The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stuart G. Stubblebine: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Premkumar T. Devanbu, Michael Gertz, April Kwong, Charles U. Martel, Glen Nuckolls, Stuart G. Stubblebine
    Flexible authentication of XML documents. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:136-145 [Conf]
  2. Michael K. Reiter, Stuart G. Stubblebine
    Path Independence for Authentication in Large-Scale Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:57-66 [Conf]
  3. Stuart G. Stubblebine, Rebecca N. Wright
    An Authentication Logic Supporting Synchronization, Revocation, and Recency. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:95-105 [Conf]
  4. Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong
    Logics for Cryptographic Protocols - Virtues and Limitations. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:219-226 [Conf]
  5. Stefan Schwoon, Somesh Jha, Thomas W. Reps, Stuart G. Stubblebine
    On Generalized Authorization Problems. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:202-0 [Conf]
  6. Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine
    Authentic Third-party Data Publication. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:101-112 [Conf]
  7. Glen Nuckolls, Charles U. Martel, Stuart G. Stubblebine
    Certifying Data from Multiple Sources. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:47-60 [Conf]
  8. Premkumar T. Devanbu, Stuart G. Stubblebine
    Cryptographic Verification of Test Coverage Claims. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 1997, pp:395-413 [Conf]
  9. Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine
    Reducing the Dependence of SPKI/SDSI on PKI. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:156-173 [Conf]
  10. Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine
    Secure Distributed Human Computation. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:328-332 [Conf]
  11. David M. Goldschlag, Stuart G. Stubblebine
    Publicly Verifiable Lotteries: Applications of Delaying Functions. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1998, pp:214-226 [Conf]
  12. Philippe Golle, Stuart G. Stubblebine
    Secure Distributed Computing in a Commercial Environment. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:279-294 [Conf]
  13. Richard Clayton, Drew Dean, Markus Jakobsson, Steven Myers, Stuart G. Stubblebine, Michael Szydlo
    A Chat at the Old Phishin' Hole. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:88- [Conf]
  14. Paul C. van Oorschot, Stuart G. Stubblebine
    Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:31-43 [Conf]
  15. Stuart G. Stubblebine, Paul C. van Oorschot
    Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:39-53 [Conf]
  16. Stuart G. Stubblebine, Paul F. Syverson
    Authentic Attributes with Fine-Grained Anonymity Protection. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:276-294 [Conf]
  17. Stuart G. Stubblebine, Paul F. Syverson
    Fair On-Line Auctions without Special Trusted Parties. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:230-240 [Conf]
  18. Paul F. Syverson, Stuart G. Stubblebine, David M. Goldschlag
    Unlinkable Serial Transactions. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:39-56 [Conf]
  19. Paul F. Syverson, Stuart G. Stubblebine
    Group Principals and the Formalization of Anonymity. [Citation Graph (0, 0)][DBLP]
    World Congress on Formal Methods, 1999, pp:814-833 [Conf]
  20. Premkumar T. Devanbu, Philip W. L. Fong, Stuart G. Stubblebine
    Techniques for Trusted Software Engineering. [Citation Graph (0, 0)][DBLP]
    ICSE, 1998, pp:126-135 [Conf]
  21. Premkumar T. Devanbu, Stuart G. Stubblebine
    Software engineering for security: a roadmap. [Citation Graph (0, 0)][DBLP]
    ICSE - Future of SE Track, 2000, pp:227-239 [Conf]
  22. Premkumar T. Devanbu, Stuart G. Stubblebine
    Research Directions for Automated Software Verification: Using Trusted Hardware. [Citation Graph (0, 0)][DBLP]
    ASE, 1997, pp:274-279 [Conf]
  23. Carl A. Gunter, Michael J. May, Stuart G. Stubblebine
    A Formal Privacy System and Its Application to Location Based Services. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:256-282 [Conf]
  24. Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine
    Secure distributed human computation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2005, pp:155-164 [Conf]
  25. Glen Nuckolls, Charles U. Martel, Stuart G. Stubblebine
    Certifying data from multiple sources (extended abstract). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2003, pp:210-211 [Conf]
  26. Michael K. Reiter, Stuart G. Stubblebine
    Toward Acceptable Metrics of Authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:10-20 [Conf]
  27. Charles U. Martel, Glen Nuckolls, Premkumar T. Devanbu, Michael Gertz, April Kwong, Stuart G. Stubblebine
    A General Model for Authenticated Data Structures. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 2004, v:39, n:1, pp:21-41 [Journal]
  28. Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine
    Authentic Data Publication Over the Internet. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:3, pp:291-314 [Journal]
  29. B. Clifford Neuman, Stuart G. Stubblebine
    A Note on the Use of Timestamps as Nonces. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1993, v:27, n:2, pp:10-14 [Journal]
  30. Michael K. Reiter, Stuart G. Stubblebine
    Resilient Authentication Using Path Independence. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1998, v:47, n:12, pp:1351-1362 [Journal]
  31. Michael K. Reiter, Stuart G. Stubblebine
    Authentication Metric Analysis and Design. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1999, v:2, n:2, pp:138-158 [Journal]
  32. Stuart G. Stubblebine, Paul F. Syverson, David M. Goldschlag
    Unlinkable serial transactions: protocols and applications. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1999, v:2, n:4, pp:354-389 [Journal]
  33. Paul C. van Oorschot, Stuart G. Stubblebine
    On countering online dictionary attacks with login histories and humans-in-the-loop. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:3, pp:235-258 [Journal]
  34. Premkumar T. Devanbu, Stuart G. Stubblebine
    Cryptographic Verification of Test Coverage Claims. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2000, v:26, n:2, pp:178-192 [Journal]
  35. Premkumar T. Devanbu, Stuart G. Stubblebine
    Stack and Queue Integrity on Hostile Platforms. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2002, v:28, n:1, pp:100-108 [Journal]
  36. Stuart G. Stubblebine, Rebecca N. Wright
    An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2002, v:28, n:3, pp:256-285 [Journal]

  37. Stack and Queue Integrity on Hostile Platforms. [Citation Graph (, )][DBLP]


  38. Secure Distributed Human Computation. [Citation Graph (, )][DBLP]


Search in 0.010secs, Finished in 0.013secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002