The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Adam Stubblefield: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Joshua Mason, Kathryn Watkins, Jason Eisner, Adam Stubblefield
    A natural language approach to automated cryptanalysis of two-time pads. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:235-244 [Conf]
  2. Zachary N. J. Peterson, Randal C. Burns, Joe Herring, Adam Stubblefield, Aviel D. Rubin
    Secure Deletion for a Versioning File System. [Citation Graph (0, 0)][DBLP]
    FAST, 2005, pp:- [Conf]
  3. Drew Dean, Matthew K. Franklin, Adam Stubblefield
    An Algebraic Approach to IP Traceback. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  4. Adam Stubblefield, John Ioannidis, Aviel D. Rubin
    Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  5. Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach
    Analysis of an Electronic Voting System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:27-0 [Conf]
  6. Stephen Bono, Aviel D. Rubin, Adam Stubblefield, Matthew Green
    Security through legality. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:41-43 [Journal]
  7. Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach
    Managing the Performance Impact of Web Security. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2005, v:5, n:1, pp:99-116 [Journal]
  8. Adam Stubblefield, John Ioannidis, Aviel D. Rubin
    A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:319-332 [Journal]
  9. Drew Dean, Matthew K. Franklin, Adam Stubblefield
    An algebraic approach to IP traceback. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:2, pp:119-137 [Journal]

  10. To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002