dblp.uni-trier.dewww.uni-trier.de

Steven M. Bellovin

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
45EESteven M. Bellovin, Randy Bush: Configuration management and security. IEEE Journal on Selected Areas in Communications 27(3): 268-274 (2009)
2008
44 Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ACNS 2008
43EEHang Zhao, Jorge Lobo, Steven M. Bellovin: An Algebra for Integration and Analysis of Ponder2 Policies. POLICY 2008: 74-77
42EEElli Androulaki, Seung Geol Choi, Steven M. Bellovin, Tal Malkin: Reputation Systems for Anonymous Networks. Privacy Enhancing Technologies 2008: 202-218
41EEElli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, Steven M. Bellovin: PAR: Payment for Anonymous Routing. Privacy Enhancing Technologies 2008: 219-236
40EEMaritza L. Johnson, Chaitanya Atreya, Adam J. Aviv, Steven M. Bellovin, Gail E. Kaiser: RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies. UPSEC 2008
39EESteven M. Bellovin: The physical world and the real world. Commun. ACM 51(5): 104 (2008)
2007
38EESteven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Jennifer Rexford, Peter G. Neumann: Internal surveillance, external risks. Commun. ACM 50(12): 128 (2007)
2006
37EESteven M. Bellovin, Eric Rescorla: Deploying a New Hash Algorithm. NDSS 2006
36EESteven M. Bellovin: Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography. USENIX Annual Technical Conference, General Track 2006
35 Steven M. Bellovin: Privacy & Cryptography. USENIX Annual Technical Conference, General Track 2006
34EESteven M. Bellovin: Virtual machines, virtual security? Commun. ACM 49(10): 104 (2006)
33EESteven M. Bellovin: Unconventional Wisdom. IEEE Security & Privacy 4(1): 88 (2006)
2005
32EESteven M. Bellovin, Matt Blaze, Susan Landau: The real national-security needs for VoIP. Commun. ACM 48(11): 120 (2005)
31EESteven M. Bellovin: Security and Privacy: Enemies or Allies? IEEE Security & Privacy 3(3): 92 (2005)
2004
30EESteven M. Bellovin: A Look Back at "Security Problems in the TCP/IP Protocol Suite". ACSAC 2004: 229-249
29EESteven M. Bellovin: Nuclear Weapons, Permissive Action Links, and the History of Public Key Cryptography. USENIX Security Symposium 2004
28EEWilliam Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Just fast keying: Key agreement in a hostile internet. ACM Trans. Inf. Syst. Secur. 7(2): 242-273 (2004)
27EESteven M. Bellovin: Spamming, phishing, authentication, and privacy. Commun. ACM 47(12): 144 (2004)
2003
26EESotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Design and Implementation of Virtual Private Services. WETICE 2003: 269-274
2002
25EEWilliam Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis: Efficient, DoS-resistant, secure key exchange for internet protocols. ACM Conference on Computer and Communications Security 2002: 48-58
24EESotiris Ioannidis, Steven M. Bellovin, Jonathan M. Smith: Sub-operating systems: a new approach to application security. ACM SIGOPS European Workshop 2002: 108-115
23EECarl E. Landwehr, Steven M. Bellovin: Intrusion Tolerant Systems Workshop. DSN 2002: 785-786
22EESteven M. Bellovin: A technique for counting natted hosts. Internet Measurement Workshop 2002: 267-272
21EEJohn Ioannidis, Steven M. Bellovin: Implementing Pushback: Router-Based Defense Against DDoS Attacks. NDSS 2002
20EERatul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker: Aggregate congestion control. Computer Communication Review 32(1): 69 (2002)
19EERatul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker: Controlling high bandwidth aggregates in the network. Computer Communication Review 32(3): 62-73 (2002)
2001
18 Steven M. Bellovin: Security Risks Of Peer-To-Peer Networking. NDSS 2001
17EEWilliam Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. Security Protocols Workshop 2001: 27-39
16EESotiris Ioannidis, Steven M. Bellovin: Building a Secure Web Browser. USENIX Annual Technical Conference, FREENIX Track 2001: 127-134
15EESteven M. Bellovin: Computer security - an end state? Commun. ACM 44(3): 131-132 (2001)
2000
14EESotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith: Implementing a distributed firewall. ACM Conference on Computer and Communications Security 2000: 190-199
13EEMatt Blaze, Steven M. Bellovin: Tapping on my network door. Commun. ACM 43(10): 136 (2000)
1999
12EEJohn S. Denker, Steven M. Bellovin, Hugh Daniel, Nancy L. Mintz, Tom Killian, Mark Plotnick: Moat: a Virtual Private Network Appliance and Services Platform. LISA 1999: 251-260
11EESteven M. Bellovin: Transport-Friendly ESP. NDSS 1999
10EESteven M. Bellovin: Why Do We Need More Research? NDSS 1999
9EEFred B. Schneider, Steven M. Bellovin: Evolving Telephone Networks. Commun. ACM 42(1): 160 (1999)
8 Fred B. Schneider, Steven M. Bellovin, Alan S. Inouye: Building Trustworthy Systems: Lessons from the PTN and Internet. IEEE Internet Computing 3(6): 64-72 (1999)
1998
7EESteven M. Bellovin: Cryptography and the Internet. CRYPTO 1998: 46-55
1997
6EESteven M. Bellovin: Probable Plaintext Cryptanalysis of the IP Security Protocols. NDSS 1997
5 Steven M. Bellovin: Network and Internet Security. The Computer Science and Engineering Handbook 1997: 1949-1961
1994
4 Steven M. Bellovin, Michael Merritt: An attack on the Interlock Protocol when used for authentication. IEEE Transactions on Information Theory 40(1): 273- (1994)
1993
3EESteven M. Bellovin, Michael Merritt: Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise. ACM Conference on Computer and Communications Security 1993: 244-250
1991
2 Steven M. Bellovin, Michael Merritt: Limitations of the Kerberos Authentication System. USENIX Winter 1991: 253-268
1986
1 Peter Honeyman, Steven M. Bellovin: PATHALIAS or The Care and Feeding of Relative Addresses. USENIX Summer 1986: 126-141

Coauthor Index

1William Aiello [17] [25] [28]
2Elli Androulaki [41] [42]
3Chaitanya Atreya [40]
4Adam J. Aviv [40]
5Matt Blaze [13] [17] [25] [28] [32] [38]
6Randy Bush [45]
7Ran Canetti [17] [25] [28]
8Seung Geol Choi [42]
9Hugh Daniel [12]
10John S. Denker [12]
11Whitfield Diffie [38]
12Sally Floyd [19] [20]
13Rosario Gennaro [44]
14Peter Honeyman [1]
15Alan S. Inouye [8]
16John Ioannidis [17] [19] [20] [21] [25] [26] [28]
17Sotiris Ioannidis [14] [16] [24] [26]
18Maritza L. Johnson [40]
19Gail E. Kaiser [40]
20Angelos D. Keromytis [14] [17] [25] [26] [28] [44]
21Tom Killian [12]
22Susan Landau [32] [38]
23Carl E. Landwehr [23]
24Jorge Lobo [43]
25Ratul Mahajan [19] [20]
26Tal Malkin [42]
27Michael Merritt [2] [3] [4]
28Nancy L. Mintz [12]
29Peter G. Neumann [38]
30Vern Paxson [19] [20]
31Mark Plotnick [12]
32Mariana Raykova [41]
33Omer Reingold [17] [25] [28]
34Eric Rescorla [37]
35Jennifer Rexford [38]
36Fred B. Schneider [8] [9]
37Scott Shenker [19] [20]
38Jonathan M. Smith [14] [24] [26]
39Shreyas Srivatsan [41]
40Angelos Stavrou [41]
41Moti Yung (Mordechai M. Yung) [44]
42Hang Zhao [43]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)