Search the dblp DataBase
Aviel D. Rubin :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Aviel D. Rubin , Daniel E. Geer Jr. A Survey of Web Security. [Citation Graph (1, 0)][DBLP ] IEEE Computer, 1998, v:31, n:9, pp:34-41 [Journal ] Aviel D. Rubin , Dan Boneh , Kevin Fu Revocation of Unread E-mail in an Untrusted Network. [Citation Graph (0, 0)][DBLP ] ACISP, 1997, pp:62-75 [Conf ] Sujata Doshi , Fabian Monrose , Aviel D. Rubin Efficient Memory Bound Puzzles Using Pattern Databases. [Citation Graph (0, 0)][DBLP ] ACNS, 2006, pp:98-113 [Conf ] William Aiello , Aviel D. Rubin , Martin Strauss Using Smartcards to Secure a Personalized Gambling Device. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1999, pp:128-137 [Conf ] Fabian Monrose , Aviel D. Rubin Authentication via Keystroke Dynamics. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1997, pp:48-56 [Conf ] Aviel D. Rubin , Peter Honeyman Nonmonotonic Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 1994, pp:100-116 [Conf ] Victor Shoup , Aviel D. Rubin Session Key Distribution Using Smart Cards. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1996, pp:321-331 [Conf ] Zachary N. J. Peterson , Randal C. Burns , Joe Herring , Adam Stubblefield , Aviel D. Rubin Secure Deletion for a Versioning File System. [Citation Graph (0, 0)][DBLP ] FAST, 2005, pp:- [Conf ] Ed Gerck , C. Andrew Neff , Ronald L. Rivest , Aviel D. Rubin , Moti Yung The Business of Electronic Voting. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2001, pp:234-259 [Conf ] Patrick Drew McDaniel , Aviel D. Rubin A Response to ''Can We Eliminate Certificate Revocation Lists?''. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:245-258 [Conf ] Aviel D. Rubin , Rebecca N. Wright Off-Line Generation of Limited-Use Credit Card Numbers. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2001, pp:187-200 [Conf ] Aviel D. Rubin Extending NCP for protocols using public keys. [Citation Graph (0, 0)][DBLP ] ICCCN, 1995, pp:94- [Conf ] Aviel D. Rubin , Bertram C. Bruce From Conversations to Stories: An Analysis of Differences Between Oral and Written Language Comprehension. [Citation Graph (0, 0)][DBLP ] IJCAI, 1977, pp:141- [Conf ] Will Ivancic , David Wagner , Aviel D. Rubin , Paul Ratazzi , James P. G. Sterbenz Securing Wireless and Mobile Networks - Is It Possible? [Citation Graph (0, 0)][DBLP ] INFOCOM, 2002, pp:- [Conf ] Sophie Y. Qiu , Patrick Drew McDaniel , Fabian Monrose , Aviel D. Rubin Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing. [Citation Graph (0, 0)][DBLP ] ISCC, 2006, pp:489-496 [Conf ] Aviel D. Rubin Security for E-Voting in Public Elections. [Citation Graph (0, 0)][DBLP ] LISA, 2001, pp:- [Conf ] Geoffrey Goodell , William Aiello , Timothy Griffin , John Ioannidis , Patrick Drew McDaniel , Aviel D. Rubin Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] David M. Martin Jr. , Sivaramakrishnan Rajagopalan , Aviel D. Rubin Blocking Java Applets at the Firewall. [Citation Graph (0, 0)][DBLP ] NDSS, 1997, pp:- [Conf ] Fabian Monrose , Peter Wyckoff , Aviel D. Rubin Distributed Execution with Remote Audit. [Citation Graph (0, 0)][DBLP ] NDSS, 1999, pp:- [Conf ] Christian Gilmore , David P. Kormann , Aviel D. Rubin Secure Remote Access to an Internal Web Server. [Citation Graph (0, 0)][DBLP ] NDSS, 1999, pp:- [Conf ] Adam Stubblefield , John Ioannidis , Aviel D. Rubin Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. [Citation Graph (0, 0)][DBLP ] NDSS, 2002, pp:- [Conf ] Tadayoshi Kohno , Adam Stubblefield , Aviel D. Rubin , Dan S. Wallach Analysis of an Electronic Voting System. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:27-0 [Conf ] Matt Blaze , John Ioannidis , Angelos D. Keromytis , Tal Malkin , Aviel D. Rubin WAR: Wireless Anonymous Routing. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:218-232 [Conf ] Simon Byers , Aviel D. Rubin , David P. Kormann Defending against an Internet-based attack on the physical world. [Citation Graph (0, 0)][DBLP ] WPES, 2002, pp:11-18 [Conf ] David Jefferson , Aviel D. Rubin , Barbara Simons , David Wagner Analyzing internet voting security. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:10, pp:59-64 [Journal ] Michael K. Reiter , Aviel D. Rubin Anonymous Web Transactions with Crowds. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:2, pp:32-38 [Journal ] Aviel D. Rubin Security considerations for remote electronic voting. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2002, v:45, n:12, pp:39-44 [Journal ] Aviel D. Rubin Introduction. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2003, v:46, n:5, pp:28-30 [Journal ] Poorvi L. Vora , Ben Adida , Ren Bucholz , David Chaum , David L. Dill , David Jefferson , Douglas W. Jones , William Lattin , Aviel D. Rubin , Michael I. Shamos , Moti Yung Evaluation of voting systems. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:11, pp:144- [Journal ] Stephen Bono , Aviel D. Rubin , Adam Stubblefield , Matthew Green Security through legality. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:41-43 [Journal ] David P. Kormann , Aviel D. Rubin Risks of the Passport single signon protocol. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2000, v:33, n:1-6, pp:51-58 [Journal ] Patrick Drew McDaniel , Aviel D. Rubin Web security. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2005, v:48, n:5, pp:697-699 [Journal ] Aviel D. Rubin Secure Distribution of Electronic Documents in a Hostile Environment. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1995, v:18, n:6, pp:429-434 [Journal ] Simon S. Y. Shim , Li Gong , Aviel D. Rubin , Linley Gwennap Guest Editors' Introduction: Securing the High-Speed Internet. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2004, v:37, n:6, pp:33-35 [Journal ] Aviel D. Rubin Security Considerations for Remote Electronic Voting over the Internet [Citation Graph (0, 0)][DBLP ] CoRR, 2001, v:0, n:, pp:- [Journal ] Aviel D. Rubin Independent One-Time Passwords. [Citation Graph (0, 0)][DBLP ] Computing Systems, 1996, v:9, n:1, pp:15-27 [Journal ] Aviel D. Rubin Response: Independent One-Time Passwords. [Citation Graph (0, 0)][DBLP ] Computing Systems, 1996, v:9, n:3, pp:257- [Journal ] Adam Stubblefield , Aviel D. Rubin , Dan S. Wallach Managing the Performance Impact of Web Security. [Citation Graph (0, 0)][DBLP ] Electronic Commerce Research, 2005, v:5, n:1, pp:99-116 [Journal ] David L. Dill , Aviel D. Rubin Guest Editors' Introduction: E-Voting Security. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:1, pp:22-23 [Journal ] Aviel D. Rubin , Daniel E. Geer Jr. Mobile Code Security. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 1998, v:2, n:6, pp:30-34 [Journal ] Aviel D. Rubin Extending NCP for Protocols Using Public Keys. [Citation Graph (0, 0)][DBLP ] MONET, 1997, v:2, n:3, pp:227-241 [Journal ] Michael K. Reiter , Aviel D. Rubin Crowds: Anonymity for Web Transactions. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1998, v:1, n:1, pp:66-92 [Journal ] Adam Stubblefield , John Ioannidis , Aviel D. Rubin A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:319-332 [Journal ] Simon Byers , Aviel D. Rubin , David P. Kormann Defending against an Internet-based attack on the physical world. [Citation Graph (0, 0)][DBLP ] ACM Trans. Internet Techn., 2004, v:4, n:3, pp:239-254 [Journal ] Marc Waldman , Aviel D. Rubin , Lorrie Faith Cranor The architecture of robust publishing systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Internet Techn., 2001, v:1, n:2, pp:199-230 [Journal ] Fabian Monrose , Aviel D. Rubin Keystroke dynamics as a biometric for authentication. [Citation Graph (0, 0)][DBLP ] Future Generation Comp. Syst., 2000, v:16, n:4, pp:351-359 [Journal ] An independent audit framework for software dependent voting systems. [Citation Graph (, )][DBLP ] Coercion Resistant End-to-end Voting. [Citation Graph (, )][DBLP ] Designing for Audit: A Voting Machine with a Tiny TCB. [Citation Graph (, )][DBLP ] Secure Execution of Java Applets using a Remote Playground. [Citation Graph (, )][DBLP ] Search in 0.009secs, Finished in 0.013secs