The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Steven M. Bellovin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Steven M. Bellovin
    A Look Back at "Security Problems in the TCP/IP Protocol Suite". [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:229-249 [Conf]
  2. William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis
    Efficient, DoS-resistant, secure key exchange for internet protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:48-58 [Conf]
  3. Steven M. Bellovin, Michael Merritt
    Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:244-250 [Conf]
  4. Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith
    Implementing a distributed firewall. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:190-199 [Conf]
  5. Steven M. Bellovin
    Cryptography and the Internet. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:46-55 [Conf]
  6. Carl E. Landwehr, Steven M. Bellovin
    Intrusion Tolerant Systems Workshop. [Citation Graph (0, 0)][DBLP]
    DSN, 2002, pp:785-786 [Conf]
  7. Steven M. Bellovin
    A technique for counting natted hosts. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Workshop, 2002, pp:267-272 [Conf]
  8. John S. Denker, Steven M. Bellovin, Hugh Daniel, Nancy L. Mintz, Tom Killian, Mark Plotnick
    Moat: a Virtual Private Network Appliance and Services Platform. [Citation Graph (0, 0)][DBLP]
    LISA, 1999, pp:251-260 [Conf]
  9. Steven M. Bellovin
    Security Risks Of Peer-To-Peer Networking. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  10. Steven M. Bellovin
    Probable Plaintext Cryptanalysis of the IP Security Protocols. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
  11. Steven M. Bellovin
    Why Do We Need More Research? [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  12. Steven M. Bellovin
    Transport-Friendly ESP. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  13. Steven M. Bellovin, Eric Rescorla
    Deploying a New Hash Algorithm. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  14. John Ioannidis, Steven M. Bellovin
    Implementing Pushback: Router-Based Defense Against DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  15. William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
    Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:27-39 [Conf]
  16. Steven M. Bellovin, Michael Merritt
    Limitations of the Kerberos Authentication System. [Citation Graph (0, 0)][DBLP]
    USENIX Winter, 1991, pp:253-268 [Conf]
  17. Peter Honeyman, Steven M. Bellovin
    PATHALIAS or The Care and Feeding of Relative Addresses. [Citation Graph (0, 0)][DBLP]
    USENIX Summer, 1986, pp:126-141 [Conf]
  18. Sotiris Ioannidis, Steven M. Bellovin
    Building a Secure Web Browser. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2001, pp:127-134 [Conf]
  19. Steven M. Bellovin
    Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2006, pp:- [Conf]
  20. Steven M. Bellovin
    Privacy & Cryptography. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2006, pp:- [Conf]
  21. Steven M. Bellovin
    Nuclear Weapons, Permissive Action Links, and the History of Public Key Cryptography. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:- [Conf]
  22. Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
    Design and Implementation of Virtual Private Services. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:269-274 [Conf]
  23. Steven M. Bellovin
    Computer security - an end state? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:3, pp:131-132 [Journal]
  24. Steven M. Bellovin
    Spamming, phishing, authentication, and privacy. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:12, pp:144- [Journal]
  25. Steven M. Bellovin, Matt Blaze, Susan Landau
    The real national-security needs for VoIP. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:120- [Journal]
  26. Matt Blaze, Steven M. Bellovin
    Tapping on my network door. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:10, pp:136- [Journal]
  27. Fred B. Schneider, Steven M. Bellovin
    Evolving Telephone Networks. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:1, pp:160- [Journal]
  28. Steven M. Bellovin
    Virtual machines, virtual security? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:10, pp:104- [Journal]
  29. Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker
    Aggregate congestion control. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:1, pp:69- [Journal]
  30. Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker
    Controlling high bandwidth aggregates in the network. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:3, pp:62-73 [Journal]
  31. Steven M. Bellovin
    Security and Privacy: Enemies or Allies? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:92- [Journal]
  32. Steven M. Bellovin
    Unconventional Wisdom. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:88- [Journal]
  33. Fred B. Schneider, Steven M. Bellovin, Alan S. Inouye
    Building Trustworthy Systems: Lessons from the PTN and Internet. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1999, v:3, n:6, pp:64-72 [Journal]
  34. William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
    Just fast keying: Key agreement in a hostile internet. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:242-273 [Journal]
  35. Steven M. Bellovin, Michael Merritt
    An attack on the Interlock Protocol when used for authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:273-0 [Journal]

  36. Privacy-Preserving, Taxable Bank Accounts. [Citation Graph (, )][DBLP]


  37. A Secure and Privacy-Preserving Targeted Ad-System. [Citation Graph (, )][DBLP]


  38. Two-Person Control Administation: Preventing Administation Faults through Duplication. [Citation Graph (, )][DBLP]


  39. RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies. [Citation Graph (, )][DBLP]


  40. Reputation Systems for Anonymous Networks. [Citation Graph (, )][DBLP]


  41. PAR: Payment for Anonymous Routing. [Citation Graph (, )][DBLP]


  42. APOD: Anonymous Physical Object Delivery. [Citation Graph (, )][DBLP]


  43. An Algebra for Integration and Analysis of Ponder2 Policies. [Citation Graph (, )][DBLP]


  44. The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET. [Citation Graph (, )][DBLP]


  45. Sub-operating systems: a new approach to application security. [Citation Graph (, )][DBLP]


  46. An Anonymous Credit Card System. [Citation Graph (, )][DBLP]


  47. Internal surveillance, external risks. [Citation Graph (, )][DBLP]


  48. The physical world and the real world. [Citation Graph (, )][DBLP]


Search in 0.112secs, Finished in 0.114secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002