The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Aviel D. Rubin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Aviel D. Rubin, Daniel E. Geer Jr.
    A Survey of Web Security. [Citation Graph (1, 0)][DBLP]
    IEEE Computer, 1998, v:31, n:9, pp:34-41 [Journal]
  2. Aviel D. Rubin, Dan Boneh, Kevin Fu
    Revocation of Unread E-mail in an Untrusted Network. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:62-75 [Conf]
  3. Sujata Doshi, Fabian Monrose, Aviel D. Rubin
    Efficient Memory Bound Puzzles Using Pattern Databases. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:98-113 [Conf]
  4. William Aiello, Aviel D. Rubin, Martin Strauss
    Using Smartcards to Secure a Personalized Gambling Device. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:128-137 [Conf]
  5. Fabian Monrose, Aviel D. Rubin
    Authentication via Keystroke Dynamics. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:48-56 [Conf]
  6. Aviel D. Rubin, Peter Honeyman
    Nonmonotonic Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1994, pp:100-116 [Conf]
  7. Victor Shoup, Aviel D. Rubin
    Session Key Distribution Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:321-331 [Conf]
  8. Zachary N. J. Peterson, Randal C. Burns, Joe Herring, Adam Stubblefield, Aviel D. Rubin
    Secure Deletion for a Versioning File System. [Citation Graph (0, 0)][DBLP]
    FAST, 2005, pp:- [Conf]
  9. Ed Gerck, C. Andrew Neff, Ronald L. Rivest, Aviel D. Rubin, Moti Yung
    The Business of Electronic Voting. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:234-259 [Conf]
  10. Patrick Drew McDaniel, Aviel D. Rubin
    A Response to ''Can We Eliminate Certificate Revocation Lists?''. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:245-258 [Conf]
  11. Aviel D. Rubin, Rebecca N. Wright
    Off-Line Generation of Limited-Use Credit Card Numbers. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:187-200 [Conf]
  12. Aviel D. Rubin
    Extending NCP for protocols using public keys. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1995, pp:94- [Conf]
  13. Aviel D. Rubin, Bertram C. Bruce
    From Conversations to Stories: An Analysis of Differences Between Oral and Written Language Comprehension. [Citation Graph (0, 0)][DBLP]
    IJCAI, 1977, pp:141- [Conf]
  14. Will Ivancic, David Wagner, Aviel D. Rubin, Paul Ratazzi, James P. G. Sterbenz
    Securing Wireless and Mobile Networks - Is It Possible? [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2002, pp:- [Conf]
  15. Sophie Y. Qiu, Patrick Drew McDaniel, Fabian Monrose, Aviel D. Rubin
    Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:489-496 [Conf]
  16. Aviel D. Rubin
    Security for E-Voting in Public Elections. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  17. Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick Drew McDaniel, Aviel D. Rubin
    Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  18. David M. Martin Jr., Sivaramakrishnan Rajagopalan, Aviel D. Rubin
    Blocking Java Applets at the Firewall. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
  19. Fabian Monrose, Peter Wyckoff, Aviel D. Rubin
    Distributed Execution with Remote Audit. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  20. Christian Gilmore, David P. Kormann, Aviel D. Rubin
    Secure Remote Access to an Internal Web Server. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  21. Adam Stubblefield, John Ioannidis, Aviel D. Rubin
    Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  22. Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach
    Analysis of an Electronic Voting System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:27-0 [Conf]
  23. Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin
    WAR: Wireless Anonymous Routing. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:218-232 [Conf]
  24. Simon Byers, Aviel D. Rubin, David P. Kormann
    Defending against an Internet-based attack on the physical world. [Citation Graph (0, 0)][DBLP]
    WPES, 2002, pp:11-18 [Conf]
  25. David Jefferson, Aviel D. Rubin, Barbara Simons, David Wagner
    Analyzing internet voting security. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:10, pp:59-64 [Journal]
  26. Michael K. Reiter, Aviel D. Rubin
    Anonymous Web Transactions with Crowds. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:32-38 [Journal]
  27. Aviel D. Rubin
    Security considerations for remote electronic voting. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2002, v:45, n:12, pp:39-44 [Journal]
  28. Aviel D. Rubin
    Introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:5, pp:28-30 [Journal]
  29. Poorvi L. Vora, Ben Adida, Ren Bucholz, David Chaum, David L. Dill, David Jefferson, Douglas W. Jones, William Lattin, Aviel D. Rubin, Michael I. Shamos, Moti Yung
    Evaluation of voting systems. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:11, pp:144- [Journal]
  30. Stephen Bono, Aviel D. Rubin, Adam Stubblefield, Matthew Green
    Security through legality. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:41-43 [Journal]
  31. David P. Kormann, Aviel D. Rubin
    Risks of the Passport single signon protocol. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:33, n:1-6, pp:51-58 [Journal]
  32. Patrick Drew McDaniel, Aviel D. Rubin
    Web security. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:5, pp:697-699 [Journal]
  33. Aviel D. Rubin
    Secure Distribution of Electronic Documents in a Hostile Environment. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1995, v:18, n:6, pp:429-434 [Journal]
  34. Simon S. Y. Shim, Li Gong, Aviel D. Rubin, Linley Gwennap
    Guest Editors' Introduction: Securing the High-Speed Internet. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:6, pp:33-35 [Journal]
  35. Aviel D. Rubin
    Security Considerations for Remote Electronic Voting over the Internet [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  36. Aviel D. Rubin
    Independent One-Time Passwords. [Citation Graph (0, 0)][DBLP]
    Computing Systems, 1996, v:9, n:1, pp:15-27 [Journal]
  37. Aviel D. Rubin
    Response: Independent One-Time Passwords. [Citation Graph (0, 0)][DBLP]
    Computing Systems, 1996, v:9, n:3, pp:257- [Journal]
  38. Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach
    Managing the Performance Impact of Web Security. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2005, v:5, n:1, pp:99-116 [Journal]
  39. David L. Dill, Aviel D. Rubin
    Guest Editors' Introduction: E-Voting Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:22-23 [Journal]
  40. Aviel D. Rubin, Daniel E. Geer Jr.
    Mobile Code Security. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:6, pp:30-34 [Journal]
  41. Aviel D. Rubin
    Extending NCP for Protocols Using Public Keys. [Citation Graph (0, 0)][DBLP]
    MONET, 1997, v:2, n:3, pp:227-241 [Journal]
  42. Michael K. Reiter, Aviel D. Rubin
    Crowds: Anonymity for Web Transactions. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1998, v:1, n:1, pp:66-92 [Journal]
  43. Adam Stubblefield, John Ioannidis, Aviel D. Rubin
    A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:319-332 [Journal]
  44. Simon Byers, Aviel D. Rubin, David P. Kormann
    Defending against an Internet-based attack on the physical world. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Internet Techn., 2004, v:4, n:3, pp:239-254 [Journal]
  45. Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor
    The architecture of robust publishing systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Internet Techn., 2001, v:1, n:2, pp:199-230 [Journal]
  46. Fabian Monrose, Aviel D. Rubin
    Keystroke dynamics as a biometric for authentication. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2000, v:16, n:4, pp:351-359 [Journal]

  47. An independent audit framework for software dependent voting systems. [Citation Graph (, )][DBLP]


  48. Coercion Resistant End-to-end Voting. [Citation Graph (, )][DBLP]


  49. Designing for Audit: A Voting Machine with a Tiny TCB. [Citation Graph (, )][DBLP]


  50. Secure Execution of Java Applets using a Remote Playground. [Citation Graph (, )][DBLP]


Search in 0.131secs, Finished in 0.133secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002