2009 |
45 | EE | Steven M. Bellovin,
Randy Bush:
Configuration management and security.
IEEE Journal on Selected Areas in Communications 27(3): 268-274 (2009) |
2008 |
44 | | Steven M. Bellovin,
Rosario Gennaro,
Angelos D. Keromytis,
Moti Yung:
Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings
ACNS 2008 |
43 | EE | Hang Zhao,
Jorge Lobo,
Steven M. Bellovin:
An Algebra for Integration and Analysis of Ponder2 Policies.
POLICY 2008: 74-77 |
42 | EE | Elli Androulaki,
Seung Geol Choi,
Steven M. Bellovin,
Tal Malkin:
Reputation Systems for Anonymous Networks.
Privacy Enhancing Technologies 2008: 202-218 |
41 | EE | Elli Androulaki,
Mariana Raykova,
Shreyas Srivatsan,
Angelos Stavrou,
Steven M. Bellovin:
PAR: Payment for Anonymous Routing.
Privacy Enhancing Technologies 2008: 219-236 |
40 | EE | Maritza L. Johnson,
Chaitanya Atreya,
Adam J. Aviv,
Steven M. Bellovin,
Gail E. Kaiser:
RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies.
UPSEC 2008 |
39 | EE | Steven M. Bellovin:
The physical world and the real world.
Commun. ACM 51(5): 104 (2008) |
2007 |
38 | EE | Steven M. Bellovin,
Matt Blaze,
Whitfield Diffie,
Susan Landau,
Jennifer Rexford,
Peter G. Neumann:
Internal surveillance, external risks.
Commun. ACM 50(12): 128 (2007) |
2006 |
37 | EE | Steven M. Bellovin,
Eric Rescorla:
Deploying a New Hash Algorithm.
NDSS 2006 |
36 | EE | Steven M. Bellovin:
Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography.
USENIX Annual Technical Conference, General Track 2006 |
35 | | Steven M. Bellovin:
Privacy & Cryptography.
USENIX Annual Technical Conference, General Track 2006 |
34 | EE | Steven M. Bellovin:
Virtual machines, virtual security?
Commun. ACM 49(10): 104 (2006) |
33 | EE | Steven M. Bellovin:
Unconventional Wisdom.
IEEE Security & Privacy 4(1): 88 (2006) |
2005 |
32 | EE | Steven M. Bellovin,
Matt Blaze,
Susan Landau:
The real national-security needs for VoIP.
Commun. ACM 48(11): 120 (2005) |
31 | EE | Steven M. Bellovin:
Security and Privacy: Enemies or Allies?
IEEE Security & Privacy 3(3): 92 (2005) |
2004 |
30 | EE | Steven M. Bellovin:
A Look Back at "Security Problems in the TCP/IP Protocol Suite".
ACSAC 2004: 229-249 |
29 | EE | Steven M. Bellovin:
Nuclear Weapons, Permissive Action Links, and the History of Public Key Cryptography.
USENIX Security Symposium 2004 |
28 | EE | William Aiello,
Steven M. Bellovin,
Matt Blaze,
Ran Canetti,
John Ioannidis,
Angelos D. Keromytis,
Omer Reingold:
Just fast keying: Key agreement in a hostile internet.
ACM Trans. Inf. Syst. Secur. 7(2): 242-273 (2004) |
27 | EE | Steven M. Bellovin:
Spamming, phishing, authentication, and privacy.
Commun. ACM 47(12): 144 (2004) |
2003 |
26 | EE | Sotiris Ioannidis,
Steven M. Bellovin,
John Ioannidis,
Angelos D. Keromytis,
Jonathan M. Smith:
Design and Implementation of Virtual Private Services.
WETICE 2003: 269-274 |
2002 |
25 | EE | William Aiello,
Steven M. Bellovin,
Matt Blaze,
John Ioannidis,
Omer Reingold,
Ran Canetti,
Angelos D. Keromytis:
Efficient, DoS-resistant, secure key exchange for internet protocols.
ACM Conference on Computer and Communications Security 2002: 48-58 |
24 | EE | Sotiris Ioannidis,
Steven M. Bellovin,
Jonathan M. Smith:
Sub-operating systems: a new approach to application security.
ACM SIGOPS European Workshop 2002: 108-115 |
23 | EE | Carl E. Landwehr,
Steven M. Bellovin:
Intrusion Tolerant Systems Workshop.
DSN 2002: 785-786 |
22 | EE | Steven M. Bellovin:
A technique for counting natted hosts.
Internet Measurement Workshop 2002: 267-272 |
21 | EE | John Ioannidis,
Steven M. Bellovin:
Implementing Pushback: Router-Based Defense Against DDoS Attacks.
NDSS 2002 |
20 | EE | Ratul Mahajan,
Steven M. Bellovin,
Sally Floyd,
John Ioannidis,
Vern Paxson,
Scott Shenker:
Aggregate congestion control.
Computer Communication Review 32(1): 69 (2002) |
19 | EE | Ratul Mahajan,
Steven M. Bellovin,
Sally Floyd,
John Ioannidis,
Vern Paxson,
Scott Shenker:
Controlling high bandwidth aggregates in the network.
Computer Communication Review 32(3): 62-73 (2002) |
2001 |
18 | | Steven M. Bellovin:
Security Risks Of Peer-To-Peer Networking.
NDSS 2001 |
17 | EE | William Aiello,
Steven M. Bellovin,
Matt Blaze,
Ran Canetti,
John Ioannidis,
Angelos D. Keromytis,
Omer Reingold:
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols.
Security Protocols Workshop 2001: 27-39 |
16 | EE | Sotiris Ioannidis,
Steven M. Bellovin:
Building a Secure Web Browser.
USENIX Annual Technical Conference, FREENIX Track 2001: 127-134 |
15 | EE | Steven M. Bellovin:
Computer security - an end state?
Commun. ACM 44(3): 131-132 (2001) |
2000 |
14 | EE | Sotiris Ioannidis,
Angelos D. Keromytis,
Steven M. Bellovin,
Jonathan M. Smith:
Implementing a distributed firewall.
ACM Conference on Computer and Communications Security 2000: 190-199 |
13 | EE | Matt Blaze,
Steven M. Bellovin:
Tapping on my network door.
Commun. ACM 43(10): 136 (2000) |
1999 |
12 | EE | John S. Denker,
Steven M. Bellovin,
Hugh Daniel,
Nancy L. Mintz,
Tom Killian,
Mark Plotnick:
Moat: a Virtual Private Network Appliance and Services Platform.
LISA 1999: 251-260 |
11 | EE | Steven M. Bellovin:
Transport-Friendly ESP.
NDSS 1999 |
10 | EE | Steven M. Bellovin:
Why Do We Need More Research?
NDSS 1999 |
9 | EE | Fred B. Schneider,
Steven M. Bellovin:
Evolving Telephone Networks.
Commun. ACM 42(1): 160 (1999) |
8 | | Fred B. Schneider,
Steven M. Bellovin,
Alan S. Inouye:
Building Trustworthy Systems: Lessons from the PTN and Internet.
IEEE Internet Computing 3(6): 64-72 (1999) |
1998 |
7 | EE | Steven M. Bellovin:
Cryptography and the Internet.
CRYPTO 1998: 46-55 |
1997 |
6 | EE | Steven M. Bellovin:
Probable Plaintext Cryptanalysis of the IP Security Protocols.
NDSS 1997 |
5 | | Steven M. Bellovin:
Network and Internet Security.
The Computer Science and Engineering Handbook 1997: 1949-1961 |
1994 |
4 | | Steven M. Bellovin,
Michael Merritt:
An attack on the Interlock Protocol when used for authentication.
IEEE Transactions on Information Theory 40(1): 273- (1994) |
1993 |
3 | EE | Steven M. Bellovin,
Michael Merritt:
Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise.
ACM Conference on Computer and Communications Security 1993: 244-250 |
1991 |
2 | | Steven M. Bellovin,
Michael Merritt:
Limitations of the Kerberos Authentication System.
USENIX Winter 1991: 253-268 |
1986 |
1 | | Peter Honeyman,
Steven M. Bellovin:
PATHALIAS or The Care and Feeding of Relative Addresses.
USENIX Summer 1986: 126-141 |