The SCEAS System
| |||||||

## Search the dblp DataBase
Daniel R. Simon:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Valentin Razmov, Daniel R. Simon
**Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions.**[Citation Graph (0, 0)][DBLP] ACSAC, 2001, pp:347-357 [Conf] - Charles Rackoff, Daniel R. Simon
**Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1991, pp:433-444 [Conf] - Daniel R. Simon
**Anonymous Communication and Anonymous Cash.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1996, pp:61-73 [Conf] - Yi-Min Wang, Chad Verbowski, Daniel R. Simon
**Persistent-State Checkpoint Comparison for Troubleshooting Configuration Failures.**[Citation Graph (0, 0)][DBLP] DSN, 2003, pp:311-316 [Conf] - Daniel R. Simon
**Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions?**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1998, pp:334-345 [Conf] - Barbara Fox, Brian Beckman, Daniel R. Simon
**GUMP: Grand Unified Meta-Protocols Recipes for Simple, Standards-Based Financial Cryptography.**[Citation Graph (0, 0)][DBLP] Financial Cryptography, 1997, pp:375-394 [Conf] - Jeong Han Kim, Daniel R. Simon, Prasad Tetali
**Limits on the Efficiency of One-Way Permutation-Based Hash Functions.**[Citation Graph (0, 0)][DBLP] FOCS, 1999, pp:535-542 [Conf] - Daniel R. Simon
**On the Power of Quantum Cryptography**[Citation Graph (0, 0)][DBLP] FOCS, 1994, pp:116-123 [Conf] - Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, Alf Zugenmaier
**Shield: vulnerability-driven network filters for preventing known vulnerability exploits.**[Citation Graph (0, 0)][DBLP] SIGCOMM, 2004, pp:193-204 [Conf] - Qixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N. Padmanabhan, Lili Qiu
**Statistical Identification of Encrypted Web Browsing Traffic.**[Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2002, pp:19-30 [Conf] - Charles Rackoff, Daniel R. Simon
**Cryptographic defense against traffic analysis.**[Citation Graph (0, 0)][DBLP] STOC, 1993, pp:672-681 [Conf] - Venkata N. Padmanabhan, Daniel R. Simon
**Secure traceroute to detect faulty or malicious routing.**[Citation Graph (0, 0)][DBLP] Computer Communication Review, 2003, v:33, n:1, pp:77-82 [Journal] - Daniel R. Simon
**On the Power of Quantum Computation.**[Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1997, v:26, n:5, pp:1474-1483 [Journal] - Ted Wobber, Aydan R. Yumerefendi, Martín Abadi, Andrew Birrell, Daniel R. Simon
**Authorizing applications in singularity.**[Citation Graph (0, 0)][DBLP] EuroSys, 2007, pp:355-368 [Conf] **An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks.**[Citation Graph (, )][DBLP]**Characterizing Botnets from Email Spam Records.**[Citation Graph (, )][DBLP]**Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs.**[Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |