Search the dblp DataBase
Simson L. Garfinkel :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Simson L. Garfinkel , David Margrave , Jeffrey I. Schiller , Erik Nordlander , Robert C. Miller How to make secure email easier to use. [Citation Graph (0, 0)][DBLP ] CHI, 2005, pp:701-710 [Conf ] Min Wu , Robert C. Miller , Simson L. Garfinkel Do security toolbars actually prevent phishing attacks? [Citation Graph (0, 0)][DBLP ] CHI, 2006, pp:601-610 [Conf ] Simson L. Garfinkel Enabling Email Confidentiality through the use of Opportunistic Encryption. [Citation Graph (0, 0)][DBLP ] DG.O, 2003, pp:- [Conf ] Simson L. Garfinkel , Jeffrey I. Schiller , Erik Nordlander , David Margrave , Robert C. Miller Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2005, pp:188-202 [Conf ] Simson L. Garfinkel Used Disk Drives. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:- [Conf ] Simson L. Garfinkel , David J. Malan One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:135-151 [Conf ] Uri Braun , Simson L. Garfinkel , David A. Holland , Kiran-Kumar Muniswamy-Reddy , Margo I. Seltzer Issues in Automatic Provenance Collection. [Citation Graph (0, 0)][DBLP ] IPAW, 2006, pp:171-183 [Conf ] Simson L. Garfinkel AFF: a new format for storing hard drive images. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:85-87 [Journal ] Simson L. Garfinkel Risks of Social Security Numbers. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1995, v:38, n:10, pp:146- [Journal ] Simson L. Garfinkel Forensic feature extraction and cross-drive analysis. [Citation Graph (0, 0)][DBLP ] Digital Investigation, 2006, v:3, n:Supplement-1, pp:71-81 [Journal ] Simson L. Garfinkel , Abhi Shelat IEEE Security & Privacy: Data Forensics - Rememberance of Data Passed: A Study of Disk Sanitization Practices. [Citation Graph (0, 0)][DBLP ] IEEE Distributed Systems Online, 2003, v:4, n:2, pp:- [Journal ] Simson L. Garfinkel Leaderless resistance today. [Citation Graph (0, 0)][DBLP ] First Monday, 2003, v:8, n:3, pp:- [Journal ] Lorrie Faith Cranor , Simson L. Garfinkel Guest Editors' Introduction: Secure or Usable? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:5, pp:16-18 [Journal ] Simson L. Garfinkel Email-Based Identification and Authentication: An Alternative to PKI? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:6, pp:20-26 [Journal ] Simson L. Garfinkel , Ari Juels , Ravikanth Pappu RFID Privacy: An Overview of Problems and Proposed Solutions. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:3, pp:34-43 [Journal ] Simson L. Garfinkel , Abhi Shelat Remembrance of Data Passed: A Study of Disk Sanitization Practices. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:17-27 [Journal ] Simson L. Garfinkel Complete delete vs. time machine computing. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2007, v:41, n:1, pp:42-44 [Journal ] Practical Applications of Bloom Filters to the NIST RDS and Hard Drive Triage. [Citation Graph (, )][DBLP ] AFF: An Open Extensible Format for Disk Imaging. [Citation Graph (, )][DBLP ] IRBs and Security Research: Myths, Facts and Mission Creep. [Citation Graph (, )][DBLP ] File Fragment Classification-The Case for Specialized Approaches. [Citation Graph (, )][DBLP ] Automating Disk Forensic Processing with SleuthKit, XML and Python. [Citation Graph (, )][DBLP ] Bitfrost: the one laptop per child security model. [Citation Graph (, )][DBLP ] Invisible HCI-SEC: ways of re-architecting the operating system to increase usability and security. [Citation Graph (, )][DBLP ] Johnny 2: a user test of key continuity management with S/MIME and Outlook Express. [Citation Graph (, )][DBLP ] Institutional review boards and your research. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs