The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tadayoshi Kohno: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tadayoshi Kohno, John Kelsey, Bruce Schneier
    Preliminary Cryptanalysis of Reduced-Round Serpent. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:195-211 [Conf]
  2. Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre
    Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:1-11 [Conf]
  3. Tadayoshi Kohno
    Attacking and repairing the winZip encryption scheme. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:72-81 [Conf]
  4. Mihir Bellare, Tadayoshi Kohno, Victor Shoup
    Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:380-389 [Conf]
  5. Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi
    Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:205-222 [Conf]
  6. Mihir Bellare, Tadayoshi Kohno
    A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2003, pp:491-506 [Conf]
  7. Mihir Bellare, Tadayoshi Kohno
    Hash Function Balance and Its Impact on Birthday Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:401-418 [Conf]
  8. John Kelsey, Tadayoshi Kohno
    Herding Hash Functions and the Nostradamus Attack. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:183-200 [Conf]
  9. Tadayoshi Kohno, Mark McGovern
    On the Global Content PMI: Improved Copy-Protected Internet Content Distribution. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:70-81 [Conf]
  10. Tetsu Iwata, Tadayoshi Kohno
    New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:427-445 [Conf]
  11. Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno
    Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:330-346 [Conf]
  12. John Kelsey, Tadayoshi Kohno, Bruce Schneier
    Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:75-93 [Conf]
  13. Lars R. Knudsen, Tadayoshi Kohno
    Analysis of RMAC. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:182-191 [Conf]
  14. Tadayoshi Kohno, John Viega, Doug Whiting
    CWC: A High-Performance Conventional Authenticated Encryption Mode. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:408-426 [Conf]
  15. Tadayoshi Kohno, Andre Broido, Kimberly C. Claffy
    Remote Physical Device Fingerprinting. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:211-225 [Conf]
  16. Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach
    Analysis of an Electronic Voting System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:27-0 [Conf]
  17. David Molnar, Tadayoshi Kohno, Naveen Sastry, David Wagner
    Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:365-370 [Conf]
  18. John Viega, Tadayoshi Kohno, Bruce Potter
    Trust (and mistrust) in secure applications. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:31-36 [Journal]
  19. Harold N. Gabow, Tadayoshi Kohno
    A Network-Flow-Based Scheduler: Design, Performance History, and Experimental Analysis. [Citation Graph (0, 0)][DBLP]
    ACM Journal of Experimental Algorithms, 2001, v:6, n:, pp:3- [Journal]
  20. Tadayoshi Kohno, Andre Broido, Kimberly C. Claffy
    Remote Physical Device Fingerprintin. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:93-108 [Journal]
  21. Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre
    Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:206-241 [Journal]
  22. John Viega, J. T. Bloch, Tadayoshi Kohno, Gary McGraw
    Token-based scanning of source code for security problems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:3, pp:238-261 [Journal]

  23. RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. [Citation Graph (, )][DBLP]


  24. Privacy oracle: a system for finding application leaks with black box differential testing. [Citation Graph (, )][DBLP]


  25. EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. [Citation Graph (, )][DBLP]


  26. A comprehensive study of frequency, interference, and training of multiple graphical passwords. [Citation Graph (, )][DBLP]


  27. Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices. [Citation Graph (, )][DBLP]


  28. Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era. [Citation Graph (, )][DBLP]


  29. A spotlight on security and privacy risks with future household robots: attacks and lessons. [Citation Graph (, )][DBLP]


  30. Improving wireless privacy with an identifier-free link layer protocol. [Citation Graph (, )][DBLP]


  31. Detecting In-Flight Page Changes with Web Tripwires. [Citation Graph (, )][DBLP]


  32. Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default. [Citation Graph (, )][DBLP]


  33. Shining Light in Dark Places: Understanding the Tor Network. [Citation Graph (, )][DBLP]


  34. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. [Citation Graph (, )][DBLP]


  35. Experimental Security Analysis of a Modern Automobile. [Citation Graph (, )][DBLP]


  36. Challenges and Directions for Monitoring P2P File Sharing Networks - or - Why My Printer Received a DMCA Takedown Notice. [Citation Graph (, )][DBLP]


  37. Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security. [Citation Graph (, )][DBLP]


  38. Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications. [Citation Graph (, )][DBLP]


  39. Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs. [Citation Graph (, )][DBLP]


  40. Low-resource routing attacks against tor. [Citation Graph (, )][DBLP]


  41. Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety. [Citation Graph (, )][DBLP]


Search in 0.014secs, Finished in 0.017secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002