The SCEAS System
Navigation Menu

Search the dblp DataBase


Sean W. Smith: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shan Jiang, Sean Smith, Kazuhiro Minami
    Securing Web Servers against Insider Attack . [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:265-276 [Conf]
  2. John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian
    Open-Source Applications of TCPA Hardware. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:294-303 [Conf]
  3. Sara Sinclair, Sean W. Smith
    PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:419-430 [Conf]
  4. Meiyuan Zhao, Sean W. Smith, David M. Nicol
    Aggregated path authentication for efficient BGP security. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:128-138 [Conf]
  5. K. Kain, Sean W. Smith, R. Asokan
    Digital signatures and electronic documents: a cautionary tale. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:293-308 [Conf]
  6. Merrick L. Furst, Jeffrey C. Jackson, Sean W. Smith
    Improved Learning of AC0 Functions. [Citation Graph (0, 0)][DBLP]
    COLT, 1991, pp:317-325 [Conf]
  7. Suresh Chari, Parviz Kermani, Sean Smith, Leandros Tassiulas
    Security Issues in M-Commerce: A Usage-Based Taxonomy. [Citation Graph (0, 0)][DBLP]
    E-Commerce Agents, 2001, pp:264-282 [Conf]
  8. Sean W. Smith
    Outbound Authentication for Programmable Secure Coprocessors. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:72-89 [Conf]
  9. Yasir Ali, Sean Smith
    Flexible and Scalable Public Key Security for SSH. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:43-56 [Conf]
  10. Mark Franklin, Kevin Mitcham, Sean W. Smith, Joshua Stabiner, Omen Wild
    CA-in-a-Box. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:180-190 [Conf]
  11. Gabriel Vanrenen, Sean Smith
    Distributing Security-Mediated PKI. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:218-231 [Conf]
  12. John Marchesini, Sean Smith
    Modeling Public Key Infrastructures in the Real World. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:118-134 [Conf]
  13. Meiyuan Zhao, Sean W. Smith
    Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:16-30 [Conf]
  14. Sean W. Smith, Elaine R. Palmer, Steve Weingart
    Using a High-Performance, Programmable Secure Coprocessor. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1998, pp:73-89 [Conf]
  15. Sean W. Smith, David B. Johnson, J. D. Tygar
    Completely Asynchronous Optimistic Recovery with Minimal Rollbacks. [Citation Graph (0, 0)][DBLP]
    FTCS, 1995, pp:361-370 [Conf]
  16. Sidharth Nazareth, Sean Smith
    Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth. [Citation Graph (0, 0)][DBLP]
    ICWI, 2004, pp:218-226 [Conf]
  17. Paul Seligman, Sean Smith
    Detecting Unauthorized Use in Online Journal Archives: A Case Study. [Citation Graph (0, 0)][DBLP]
    ICWI, 2004, pp:209-217 [Conf]
  18. James E. Dobson, Jeffrey B. Woodward, Susan A. Schwarz, John Marchesini, Hany Farid, Sean W. Smith
    The Dartmouth Green Grid. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2005, pp:99-106 [Conf]
  19. Alexander Iliev, Sean W. Smith
    Private Information Storage with Logarithm-Space Secure Hardware. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:199-214 [Conf]
  20. Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar
    SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2001, pp:170- [Conf]
  21. Alexander Iliev, Sean W. Smith
    Prototyping an Armored Data Vault: Rights Management on Big Brother's Computer. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:144-159 [Conf]
  22. John Marchesini, Sean W. Smith
    SHEMP: Secure Hardware Enhanced MyProxy. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  23. Anna Shubina, Sean Smith
    Design and Prototype of a Coercion-Resistant, Verifiable Electronic Voting System. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:29-39 [Conf]
  24. Sean W. Smith, David B. Johnson
    Minimizing Timestamp Size for Completely Asynchronous Optimistic Recovery with Minimal Rollback. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1996, pp:66-75 [Conf]
  25. Zishuang (Eileen) Ye, Sean Smith
    Trusted Paths for Browsers. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:263-279 [Conf]
  26. Sean W. Smith, Steve Weingart
    Building a high-performance, programmable secure coprocessor. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:831-860 [Journal]
  27. John Marchesini, Sean W. Smith, Meiyuan Zhao
    Keyjacking: the surprising insecurity of client-side SSL. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:2, pp:109-123 [Journal]
  28. Joan G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, Leendert van Doorn, Sean W. Smith, Steve Weingart
    Building the IBM 4758 Secure Coprocessor. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:10, pp:57-66 [Journal]
  29. Sean Smith
    Magic Boxes and Boots: Security in Hardware. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:10, pp:106-109 [Journal]
  30. Sean W. Smith, David Safford
    Practical server privacy with secure coprocessors. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 2001, v:40, n:3, pp:683-695 [Journal]
  31. Alexander Iliev, Sean W. Smith
    Protecting Client Privacy with Trusted Computing at the Server. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:20-28 [Journal]
  32. Sara Sinclair, Sean W. Smith
    The TIPPI Point: Toward Trustworthy Interfaces. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:68-71 [Journal]
  33. Sean W. Smith
    Fairy Dust, Secrets, and the Real World. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:89-93 [Journal]
  34. Sean W. Smith
    Humans in the Loop: Human-Computer Interaction and Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:75-79 [Journal]
  35. Sean W. Smith
    Turing is from Mars, Shannon is from Venus: Computer Science and Computer Engineering. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:66-69 [Journal]
  36. Sean W. Smith
    Pretending that Systems Are Secure. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:73-76 [Journal]
  37. Sean W. Smith, Jothy Rosenberg, Adam Golodner
    A Funny Thing Happened on the Way to the Marketplace. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:74-78 [Journal]
  38. Sean W. Smith, Eugene H. Spafford
    Grand Challenges in Information Security: Process and Output. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:69-71 [Journal]
  39. Sean W. Smith
    Outbound authentication for programmable secure coprocessors. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:3, n:1, pp:28-41 [Journal]
  40. Meiyuan Zhao, Sean W. Smith, David M. Nicol
    The performance impact of BGP security. [Citation Graph (0, 0)][DBLP]
    IEEE Network, 2005, v:19, n:6, pp:42-48 [Journal]
  41. David M. Nicol, Sean W. Smith, Meiyuan Zhao
    Evaluation of efficient security for BGP route announcements using parallel simulation. [Citation Graph (0, 0)][DBLP]
    Simulation Modelling Practice and Theory, 2004, v:12, n:3-4, pp:187-216 [Journal]
  42. Massimiliano Pala, Sean W. Smith
    AutoPKI: A PKI Resources Discovery System. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:154-169 [Conf]
  43. Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smith
    Batch Pairing Delegation. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:74-90 [Conf]
  44. Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, Sean W. Smith
    Nymble: Anonymous IP-Address Blocking. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:113-133 [Conf]

  45. Pastures: Towards Usable Security Policy Engineering. [Citation Graph (, )][DBLP]

  46. Katana: A Hot Patching Framework for ELF Executables. [Citation Graph (, )][DBLP]

  47. PPAA: Peer-to-Peer Anonymous Authentication. [Citation Graph (, )][DBLP]

  48. Extending PKI Interoperability in Computational Grids. [Citation Graph (, )][DBLP]

  49. Blacklistable anonymous credentials: blocking misbehaving users without ttps. [Citation Graph (, )][DBLP]

  50. PEREA: towards practical TTP-free revocation in anonymous authentication. [Citation Graph (, )][DBLP]

  51. Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security. [Citation Graph (, )][DBLP]

  52. PEACHES and Peers. [Citation Graph (, )][DBLP]

  53. WSKE: Web Server Key Enabled Cookies. [Citation Graph (, )][DBLP]

  54. Secure Cryptographic Precomputation with Insecure Memory. [Citation Graph (, )][DBLP]

  55. Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers. [Citation Graph (, )][DBLP]

  56. Attribute-Based Publishing with Hidden Credentials and Hidden Policies. [Citation Graph (, )][DBLP]

  57. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems. [Citation Graph (, )][DBLP]

  58. TwoKind authentication: protecting private information in untrustworthy environments. [Citation Graph (, )][DBLP]

  59. Computational techniques for increasing PKI policy comprehension by human analysts. [Citation Graph (, )][DBLP]

  60. TwoKind authentication: usable authenticators for untrustworthy environments. [Citation Graph (, )][DBLP]

  61. TOCTOU, Traps, and Trusted Computing. [Citation Graph (, )][DBLP]

  62. Information Risk in Financial Institutions: Field Study and Research Roadmap. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002