default search action
John Viega
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j20]Joanna F. DeFranco, Christopher S. Eagle, James Bret Michael, John Viega, Jeffrey M. Voas:
Hackathons 101. Computer 54(5): 65-69 (2021) - [j19]John Viega, James Bret Michael:
Struggling With Supply-Chain Security. Computer 54(7): 98-104 (2021) - 2020
- [j18]John Viega:
20 Years of Software Security. Computer 53(11): 75-78 (2020)
2010 – 2019
- 2014
- [c10]Yuanyuan Grace Zeng, David Coffey, John Viega:
How Vulnerable Are Unprotected Machines on the Internet? PAM 2014: 224-234 - 2012
- [j17]John Viega:
Cloud Security: Not a Problem. IEEE Secur. Priv. 10(4): 3 (2012) - [j16]John Viega, Hugh Thompson:
The State of Embedded-Device Security (Spoiler Alert: It's Bad). IEEE Secur. Priv. 10(5): 68-70 (2012) - [j15]John Viega:
Giving Back. IEEE Secur. Priv. 10(6): 3-4 (2012) - [j14]John Viega:
Ten Years On, How Are We Doing? (Spoiler Alert: We Have No Clue). IEEE Secur. Priv. 10(6): 13-16 (2012) - 2011
- [j13]John Viega:
Reality Check. IEEE Secur. Priv. 9(1): 3-4 (2011) - [j12]John Viega:
Ten Years of Trustworthy Computing: Lessons Learned. IEEE Secur. Priv. 9(5): 3-4 (2011) - 2010
- [j11]John Viega, Bret Michael:
Guest Editors' Introduction: Mobile Device Security. IEEE Secur. Priv. 8(2): 11-12 (2010)
2000 – 2009
- 2009
- [b4]John Viega:
The Myths of Security - What the Computer Security Industry Doesn't Want You to Know. O'Reilly 2009, ISBN 978-0-596-52302-2, pp. I-XIX, 1-238 - [b3]Andy Oram, John Viega:
Beautiful Security - Leading Security Experts Explain How They Think. O'Reilly 2009, ISBN 978-0-596-52748-8, pp. I-XV, 1-281 - [j10]John Viega:
Cloud Computing and the Common Man. Computer 42(8): 106-108 (2009) - 2006
- [j9]John Viega, Jeremy Epstein:
Why applying standards to Web services is not enough. IEEE Secur. Priv. 4(4): 25-31 (2006) - [i4]David A. McGrew, John Viega:
The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH. RFC 4543: 1-14 (2006) - 2005
- [j8]John Viega:
Security---problem solved? ACM Queue 3(5): 40-50 (2005) - [j7]John Viega:
Building security requirements with CLASP. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [c9]John Viega:
Building security requirements with CLASP. SESS@ICSE 2005: 1-7 - [i3]John Viega, David A. McGrew:
The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP). RFC 4106: 1-11 (2005) - 2004
- [j6]John Viega, Matt Messier:
Security is Harder than You Think. ACM Queue 2(5): 60-65 (2004) - [c8]Tadayoshi Kohno, John Viega, Doug Whiting:
CWC: A High-Performance Conventional Authenticated Encryption Mode. FSE 2004: 408-426 - [c7]David A. McGrew, John Viega:
The Security and Performance of the Galois/Counter Mode (GCM) of Operation. INDOCRYPT 2004: 343-355 - [i2]David A. McGrew, John Viega:
The Security and Performance of the Galois/Counter Mode of Operation (Full Version). IACR Cryptol. ePrint Arch. 2004: 193 (2004) - 2003
- [b2]John Viega, Matt Messier:
Secure programming cookbook for C and C++ - recipes for cryptography, authentication, networking, input validation and more. O'Reilly 2003, ISBN 978-0-596-00394-4, pp. I-XXV, 1-762 - [c6]John Viega:
Practical Random Number Generation in Software. ACSAC 2003: 129-140 - [c5]Crispin Cowan, Seth Arnold, Steve Beattie, Chris Wright, John Viega:
Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack. DISCEX (1) 2003: 120-129 - [i1]Tadayoshi Kohno, John Viega, Doug Whiting:
CWC: A high-performance conventional authenticated encryption mode. IACR Cryptol. ePrint Arch. 2003: 106 (2003) - 2002
- [b1]John Viega, Matt Messier, Pravir Chandra:
Network security using OpenSSL - cryptography for secure communications. O'Reilly 2002, ISBN 978-0-596-00270-1, pp. I-XIV, 1-367 - [j5]John Viega, J. T. Bloch, Tadayoshi Kohno, Gary McGraw:
Token-based scanning of source code for security problems. ACM Trans. Inf. Syst. Secur. 5(3): 238-261 (2002) - 2001
- [j4]John Viega, Tadayoshi Kohno, Bruce Potter:
Trust (and mistrust) in secure applications. Commun. ACM 44(2): 31-36 (2001) - 2000
- [j3]Roger T. Alexander, James M. Bieman, John Viega:
Coping with Java Programming Stress. Computer 33(4): 30-38 (2000) - [j2]John Viega, Tom Mutdosch, Gary McGraw, Edward W. Felten:
Statically Scanning Java Code: Finding Security Vulnerabilities. IEEE Softw. 17(5): 68-77 (2000) - [j1]John Viega, Jeffrey M. Voas:
Quality Time - Can Aspect-Oriented Programming Lead to More Reliable Software? IEEE Softw. 17(6): 19-21 (2000) - [c4]John Viega, J. T. Bloch, Y. Kohno, Gary McGraw:
ITS4: A Static Vulnerability Scanner for C and C++ Code. ACSAC 2000: 257- - [c3]John Viega, Paul Reynolds, Reimer Behrends:
Automating Delegation in Class-Based Languages. TOOLS (34) 2000: 171-
1990 – 1999
- 1998
- [c2]John Viega, Barry Warsaw, Ken Manheimer:
Mailman: The GNU Mailing List Manager. LISA 1998: 309-316 - 1996
- [c1]John Viega, Matthew Conway, George H. Williams, Randy F. Pausch:
3D Magic Lenses. ACM Symposium on User Interface Software and Technology 1996: 51-58
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint