2009 | ||
---|---|---|
45 | EE | Steven M. Bellovin, Randy Bush: Configuration management and security. IEEE Journal on Selected Areas in Communications 27(3): 268-274 (2009) |
2008 | ||
44 | Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ACNS 2008 | |
43 | EE | Hang Zhao, Jorge Lobo, Steven M. Bellovin: An Algebra for Integration and Analysis of Ponder2 Policies. POLICY 2008: 74-77 |
42 | EE | Elli Androulaki, Seung Geol Choi, Steven M. Bellovin, Tal Malkin: Reputation Systems for Anonymous Networks. Privacy Enhancing Technologies 2008: 202-218 |
41 | EE | Elli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, Steven M. Bellovin: PAR: Payment for Anonymous Routing. Privacy Enhancing Technologies 2008: 219-236 |
40 | EE | Maritza L. Johnson, Chaitanya Atreya, Adam J. Aviv, Steven M. Bellovin, Gail E. Kaiser: RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies. UPSEC 2008 |
39 | EE | Steven M. Bellovin: The physical world and the real world. Commun. ACM 51(5): 104 (2008) |
2007 | ||
38 | EE | Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Jennifer Rexford, Peter G. Neumann: Internal surveillance, external risks. Commun. ACM 50(12): 128 (2007) |
2006 | ||
37 | EE | Steven M. Bellovin, Eric Rescorla: Deploying a New Hash Algorithm. NDSS 2006 |
36 | EE | Steven M. Bellovin: Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography. USENIX Annual Technical Conference, General Track 2006 |
35 | Steven M. Bellovin: Privacy & Cryptography. USENIX Annual Technical Conference, General Track 2006 | |
34 | EE | Steven M. Bellovin: Virtual machines, virtual security? Commun. ACM 49(10): 104 (2006) |
33 | EE | Steven M. Bellovin: Unconventional Wisdom. IEEE Security & Privacy 4(1): 88 (2006) |
2005 | ||
32 | EE | Steven M. Bellovin, Matt Blaze, Susan Landau: The real national-security needs for VoIP. Commun. ACM 48(11): 120 (2005) |
31 | EE | Steven M. Bellovin: Security and Privacy: Enemies or Allies? IEEE Security & Privacy 3(3): 92 (2005) |
2004 | ||
30 | EE | Steven M. Bellovin: A Look Back at "Security Problems in the TCP/IP Protocol Suite". ACSAC 2004: 229-249 |
29 | EE | Steven M. Bellovin: Nuclear Weapons, Permissive Action Links, and the History of Public Key Cryptography. USENIX Security Symposium 2004 |
28 | EE | William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Just fast keying: Key agreement in a hostile internet. ACM Trans. Inf. Syst. Secur. 7(2): 242-273 (2004) |
27 | EE | Steven M. Bellovin: Spamming, phishing, authentication, and privacy. Commun. ACM 47(12): 144 (2004) |
2003 | ||
26 | EE | Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Design and Implementation of Virtual Private Services. WETICE 2003: 269-274 |
2002 | ||
25 | EE | William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis: Efficient, DoS-resistant, secure key exchange for internet protocols. ACM Conference on Computer and Communications Security 2002: 48-58 |
24 | EE | Sotiris Ioannidis, Steven M. Bellovin, Jonathan M. Smith: Sub-operating systems: a new approach to application security. ACM SIGOPS European Workshop 2002: 108-115 |
23 | EE | Carl E. Landwehr, Steven M. Bellovin: Intrusion Tolerant Systems Workshop. DSN 2002: 785-786 |
22 | EE | Steven M. Bellovin: A technique for counting natted hosts. Internet Measurement Workshop 2002: 267-272 |
21 | EE | John Ioannidis, Steven M. Bellovin: Implementing Pushback: Router-Based Defense Against DDoS Attacks. NDSS 2002 |
20 | EE | Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker: Aggregate congestion control. Computer Communication Review 32(1): 69 (2002) |
19 | EE | Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker: Controlling high bandwidth aggregates in the network. Computer Communication Review 32(3): 62-73 (2002) |
2001 | ||
18 | Steven M. Bellovin: Security Risks Of Peer-To-Peer Networking. NDSS 2001 | |
17 | EE | William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. Security Protocols Workshop 2001: 27-39 |
16 | EE | Sotiris Ioannidis, Steven M. Bellovin: Building a Secure Web Browser. USENIX Annual Technical Conference, FREENIX Track 2001: 127-134 |
15 | EE | Steven M. Bellovin: Computer security - an end state? Commun. ACM 44(3): 131-132 (2001) |
2000 | ||
14 | EE | Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith: Implementing a distributed firewall. ACM Conference on Computer and Communications Security 2000: 190-199 |
13 | EE | Matt Blaze, Steven M. Bellovin: Tapping on my network door. Commun. ACM 43(10): 136 (2000) |
1999 | ||
12 | EE | John S. Denker, Steven M. Bellovin, Hugh Daniel, Nancy L. Mintz, Tom Killian, Mark Plotnick: Moat: a Virtual Private Network Appliance and Services Platform. LISA 1999: 251-260 |
11 | EE | Steven M. Bellovin: Transport-Friendly ESP. NDSS 1999 |
10 | EE | Steven M. Bellovin: Why Do We Need More Research? NDSS 1999 |
9 | EE | Fred B. Schneider, Steven M. Bellovin: Evolving Telephone Networks. Commun. ACM 42(1): 160 (1999) |
8 | Fred B. Schneider, Steven M. Bellovin, Alan S. Inouye: Building Trustworthy Systems: Lessons from the PTN and Internet. IEEE Internet Computing 3(6): 64-72 (1999) | |
1998 | ||
7 | EE | Steven M. Bellovin: Cryptography and the Internet. CRYPTO 1998: 46-55 |
1997 | ||
6 | EE | Steven M. Bellovin: Probable Plaintext Cryptanalysis of the IP Security Protocols. NDSS 1997 |
5 | Steven M. Bellovin: Network and Internet Security. The Computer Science and Engineering Handbook 1997: 1949-1961 | |
1994 | ||
4 | Steven M. Bellovin, Michael Merritt: An attack on the Interlock Protocol when used for authentication. IEEE Transactions on Information Theory 40(1): 273- (1994) | |
1993 | ||
3 | EE | Steven M. Bellovin, Michael Merritt: Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise. ACM Conference on Computer and Communications Security 1993: 244-250 |
1991 | ||
2 | Steven M. Bellovin, Michael Merritt: Limitations of the Kerberos Authentication System. USENIX Winter 1991: 253-268 | |
1986 | ||
1 | Peter Honeyman, Steven M. Bellovin: PATHALIAS or The Care and Feeding of Relative Addresses. USENIX Summer 1986: 126-141 |