2009 |
12 | EE | Debra L. Cook,
Vijay K. Gurbani,
Michael Daniluk:
Phishwish: a simple and stateless phishing filter.
Security and Communication Networks 2(1): 29-43 (2009) |
2008 |
11 | EE | Debra L. Cook,
Moti Yung,
Angelos D. Keromytis:
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers.
ACISP 2008: 187-202 |
10 | EE | Debra L. Cook,
Vijay K. Gurbani,
Michael Daniluk:
Phishwish: A Stateless Phishing Filter Using Minimal Rules.
Financial Cryptography 2008: 182-186 |
9 | EE | Debra L. Cook,
Moti Yung,
Angelos D. Keromytis:
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs.
Inscrypt 2008: 157-180 |
2007 |
8 | EE | Debra L. Cook,
Angelos D. Keromytis,
Moti Yung:
Elastic block ciphers: the basic design.
ASIACCS 2007: 350-352 |
7 | | Vijay K. Gurbani,
Debra L. Cook,
Lawrence E. Menten,
Thomas B. Reddington:
A Case Study on Constructing a Security Event Management System.
IMF 2007: 83-102 |
6 | EE | Debra L. Cook,
Moti Yung,
Angelos D. Keromytis:
The Security of Elastic Block Ciphers Against Key-Recovery Attacks.
ISC 2007: 89-103 |
2005 |
5 | EE | Debra L. Cook,
John Ioannidis,
Angelos D. Keromytis,
Jake Luck:
CryptoGraphics: Secret Key Cryptography Using Graphics Cards.
CT-RSA 2005: 334-350 |
4 | EE | Debra L. Cook,
Ricardo A. Baratto,
Angelos D. Keromytis:
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware.
ICICS 2005: 363-375 |
3 | EE | Debra L. Cook,
Angelos D. Keromytis:
Conversion and Proxy Functions for Symmetric Key Ciphers.
ITCC (1) 2005: 662-667 |
2 | EE | Angelos Stavrou,
Debra L. Cook,
William G. Morein,
Angelos D. Keromytis,
Vishal Misra,
Dan Rubenstein:
WebSOS: an overlay-based system for protecting web servers from denial of service attacks.
Computer Networks 48(5): 781-807 (2005) |
2003 |
1 | EE | William G. Morein,
Angelos Stavrou,
Debra L. Cook,
Angelos D. Keromytis,
Vishal Misra,
Dan Rubenstein:
Using graphic turing tests to counter automated DDoS attacks against web servers.
ACM Conference on Computer and Communications Security 2003: 8-19 |