Annual IFIP WG 11.9 International Conference on Digital Forensics)},
	Month = Jan,
	Publisher = {Springer},
	Title = {Disk Imaging with the Advanced Forensic Format, Library and Tools},
                  arate="54\%, 27/50",
	Year = {2006}}

@article{garfinkel:affc,
	Author = {Simson Garfinkel},
	Journal = {Commun. of the ACM},
	Month = Feb,
pages="85--87",
 volume=49,
 number=2,
publisher="ACM",
	Title = {{AFF}: A New Format for Storing Hard Drive Images},
	Year = 2006}

@article{garfinkel:standardizing-digital-evidence,
	Author = {B. Carrier and E. Casey and  S. Garfinkel and J. Kornblum and C. Hosmer and  M. Rogers and P. Turner},
	Journal = {Commun. of the ACM},
	Month = Feb,
    pages="67--68",
 volume=49,
 number=2,
                   publisher="ACM",
	Title = {Standardizing Digital Evidence Storage},
	Year = 2006}


@inproceedings{garfinkel:bigfile,
	Author = {Simson Garfinkel and David Malan},
	Booktitle = {The 6th Workshop on Privacy Enhancing Technologies},
	Address = {Robinson College, Cambridge, UK},
	Month = Jun # { 28 -- 30},
	Title = {One Big File is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique},
        arate="26\%, 24/91",
        publisher="Springer",
	Year = 2006}


@article{garfinkel:phone-calls,
 author="Simson L. Garfinkel",
 title="Phone Calls Are Just the Start",
 journal="The Washington Post",
 publisher="The Washington Post Company",
 month=May # " 14",
 year=2006,
 url="http://www.washingtonpost.com/wp-dyn/content/article/2006/05/13/AR2006051300043.html"
}                  

%%%%%
%%%%% 2005
%%%%%
                  
@article{garfinkel:ieee-rfid,
  author="Simson Garfinkel and Ari Juels and Ravi Pappu",
  title="{RFID} Privacy: An Overview of Problems and Proposed Solutions",
  journal="IEEE Security and Privacy",
publisher="IEEE",
  volume=3,
  number=3,
  pages="34--43",
  month=May # "/" # Jun,
  year=2005
}
                  

@book{garfinkel:usability-book,
	title = {Security and Usability},
	Editor = {Lorrie Cranor and Simson Garfinkel},
	Publisher = {O'Reilly},
	Year = 2005}

@book{garfinkel:rfid-book,                  
 title="RFID: Applications, Security, and Privacy",
 editor="Simson Garfinkel and Beth Rosenberg",
 year=2005,
 publisher={Addison-Wesley Professional}
}


@inproceedings{SOUPS2005:Garfinkel,
	address="Pittsburgh, PA",
	author="Simson L. Garfinkel and Robert C. Miller ",
	booktitle="Proceedings of the Symposium On Usable Privacy and Security (SOUPS 2005)",
	month=Jul,
	title="Johnny 2: A User Test of Key Continuity Management with {S/MIME} and Outlook Express",
                  arate="26\%",
        publisher="{ACM}",
	year="2005"
}

@incollection{book:garfinkel,
	Author = {Simson Garfinkel},
	Booktitle = {Security and Usability},
	Editor = {Lorrie Cranor and Simson Garfinkel},
	Editor_A = {Lorrie Cranor and Simson L. Garfinkel},
	Publisher = {O'Reilly},
	Title = {Sanitization and Usability},
	Year = 2005}

@phdthesis{garfinkel:2005,
	Address = {Cambridge, MA},
	Author = {Simson L. Garfinkel},
	Month = Apr # { 26 },
	School = {MIT},
	Title = {Design Principles and Patterns for Computer Systems that are Simultaneously Secure and Usable},
	Year = {2005}}

@inproceedings{garfinkel:chi2005,
	Author = {Simson L. Garfinkel and Erik Nordlander and Robert C. Miller and David Margrave and Jeffrey I. Schiller},
	Booktitle = {{CHI 2005}},
	Address = {Portland, OR},
	Publisher = {ACM Press},
	Title = {How to Make Secure Email Easier To Use},
arate="$\approx$25\%",
	Year = 2005}

@inproceedings{garfinkel:fc2005,
	Author = {Simson L. Garfinkel and Jeffrey I. Schiller and Erik Nordlander and David Margrave and Robert C. Miller},
	Booktitle = {Financial Cryptography and Data Security 2005},
	Publisher = {Springer Verlag},
	Title = {Views, Reactions, and Impact of Digitally-Signed Mail in e-Commerce},
                  arate="26\%, 24/90",
	Year = {2005}}


%%%%%
%%%%% 2004
%%%%%
                  
@inproceedings{garfinkel:best-practices,
 author="Simson Garfinkel",
 title="Best Practices for Usable Security In Desktop Software",
 booktitle="DIMACS Workshop on Usable Privacy and Security Software",
 month=Jul # " 7--8",
 year=2004,
 address="DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ.",
 publisher="Center for Discrete Mathematics \& Theoretical Computer Science (DIMACS), Rutgers University",
}

                  

@article{garfinkel:pure-software,
	Author = {Simson L. Garfinkel},
	Journal = {TechnologyReview.com},
	Month = Apr # { 7 },
	Title = {The Pure Software Act of 2006},
	Url = {http://simson.net/clips/2004/2004.TR.04.PureSoftware.pdf},
	Year = 2004,
	url = {http://simson.net/clips/2004/2004.TR.04.PureSoftware.pdf}}

@article{cranor:hci-sec2004-intro,
  title="Guest Editor's Introduction: Secure or Usable?",
  month= Sep # "/" # Oct,
  year=2004,
  volume=2,
  number=5,
  pages="16--18",
  author="Lorrie Faith Cranor and Simson Garfinkel",
  journal="IEEE Security and Privacy",
  publisher={IEEE Computer Society},
}


%%%%%
%%%%% 2003
%%%%%
                  
@misc{garfinkel:massive2003,
  title="Massively Multiplayer Games As a Source of Terrorist Simulant Data",
  author="Simson L. Garfinkel",
  month=Aug,
  year=2003,
  url="http://simson.net/clips/academic/2003.MIT.MMOPG8.pdf"
}

@article{garfinkel:leaderless,
  title="Leaderless Resistance Today",
  author="Simson Garfinkel",
  journal="First Monday",
  publisher="University of Illinois at Chicago",
  volume=8,
  number=3,
  year=2003,
  month=Mar
}


@article{garfinkel:ebia,
	Author = {Simson L. Garfinkel},
	Issue = {6},
	Journal = {IEEE Security \& Privacy},
	Month = {Nov/Dec},
	Pages = {20-26},
	Publisher = {IEEE},
	Title = {Email-Based Identification and Authentication: An Alternative to {PKI}?},
	Volume = {1},
	Year = 2003}

@inproceedings{garfinkel:sow2003,
	Author = {Min Wu and Simson Garfinkel and Robert Millerller},
	Booktitle = {Proceedings of the MIT Student Oxygen Workshop},
	Publisher = {MIT Computer Science and Artificial Intelligence Laboratory},
	Title = {Secure Web Authentication with Mobile Phones},
	Year = 2003}

@misc{couhes1,
	Author = {Simson L. Garfinkel},
	month = Feb # " 2",
	Misc = {Application E570},
	Title = {Request for Exempt Review, 'Remembrance of Data
                  Passed' trace-back study, application to the {MIT}
                  Committee on the Use of Humans as Experimental
                  Subjects}, 
	Year = {2003}}

@inproceedings{garfinkel:dgo,
	Author = {Simson L. Garfinkel},
	Booktitle = {The 2003 National Conference on Digital Government Research},
	Publisher = {National Science Foundation},
	Title = {Enabling Email Confidentiality through the use of Opportunistic Encryption},
	Year = {2003},
	url = {http://www.digitalgovernment.org/dgrc/dgo2003/cdrom/PAPERS/citsprivacy/garfinkel.pdf}}


@misc{garfinkel:proposal,
	Author = {Simson Garfinkel},
	Author_A = {Simson L. Garfinkel},
	Month = {October},
	Title = {Usable Security: Design Principles for Creating Systems that are Simultaneously Usable and Secure},
	Year = 2003}

%%%%%
%%%%% 2002
%%%%%

@book{garfinkel:puis3,
 title="Practical UNIX and Internet Security, 3rd Edition",
 author="Simson Garfinkel and Gene Spafford and Alan Schwartz",
 year=2003,
 publisher="O'Reilly \& Associates"
}

@book{garfinkel:cocoa-book,
 title="Building Cocoa Applications",
 author="Simson Garfinkel and Michael K. Mahoney",
 year=2002,
 publisher="O'Reilly \& Associates"
}




@inproceedings{garfinkel:bill,
	Author = {Simson L. Garfinkel},
	Booktitle = {Privacy workshop},
	Address = {Gotenborg, Sweeden},
	Month = Sep # { 29},
	Title = {Adopting Fair Information Practices to Low Cost {RFID} Systems},
        publisher="UBUCOMP 2002",
	Year = {2002}}

@article{garfinkel:remembrance,
	Author = {Simson Garfinkel and Abhi Shelat},
	Author_A = {Simson L. Garfinkel and Abhi Shelat},
	Journal = {{IEEE} Security and Privacy},
	Month = Jan,
	Publisher = {IEEE},
       number=1,
        volume=1,
       pages="17--27",
	Title = {Remembrance of Data Passed},
	Year = {2003}}

@article{garfinkel:magic-box-review,
 author="Simson Garfinkel",
 journal="The Christian Science Monitor",
 publisher="The Christian Science Publishing Society",
 title="Voices through the air",
 year=2003,
 month=Sep # " 3",
 note="Review of Marconi's Magic Box, by Gavin Weightman",
 url="http://www.csmonitor.com/2003/0925/p20s02-bogn.html"
}

@article{garfinkel:mitnick-review,
 author="Simson Garfinkel",
 journal="The Christian Science Monitor",
 publisher="The Christian Science Publishing Society",
 year=2002,
 title="World's greatest computer hacker raises alarm",
 url="http://www.csmonitor.com/2002/1003/p15s02-bogn.html",
 month=Oct # " 3",
 note="Review of The Art of Deception, by Kevin Mitnick"
}

@article{garfinkel:linked-review,
 title="Networking: It's not just for parties anymore",
 year=2002,
 month=Jun # " 6",
 journal="The Christian Science Monitor",
 publisher="The Christian Science Publishing Society",
 note="Review of Linked, by Albert-Laszlo Barabasi",
 url="http://www.csmonitor.com/2002/0606/p17s01-bogn.html"
}


@book{garfinkel:wspc,
	Author = {Simson Garfinkel and Gene Spafford},
	Publisher = {O'Reilly \& Associates},
	Title = {Web Security, Privacy \& Commerce},
	Year = 2002}

@article{garfinkel:payne,
	Author = {Simson L. Garfinkel},
	Journal = {Technology Review},
	Month = Feb # { 27},
	Title = {The Documents in the Case},
	Url = {http://www.technologyreview.com/Infotech/11925/},
	Year = 2002,
	url = {http://www.technologyreview.com/Infotech/11925/}}

@article{garfinkel:password-interception,
  title="The Ethics of Interception",
  year=2002,
  journal="Password",
  publisher="ISSA",
  url="http://simson.net/clips/2002/2002.Password.Interception.pdf",
  author="Simson Garfinkel"
}                  

%%%%%
%%%%% 2000
%%%%%


@article{garfinkel:icsa-privacy,
  author="Simson L. Garfinkel",
  journal="Information Security",
  publisher="TrueSecure Corp.",
  title="Privacy, Please: Online services need to realize that possession of customer information does not imply permission to do with it what they want.",
  year=2000,
  url="http://simson.net/clips/2000/2000.ICSA.PrivacyPlease.htm"
}                  

@book{garfinkel:dbn,
	Author = {Simson L. Garfinkel},
	Publisher = {O'Reilly \& Associates},
	Title = {Database Nation},
	Year = 2000}

%%%%%
%%%%% 1999
%%%%%

@book{garfinkel:architects-book,
 title="Architects of the Information Society",
 author="Simson L. Garfinkel and {Hal Abelson, editor}",
 year=1999,
 publisher="MIT Press"
}
                  

@inproceedings{cunningham:id99,
	Author = {Robert Cunningham and  Richard P. Lippmann and David J. Fried and Simson L. Garfinkel and Isaac Graf and Kris R. Kendall and Seth E. Webster and Dan Wyschogrod and Marc A. Zissman},
	Booktitle = {Proc. of the SANS Third Conference and Workshop on Intrusion Detection and Response},
        publisher="SANS",
	Address = {San Diego, CA},
	Title = {Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 {DARPA} Intrusion Detection Evaluation},
	Year = 1999}

@inproceedings{lippmann:id99,
	Author = {Richard P. Lippmann and Robert Cunningham and  David J. Fried and Simson L. Garfinkel and Andrew Seth Gorton and Isaac Graf and Kris R. Kendall and D. J. McClung and Daniel S. Weber and Seth E. Webster and Dan Wyschogrod and Marc A. Zissman},
	Booktitle = {First International Workshop on Recent Advances in Intrusion Detection},
	Address = {Louvain-la-Neuve, Belgium},
	Year = 1998,
        publisher="RAID Symposium",
     title="The 1998 {DARPA/AFRL} Off-Line Intrusion Detection Evaluation"
}


%%%%% 1998
@book{garfinkel:stopping-spam,
  title="Stopping Spam",
  author="Simson Garfinkel and Alan Schwartz",
 year=1998,
 publisher="O'Reilly \& Associates"
}
                  

%%%%% 1997
                  
@book{garfinkel:wsc-book,
 title="Web Security and Commerce",
 author="Simson Garfinkel and Gene Spafford",
 year=1997,
 publisher="O'Reilly \& Associates"
}

%%%%% 1996
                  
@book{garfinkel:puis2,
 title="Practical UNIX and Internet Security",
 author="Simson Garfinkel and Gene Spafford",
 year= 1996,
 publisher="O'Reilly \& Associates"
}

@article{garfinkel:ieee-pki,
 author="Simson Garfinkel",                   
 title="Public Key Cryptography",
 journal="IEEE Computer",
 publisher="IEEE",
 Volume=29,
 Number=6,
 month=Jun,
  year=1996,
 pages="101--104"}

@article{garfinkel:takedown-review,
 url="http://www.csmonitor.com/1996/0104/04132.html",
 title="Making an Arrest in Cyberspace",
 author="Simson L. Garfinkel",
 journal="The Christian Science Monitor",
 publisher="The Christian Science Publishing Society",
 year=1996,
 month=Jan # " 4",
 note="Review of Takedown, by Tsutomu Shimomura with John Markoff"
}

@article{garfinkel:fugitive-review,
 author="Simson Garfinkel",
 title="Cybercrime Fingers Larger Issue of Privacy",
 journal="The Christian Science Monitor",
 publisher="The Christian Science Publishing Society",
 year=1996,
 month=Apr # " 30",
 note="Review of The Fugitive Game: Online with Kevin Mitnick, by Jonathan Littman",
 url="http://simson.net/clips/1996/96.CSM.FugitiveGame.pdf"
}
                  
@inproceedings{garfinkel:spie1996,
  author="Simson L. Garfinkel",
  title="Is there a future in privacy: encryption and digital signatures",
  year=1996,
  month=Mar,
  pages=14,
  booktitle="SPIE 2616, Information Protection and Network Security"
}
  

%%%%%
%%%%% 1995
%%%%%

@article{garfinkel:fatal-defect-review,
 author={Simson L. Garfinkel},
 title="Computer Mishaps Lead to Search for Failsafe Software",
 year=1995,
 month=Jul # " 27",
 note="Review of Fatal Defect: Chasing Killer Computer Bugs, by Ivars Peterson",
 journal="The Christian Science Monitor",
 publisher="The Christian Science Publishing Society",
 url="http://www.csmonitor.com/1995/0727/27b32.html"
}                  

@article{garfinkel:being-digital-review,
	author={{Simson L. Garfinkel}},
	journal={{Christian Science Monitor}},
	title={{Life is about more than `Being Digital'}},
         note="Review of Being Digital, by Nicholas Negroponte",
      month=Mar # " 15",
	url="http://simson.net/clips/1995/95.CSM.BeingDigital.pdf",
	year={{1995}}
}

                  
@article{garfinkel:good-benito-review,
        publisher="Christian Science Publishing Society",
	author={{Simson L. Garfinkel}},
	journal={{Christian Science Monitor}},
       title="Insiders' Science Novel Slips Into Stereotypes",
	note="Review of Good Benito, by Alan Lightman",
	url="http://simson.net/clips/1995/95.CSM.GoodBenito.pdf",
     month=Jan,
	year={{1995}}
}


@article{garfinkel:risks-of-ssns,
	Address = {New York, NY},
	Author = {Simson L. Garfinkel},
	Doi = {http://doi.acm.org/10.1145/226239.226269},
	Journal = {Commun. of the ACM},
	Number = {10},
	Pages = {146},
	Publisher = {ACM Press},
	Title = {Risks of social security numbers},
	Volume = {38},
	Year = {1995},
        url="http://simson.net/clips/1995/95.ACM.SSN.pdf"
}

@article{garfinkel:manchurian-printer,
 title="The Manchurian Printer",
 author="Simson L. Garfinkel",
 year=1995,
 month=Mar,
 day=5,
 page="B3",
 journal="The Boston Globe",
 publisher="The Boston Globe Company"
}                  

@article{garfinkel:aohell,
 author={{Simson L. Garfinkel}},
 journal="The Boston Globe",
 year=1995,
 month=Apr # " 21",
 title="Illegal program troubles America Online",
 url="http://simson.net/clips/1995/95.Globe.AOHell.pdf"
}

%%%%%
%%%%% 1994
%%%%%

@book{garfinkel:pgp,
	Author = {Simson Garfinkel},
	Author_A = {Simson L. Garfinkel},
	Publisher = {O'Reilly \& Associates},
	Title = {{PGP}: Pretty Good Privacy},
	Year = {1994}}

@book{garfinkel:ugh,
 title="The UNIX-Haters Handbook",
 editor="Simson Garfinkel and Daniel Weise and Steven Strassmann",
 year=1994,
 publisher="IDG Press"
}

@article{garfinkel:stalin-review,
	author={{Simson L. Garfinkel}},
	journal={{Christian Science Monitor}},
        title="Stalin's Collision Course with 20th-Century Technology",
	note={{Review of The Ghost of the Executred Engineer: Technology and the fall of the Soviet Union, by Loren R. Graham}},
        publisher="Christian Science Publishing Society",
	url="http://simson.net/clips/1993/1993.CSM.Stalin_Technology.pdf",
	year={{1993}}
}

%%%% 1992
                  
@book{garfinkel:nextstep,
 title="NeXTSTEP Programming: STEP ONE: Object-Oriented Applications",
 author="Simson Garfinkel and Michael Mahoney",
 year=1992,
 publisher="Springer-Verlag"
}
                  
@article{garfinkel:cacm-patents,
  author="Richard Stallman and Simson Garfinkel",
 title="Against Software Patents", 
 journal="Commun. of the ACM",
 Volume=35,
 Number=1,
 month=Jan,
  year=1992,
 pages="17--22, 121",
 publisher={ACM}
}

@article{garfinkel:impure-science-review,
	author={{Simson L. Garfinkel}},
	journal={{Christian Science Monitor}},
	title={{When Fraud Taints Science}},
        publisher="Christian Science Publishing Society",
note="Review of Impure Science: Fraud, Compromise and Political Influence in Scientifc Research, by Robert Bell",
month=Jul,
	url="http://simson.net/clips/1992/1992.CSM.Scientific_Fraud.pdf",
	year={{1992}}
}

@article{garfinkel:data-fusion,
 title="Information of the World Unite! (Data Fusion)",
 journal="Scientific American", 
 author="Simson Garfinkel",
 publisher="Nature Publishing Group",
 month=Sep,
 year=2008
}                  


@article{garfinkel:hacker-crackdown-review,
	author={{Simson L. Garfinkel}},
	journal={{Christian Science Monitor}},
      title="Hunting Computer Hackers",
       month=Dec,
	note={{Review of The Hacker Crackdown: Law and Disorder on the Electronic Frontier, by Bruce Sterling}},
        publisher="Christian Science Publishing Society",
	url="http://simson.net/clips/1992/1992.CSM.Hacker_Crackdown.pdf",
	year={{1992}}
}

@article{garfinkel:artificial-life-review,
	author={{Simson L. Garfinkel}},
        publisher="Christian Science Publishing Society",
	journal={{Christian Science Monitor}},
	title={{Virtual `life' Evolves in the Lab}},
month=Aug # " 19",
note="Review of Artificial Life: The Quest for A New Creation, by Steven Levy",
	url="http://simson.net/clips/1992/1992.CSM.Virtual_Life.pdf",
	year={{1992}}
}


@book{sbook,
 title="SBook: Simson Garfinkel's Address Book, Version 2.0",
 year=1992,
 url="http://simson.net/ref/1992/SBook20.pdf",
 publisher="Simson Garfinkel and Associates"
}

                  
%%%%%
%%%%% 1991
%%%%%

@article{garfinkel:ist-patents,
 author="Simson L. Garfinkel and Richard M. Stallman and Mitchell Kapor",
 title="Why Patents Are Bad for Software",
 journal="Issues in Science and Technology",
 year=1991,
 issue="Fall",
 url="http://simson.net/clips/1991/1991.IST.Patents.pdf",
  publisher="National Academies Press",
 note="Issues in Science and Technology is a forum for discussion of public policy related to science, engineering, and medicine."
}                  

@article{garfinkel:cyberpunk-review,
	author={{Simson L. Garfinkel}},
	journal={{Christian Science Monitor}},
	title={{Computer Punks and `Cyberspace'}},
	url="http://simson.net/clips/1991/1991.CSM.CypherpunkReview.pdf",
        publisher="Christian Science Publishing Society",
       note="Cyberpunk: Outlaws and Hackers on the Computer Frontier, by Katie Hafner and John Markoff, and Virtual Reality, by Howard Rheingold",
 month=Aug # " 21",
	year={{1991}}
}

                  
@article{garfinkel:uncertainity-review,
	author={{Simson L. Garfinkel}},
	journal={{Christian Science Monitor}},
	title={{The Man Who Tried to Build Hitler's Bomb}},
        publisher="Christian Science Publishing Society",
        note="Review of Uncertainity: The Life and Science of Werner Heisenberg, by David C. Cassidy",
	url="http://simson.net/clips/1991/1991.CSM.Heisenberg_Book.pdf",
 month=Feb,
	year={{1991}}
}


@article{garfinkel:lonley-hearts-review,
        publisher="Christian Science Publishing Society",
	author={{Simson L. Garfinkel}},
	journal={{Christian Science Monitor}},
title="Stargazers: The World of astronomy is viewed through its stellar scientists",
 month=Mar,
	note={{Review of Lonley Hearts of the Cosmos, by Dennis Overbye}},
	url="http://simson.net/clips/1991/1991.CSM.Lonley_Hearts_of_the_Cosmos.pdf",
	year={{1991}}
}

@article{garfinkel:ramanujan-review,
 author="Simson L. Garfinkel",
 journal="The Christian Science Monitor",
 publisher="The Christian Science Publishing Society",
 title="Moving Story of a Mathematical Magician",
 note="Review of The Man Who Knew Infinity: A Life of the Genius Ramanujan, by Robert Kanigel",
 year=1991,
 month=Jun # " 26",
 url="http://simson.net/clips/1991/1991.CSM.Man_who_knew_infinity.pdf"
}


@article{garfinkel:hermes-review,
	author={{Simson L. Garfinkel}},
	journal={{Christian Science Monitor}},
        publisher="Christian Science Publishing Society",
	title={{`Artificial Intelligence' Solves a Mastery}},
 month=Jan # " 16",
note="Review of Hermes and the Golden Thinking Machine, by Alexander Tzonis",
	url="http://simson.net/clips/1991/1991.CSM.Artificial-Intelligence.pdf",
	year={{1991}}
}

@article{garfinkel:lessons-review,
	author={{Simson L. Garfinkel}},
	journal={{Christian Science Monitor}},
        publisher="Christian Science Publishing Society",
	title={{Computer Lessons for Kids Taught by Kermit the Frog}},
	url="http://simson.net/clips/1991/1991.CSM.Computer-Lessons.pdf",
         note="Review of Kermit Learns how Computers Work, by Margy Kuntz, and Kermit Lerans Windows, by Kathleen Resnick",
	year={{1991}}
}

                  
@article{garfinkel:wofs,
	Author = {Simson L. Garfinkel},
	Author_A = {Simson L. Garfinkel},
	Issue = 1,
	Journal = {Dr. Dobb's Journal},
	Month = {January},
	Pages = {78--88},
	Title = {Designing a Write-Once File System},
        publisher={CMP Media},
	Volume = 16,
	Year = 1991}

@book{garfinkel:91,
	Author = {Simson Garfinkel and Gene Spafford},
	Author_A = {Simson L. Garfinkel and Eugene H. Spafford},
	Publisher = {O'Reilly \& Associates},
	Title = {Practical {UNIX} Security},
	Year = {1991}}

@article{garfinkel:technobabble-review,
 author="Simson L. Garfinkel",
 title="Scaling the High-Tech Tower of Babble",
 month=Nov # " 13",
 year=1991,
 journal="The Christian Science Monitor",
 publisher="The Christian Science Publishing Society",
 url="http://simson.net/clips/1991/1991.CSM.Techno_Babble.pdf",
 note="Review of Technobabble, by John A. Barry"
}

%%%%% 1990                  

@article{garfinkel:cacm-copyright,
 title="Against User Interface Copyright",
 author = {Stallman, Richard and Garfinkel, Simson},
 journal = {Commun. ACM},
 issue_date = {Nov. 1990},
 volume = {33},
 number = {11},
 month = nov,
 year = {1990},
 issn = {0001-0782},
 pages = {15--18},
 numpages = {4},
 url = {http://doi.acm.org/10.1145/92755.316119},
 doi = {10.1145/92755.316119},
 acmid = {316119},
 publisher = {ACM},
 address = {New York, NY},
}
                  
                  
%%%%%
%%%%% 1989
%%%%%

@article{garfinkel:optical-drives,
	Author = {Simson L. Garfinkel},
	Journal = {MIPS Magazine},
	Title = {Optical Drives for {MS-DOS}: Write-once and erasable optical disk drives provide vast storage on removable media},
	Year = 1989}

@article{garfinkel:aids-and-soundex,
  journal="IRB",
  year=1988,
  url="http://simson.net/clips/1988/1988.IRB.Aids_and_Soundex.pdf",
  title="{AIDS} and the {Soundex} Code",
  author="Simson L. Garfinkel",
  pages=8,
  publisher="The Hastings Center",
  address="Garrison, NY"
}                  

%%%%%
%%%%% 1988
%%%%%

@article{garfinkel:cognizers-review,
   author={Simson L. Garfinkel},
   journal={Christian Science Monitor},
   publisher="The Christian Science Publishing Society",
   title={Computers that work like brains: flawed account of neural networks},
   url="http://simson.net/clips/1988/1988.CSM.Cognizers.pdf",
   year=1988,
   month=Dec # " 21"
}
                  


%%%%%
%%%%% 1987
%%%%%

@techreport{garfinkel:wofs-brown,
  author="Simson L. Garfinkel",
  institution="IRIS Project, Brown University",
  url="http://simson.net/clips/academic/1987.Brown.WOFS.pdf",
  title="The Story of the Write Once File System",
  year=1987,
}

@article{garfinkel:email89,
	author={{Simson L. Garfinkel}},
	journal={{The Practical Lawyer}},
	title={{Use Email for Efficiency}},
	url="http://simson.net/clips/1989.PracticalLawyer.Email.pdf",
  volume=35,
   issue = 1,
           publisher="ALI/ABA",
	year={{1989}}
}

@article{garfinkel:security87,
	Author = {Simson Garfinkel},
	Issue = {6},
	Journal = {The Practical Lawyer},
	Pages = {39--54},
	Title = {An Introduction to Computer Security (Part 1)},
	Volume = {33},
       month=Sep,
       publisher="ALI/ABA",
	Year = {1987}}

@article{garfinkel:security87b,
	Author = {Simson Garfinkel},
	Issue = {7},
	Journal = {The Practical Lawyer},
	Pages = {37--67},
	Title = {An Introduction to Computer Security (Part 2)},
	Volume = {33},
       month=Oct,
	Year = {1987},
                  publisher="ALI/ABA"
}

%%%%%
%%%%% 1985
%%%%%
                  

@techreport{garfinkel:cdfs,
	Author = {Simson L. Garfinkel and J. Spencer Love},
	Month = {October},
	Institution = {MIT Media Laboratory},
       address="Cambridge, MA",
	Title = {A File System for Write-Once Media},
	Year = 1985}


@article{garfinkel:life83,
 month=Jun,
 volume=8,
 number=6,
 journal="Dr. Dobb's Journal",
 author="Simson L. Garfinkel",
 pages="42--51",
 title="The Game of Life on the IBM-PC",
 publisher={CMP Media},
 year=1983
}
                  
@incollection{iapp-encryption,
 author="Simson L. Garfinkel",
 title="Encryption and Other Technologies",
 booktitle="Introduction to IT Privacy: A Handbook for Technologists",
 editor="Travis Breaux",
 publisher="International Association of Privacy Professionals",
 year=2014
}

@incollection{rowe-book,
  booktitle={Challenges in Monitoring Cyberarms Compliance},
  title="Conflict and Cooperation in Cyberspace: The Challenge to National Security",
  author="Neil C. Rowe and Simson L. Garfinkel and Robert Beverly and Panayotis Yannakogeorgos",
  year=2010,
  pages = "81--100",
 publisher="Taylor \& Francis"
}
                  

                  
# LocalWords:  techreport De Simson Garfinkel theofanos cac Yee Choong
# LocalWords:  IEEE inproceedings pridgen hicss JVM WG
# LocalWords:  HotSpot Wallach booktitle Waikoloa Proc
# LocalWords:  garfinkel hashdb McCarrin DFRWS arate
# LocalWords:  Ramaswamy Chandramouli NISTIR NIST IFIP
# LocalWords:  Zarate Aubin Hefferman Horras Gorak Wi
# LocalWords:  Lipford Claypool Lextures FI doi ISSN
# LocalWords:  NPS Heffernan url Monterey TCP tcpflow
# LocalWords:  Shick Sep ieee hst Lishu Liu Maasberg
# LocalWords:  Waltham Datasets monthfiled dayfiled
# LocalWords:  yearfile american rowe Riqui Schwamm
# LocalWords:  Elsevier cacm cybersecurity Commun ACM
# LocalWords:  unicode login Usenix fairbanks ADFSL
# LocalWords:  differencing dfxml
#