The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Daniel R. Simon: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Valentin Razmov, Daniel R. Simon
    Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:347-357 [Conf]
  2. Charles Rackoff, Daniel R. Simon
    Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:433-444 [Conf]
  3. Daniel R. Simon
    Anonymous Communication and Anonymous Cash. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:61-73 [Conf]
  4. Yi-Min Wang, Chad Verbowski, Daniel R. Simon
    Persistent-State Checkpoint Comparison for Troubleshooting Configuration Failures. [Citation Graph (0, 0)][DBLP]
    DSN, 2003, pp:311-316 [Conf]
  5. Daniel R. Simon
    Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions? [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:334-345 [Conf]
  6. Barbara Fox, Brian Beckman, Daniel R. Simon
    GUMP: Grand Unified Meta-Protocols Recipes for Simple, Standards-Based Financial Cryptography. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:375-394 [Conf]
  7. Jeong Han Kim, Daniel R. Simon, Prasad Tetali
    Limits on the Efficiency of One-Way Permutation-Based Hash Functions. [Citation Graph (0, 0)][DBLP]
    FOCS, 1999, pp:535-542 [Conf]
  8. Daniel R. Simon
    On the Power of Quantum Cryptography [Citation Graph (0, 0)][DBLP]
    FOCS, 1994, pp:116-123 [Conf]
  9. Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, Alf Zugenmaier
    Shield: vulnerability-driven network filters for preventing known vulnerability exploits. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2004, pp:193-204 [Conf]
  10. Qixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N. Padmanabhan, Lili Qiu
    Statistical Identification of Encrypted Web Browsing Traffic. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:19-30 [Conf]
  11. Charles Rackoff, Daniel R. Simon
    Cryptographic defense against traffic analysis. [Citation Graph (0, 0)][DBLP]
    STOC, 1993, pp:672-681 [Conf]
  12. Venkata N. Padmanabhan, Daniel R. Simon
    Secure traceroute to detect faulty or malicious routing. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:77-82 [Journal]
  13. Daniel R. Simon
    On the Power of Quantum Computation. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1997, v:26, n:5, pp:1474-1483 [Journal]
  14. Ted Wobber, Aydan R. Yumerefendi, Martín Abadi, Andrew Birrell, Daniel R. Simon
    Authorizing applications in singularity. [Citation Graph (0, 0)][DBLP]
    EuroSys, 2007, pp:355-368 [Conf]

  15. An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. [Citation Graph (, )][DBLP]


  16. Characterizing Botnets from Email Spam Records. [Citation Graph (, )][DBLP]


  17. Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002