The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Simson L. Garfinkel: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Simson L. Garfinkel, David Margrave, Jeffrey I. Schiller, Erik Nordlander, Robert C. Miller
    How to make secure email easier to use. [Citation Graph (0, 0)][DBLP]
    CHI, 2005, pp:701-710 [Conf]
  2. Min Wu, Robert C. Miller, Simson L. Garfinkel
    Do security toolbars actually prevent phishing attacks? [Citation Graph (0, 0)][DBLP]
    CHI, 2006, pp:601-610 [Conf]
  3. Simson L. Garfinkel
    Enabling Email Confidentiality through the use of Opportunistic Encryption. [Citation Graph (0, 0)][DBLP]
    DG.O, 2003, pp:- [Conf]
  4. Simson L. Garfinkel, Jeffrey I. Schiller, Erik Nordlander, David Margrave, Robert C. Miller
    Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:188-202 [Conf]
  5. Simson L. Garfinkel
    Used Disk Drives. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  6. Simson L. Garfinkel, David J. Malan
    One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:135-151 [Conf]
  7. Uri Braun, Simson L. Garfinkel, David A. Holland, Kiran-Kumar Muniswamy-Reddy, Margo I. Seltzer
    Issues in Automatic Provenance Collection. [Citation Graph (0, 0)][DBLP]
    IPAW, 2006, pp:171-183 [Conf]
  8. Simson L. Garfinkel
    AFF: a new format for storing hard drive images. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:85-87 [Journal]
  9. Simson L. Garfinkel
    Risks of Social Security Numbers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:10, pp:146- [Journal]
  10. Simson L. Garfinkel
    Forensic feature extraction and cross-drive analysis. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:Supplement-1, pp:71-81 [Journal]
  11. Simson L. Garfinkel, Abhi Shelat
    IEEE Security & Privacy: Data Forensics - Rememberance of Data Passed: A Study of Disk Sanitization Practices. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2003, v:4, n:2, pp:- [Journal]
  12. Simson L. Garfinkel
    Leaderless resistance today. [Citation Graph (0, 0)][DBLP]
    First Monday, 2003, v:8, n:3, pp:- [Journal]
  13. Lorrie Faith Cranor, Simson L. Garfinkel
    Guest Editors' Introduction: Secure or Usable? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:16-18 [Journal]
  14. Simson L. Garfinkel
    Email-Based Identification and Authentication: An Alternative to PKI? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:20-26 [Journal]
  15. Simson L. Garfinkel, Ari Juels, Ravikanth Pappu
    RFID Privacy: An Overview of Problems and Proposed Solutions. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:34-43 [Journal]
  16. Simson L. Garfinkel, Abhi Shelat
    Remembrance of Data Passed: A Study of Disk Sanitization Practices. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:17-27 [Journal]
  17. Simson L. Garfinkel
    Complete delete vs. time machine computing. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2007, v:41, n:1, pp:42-44 [Journal]

  18. Practical Applications of Bloom Filters to the NIST RDS and Hard Drive Triage. [Citation Graph (, )][DBLP]


  19. AFF: An Open Extensible Format for Disk Imaging. [Citation Graph (, )][DBLP]


  20. IRBs and Security Research: Myths, Facts and Mission Creep. [Citation Graph (, )][DBLP]


  21. File Fragment Classification-The Case for Specialized Approaches. [Citation Graph (, )][DBLP]


  22. Automating Disk Forensic Processing with SleuthKit, XML and Python. [Citation Graph (, )][DBLP]


  23. Bitfrost: the one laptop per child security model. [Citation Graph (, )][DBLP]


  24. Invisible HCI-SEC: ways of re-architecting the operating system to increase usability and security. [Citation Graph (, )][DBLP]


  25. Johnny 2: a user test of key continuity management with S/MIME and Outlook Express. [Citation Graph (, )][DBLP]


  26. Institutional review boards and your research. [Citation Graph (, )][DBLP]


Search in 0.056secs, Finished in 0.058secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002