Search the dblp DataBase
Steven M. Bellovin :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Steven M. Bellovin A Look Back at "Security Problems in the TCP/IP Protocol Suite". [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:229-249 [Conf ] William Aiello , Steven M. Bellovin , Matt Blaze , John Ioannidis , Omer Reingold , Ran Canetti , Angelos D. Keromytis Efficient, DoS-resistant, secure key exchange for internet protocols. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:48-58 [Conf ] Steven M. Bellovin , Michael Merritt Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:244-250 [Conf ] Sotiris Ioannidis , Angelos D. Keromytis , Steven M. Bellovin , Jonathan M. Smith Implementing a distributed firewall. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:190-199 [Conf ] Steven M. Bellovin Cryptography and the Internet. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:46-55 [Conf ] Carl E. Landwehr , Steven M. Bellovin Intrusion Tolerant Systems Workshop. [Citation Graph (0, 0)][DBLP ] DSN, 2002, pp:785-786 [Conf ] Steven M. Bellovin A technique for counting natted hosts. [Citation Graph (0, 0)][DBLP ] Internet Measurement Workshop, 2002, pp:267-272 [Conf ] John S. Denker , Steven M. Bellovin , Hugh Daniel , Nancy L. Mintz , Tom Killian , Mark Plotnick Moat: a Virtual Private Network Appliance and Services Platform. [Citation Graph (0, 0)][DBLP ] LISA, 1999, pp:251-260 [Conf ] Steven M. Bellovin Security Risks Of Peer-To-Peer Networking. [Citation Graph (0, 0)][DBLP ] NDSS, 2001, pp:- [Conf ] Steven M. Bellovin Probable Plaintext Cryptanalysis of the IP Security Protocols. [Citation Graph (0, 0)][DBLP ] NDSS, 1997, pp:- [Conf ] Steven M. Bellovin Why Do We Need More Research? [Citation Graph (0, 0)][DBLP ] NDSS, 1999, pp:- [Conf ] Steven M. Bellovin Transport-Friendly ESP. [Citation Graph (0, 0)][DBLP ] NDSS, 1999, pp:- [Conf ] Steven M. Bellovin , Eric Rescorla Deploying a New Hash Algorithm. [Citation Graph (0, 0)][DBLP ] NDSS, 2006, pp:- [Conf ] John Ioannidis , Steven M. Bellovin Implementing Pushback: Router-Based Defense Against DDoS Attacks. [Citation Graph (0, 0)][DBLP ] NDSS, 2002, pp:- [Conf ] William Aiello , Steven M. Bellovin , Matt Blaze , Ran Canetti , John Ioannidis , Angelos D. Keromytis , Omer Reingold Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2001, pp:27-39 [Conf ] Steven M. Bellovin , Michael Merritt Limitations of the Kerberos Authentication System. [Citation Graph (0, 0)][DBLP ] USENIX Winter, 1991, pp:253-268 [Conf ] Peter Honeyman , Steven M. Bellovin PATHALIAS or The Care and Feeding of Relative Addresses. [Citation Graph (0, 0)][DBLP ] USENIX Summer, 1986, pp:126-141 [Conf ] Sotiris Ioannidis , Steven M. Bellovin Building a Secure Web Browser. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, FREENIX Track, 2001, pp:127-134 [Conf ] Steven M. Bellovin Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2006, pp:- [Conf ] Steven M. Bellovin Privacy & Cryptography. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2006, pp:- [Conf ] Steven M. Bellovin Nuclear Weapons, Permissive Action Links, and the History of Public Key Cryptography. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:- [Conf ] Sotiris Ioannidis , Steven M. Bellovin , John Ioannidis , Angelos D. Keromytis , Jonathan M. Smith Design and Implementation of Virtual Private Services. [Citation Graph (0, 0)][DBLP ] WETICE, 2003, pp:269-274 [Conf ] Steven M. Bellovin Computer security - an end state? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:3, pp:131-132 [Journal ] Steven M. Bellovin Spamming, phishing, authentication, and privacy. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:12, pp:144- [Journal ] Steven M. Bellovin , Matt Blaze , Susan Landau The real national-security needs for VoIP. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:11, pp:120- [Journal ] Matt Blaze , Steven M. Bellovin Tapping on my network door. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2000, v:43, n:10, pp:136- [Journal ] Fred B. Schneider , Steven M. Bellovin Evolving Telephone Networks. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:1, pp:160- [Journal ] Steven M. Bellovin Virtual machines, virtual security? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:10, pp:104- [Journal ] Ratul Mahajan , Steven M. Bellovin , Sally Floyd , John Ioannidis , Vern Paxson , Scott Shenker Aggregate congestion control. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2002, v:32, n:1, pp:69- [Journal ] Ratul Mahajan , Steven M. Bellovin , Sally Floyd , John Ioannidis , Vern Paxson , Scott Shenker Controlling high bandwidth aggregates in the network. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2002, v:32, n:3, pp:62-73 [Journal ] Steven M. Bellovin Security and Privacy: Enemies or Allies? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:3, pp:92- [Journal ] Steven M. Bellovin Unconventional Wisdom. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2006, v:4, n:1, pp:88- [Journal ] Fred B. Schneider , Steven M. Bellovin , Alan S. Inouye Building Trustworthy Systems: Lessons from the PTN and Internet. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 1999, v:3, n:6, pp:64-72 [Journal ] William Aiello , Steven M. Bellovin , Matt Blaze , Ran Canetti , John Ioannidis , Angelos D. Keromytis , Omer Reingold Just fast keying: Key agreement in a hostile internet. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:242-273 [Journal ] Steven M. Bellovin , Michael Merritt An attack on the Interlock Protocol when used for authentication. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:273-0 [Journal ] Privacy-Preserving, Taxable Bank Accounts. [Citation Graph (, )][DBLP ] A Secure and Privacy-Preserving Targeted Ad-System. [Citation Graph (, )][DBLP ] Two-Person Control Administation: Preventing Administation Faults through Duplication. [Citation Graph (, )][DBLP ] RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies. [Citation Graph (, )][DBLP ] Reputation Systems for Anonymous Networks. [Citation Graph (, )][DBLP ] PAR: Payment for Anonymous Routing. [Citation Graph (, )][DBLP ] APOD: Anonymous Physical Object Delivery. [Citation Graph (, )][DBLP ] An Algebra for Integration and Analysis of Ponder2 Policies. [Citation Graph (, )][DBLP ] The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET. [Citation Graph (, )][DBLP ] Sub-operating systems: a new approach to application security. [Citation Graph (, )][DBLP ] An Anonymous Credit Card System. [Citation Graph (, )][DBLP ] Internal surveillance, external risks. [Citation Graph (, )][DBLP ] The physical world and the real world. [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.008secs