|
Search the dblp DataBase
Stuart G. Stubblebine:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Premkumar T. Devanbu, Michael Gertz, April Kwong, Charles U. Martel, Glen Nuckolls, Stuart G. Stubblebine
Flexible authentication of XML documents. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2001, pp:136-145 [Conf]
- Michael K. Reiter, Stuart G. Stubblebine
Path Independence for Authentication in Large-Scale Systems. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1997, pp:57-66 [Conf]
- Stuart G. Stubblebine, Rebecca N. Wright
An Authentication Logic Supporting Synchronization, Revocation, and Recency. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1996, pp:95-105 [Conf]
- Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong
Logics for Cryptographic Protocols - Virtues and Limitations. [Citation Graph (0, 0)][DBLP] CSFW, 1991, pp:219-226 [Conf]
- Stefan Schwoon, Somesh Jha, Thomas W. Reps, Stuart G. Stubblebine
On Generalized Authorization Problems. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:202-0 [Conf]
- Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine
Authentic Third-party Data Publication. [Citation Graph (0, 0)][DBLP] DBSec, 2000, pp:101-112 [Conf]
- Glen Nuckolls, Charles U. Martel, Stuart G. Stubblebine
Certifying Data from Multiple Sources. [Citation Graph (0, 0)][DBLP] DBSec, 2003, pp:47-60 [Conf]
- Premkumar T. Devanbu, Stuart G. Stubblebine
Cryptographic Verification of Test Coverage Claims. [Citation Graph (0, 0)][DBLP] ESEC / SIGSOFT FSE, 1997, pp:395-413 [Conf]
- Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine
Reducing the Dependence of SPKI/SDSI on PKI. [Citation Graph (0, 0)][DBLP] ESORICS, 2006, pp:156-173 [Conf]
- Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine
Secure Distributed Human Computation. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:328-332 [Conf]
- David M. Goldschlag, Stuart G. Stubblebine
Publicly Verifiable Lotteries: Applications of Delaying Functions. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1998, pp:214-226 [Conf]
- Philippe Golle, Stuart G. Stubblebine
Secure Distributed Computing in a Commercial Environment. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2001, pp:279-294 [Conf]
- Richard Clayton, Drew Dean, Markus Jakobsson, Steven Myers, Stuart G. Stubblebine, Michael Szydlo
A Chat at the Old Phishin' Hole. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:88- [Conf]
- Paul C. van Oorschot, Stuart G. Stubblebine
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:31-43 [Conf]
- Stuart G. Stubblebine, Paul C. van Oorschot
Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract). [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2004, pp:39-53 [Conf]
- Stuart G. Stubblebine, Paul F. Syverson
Authentic Attributes with Fine-Grained Anonymity Protection. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2000, pp:276-294 [Conf]
- Stuart G. Stubblebine, Paul F. Syverson
Fair On-Line Auctions without Special Trusted Parties. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1999, pp:230-240 [Conf]
- Paul F. Syverson, Stuart G. Stubblebine, David M. Goldschlag
Unlinkable Serial Transactions. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1997, pp:39-56 [Conf]
- Paul F. Syverson, Stuart G. Stubblebine
Group Principals and the Formalization of Anonymity. [Citation Graph (0, 0)][DBLP] World Congress on Formal Methods, 1999, pp:814-833 [Conf]
- Premkumar T. Devanbu, Philip W. L. Fong, Stuart G. Stubblebine
Techniques for Trusted Software Engineering. [Citation Graph (0, 0)][DBLP] ICSE, 1998, pp:126-135 [Conf]
- Premkumar T. Devanbu, Stuart G. Stubblebine
Software engineering for security: a roadmap. [Citation Graph (0, 0)][DBLP] ICSE - Future of SE Track, 2000, pp:227-239 [Conf]
- Premkumar T. Devanbu, Stuart G. Stubblebine
Research Directions for Automated Software Verification: Using Trusted Hardware. [Citation Graph (0, 0)][DBLP] ASE, 1997, pp:274-279 [Conf]
- Carl A. Gunter, Michael J. May, Stuart G. Stubblebine
A Formal Privacy System and Its Application to Location Based Services. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2004, pp:256-282 [Conf]
- Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine
Secure distributed human computation. [Citation Graph (0, 0)][DBLP] ACM Conference on Electronic Commerce, 2005, pp:155-164 [Conf]
- Glen Nuckolls, Charles U. Martel, Stuart G. Stubblebine
Certifying data from multiple sources (extended abstract). [Citation Graph (0, 0)][DBLP] ACM Conference on Electronic Commerce, 2003, pp:210-211 [Conf]
- Michael K. Reiter, Stuart G. Stubblebine
Toward Acceptable Metrics of Authentication. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:10-20 [Conf]
- Charles U. Martel, Glen Nuckolls, Premkumar T. Devanbu, Michael Gertz, April Kwong, Stuart G. Stubblebine
A General Model for Authenticated Data Structures. [Citation Graph (0, 0)][DBLP] Algorithmica, 2004, v:39, n:1, pp:21-41 [Journal]
- Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine
Authentic Data Publication Over the Internet. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2003, v:11, n:3, pp:291-314 [Journal]
- B. Clifford Neuman, Stuart G. Stubblebine
A Note on the Use of Timestamps as Nonces. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 1993, v:27, n:2, pp:10-14 [Journal]
- Michael K. Reiter, Stuart G. Stubblebine
Resilient Authentication Using Path Independence. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1998, v:47, n:12, pp:1351-1362 [Journal]
- Michael K. Reiter, Stuart G. Stubblebine
Authentication Metric Analysis and Design. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:2, pp:138-158 [Journal]
- Stuart G. Stubblebine, Paul F. Syverson, David M. Goldschlag
Unlinkable serial transactions: protocols and applications. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:4, pp:354-389 [Journal]
- Paul C. van Oorschot, Stuart G. Stubblebine
On countering online dictionary attacks with login histories and humans-in-the-loop. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:3, pp:235-258 [Journal]
- Premkumar T. Devanbu, Stuart G. Stubblebine
Cryptographic Verification of Test Coverage Claims. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 2000, v:26, n:2, pp:178-192 [Journal]
- Premkumar T. Devanbu, Stuart G. Stubblebine
Stack and Queue Integrity on Hostile Platforms. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 2002, v:28, n:1, pp:100-108 [Journal]
- Stuart G. Stubblebine, Rebecca N. Wright
An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 2002, v:28, n:3, pp:256-285 [Journal]
Stack and Queue Integrity on Hostile Platforms. [Citation Graph (, )][DBLP]
Secure Distributed Human Computation. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.007secs
|