dblp.uni-trier.dewww.uni-trier.de

Simson L. Garfinkel

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
22EESimson L. Garfinkel: Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools. IJDCF 1(1): 1-28 (2009)
2008
21EESimson L. Garfinkel: IRBs and Security Research: Myths, Facts and Mission Creep. UPSEC 2008
2007
20EEIvan Krstic, Simson L. Garfinkel: Bitfrost: the one laptop per child security model. SOUPS 2007: 132-142
19EESimson L. Garfinkel: Complete delete vs. time machine computing. Operating Systems Review 41(1): 42-44 (2007)
2006
18EEMin Wu, Robert C. Miller, Simson L. Garfinkel: Do security toolbars actually prevent phishing attacks? CHI 2006: 601-610
17 Simson L. Garfinkel, David J. Malan, Karl-Alexander Dubec, Christopher C. Stevens, Cecile Pham: AFF: An Open Extensible Format for Disk Imaging. IFIP Int. Conf. Digital Forensics 2006: 13-27
16EEUri Braun, Simson L. Garfinkel, David A. Holland, Kiran-Kumar Muniswamy-Reddy, Margo I. Seltzer: Issues in Automatic Provenance Collection. IPAW 2006: 171-183
15EESimson L. Garfinkel, David J. Malan: One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique. Privacy Enhancing Technologies 2006: 135-151
14EESimson L. Garfinkel: AFF: a new format for storing hard drive images. Commun. ACM 49(2): 85-87 (2006)
13EESimson L. Garfinkel: Forensic feature extraction and cross-drive analysis. Digital Investigation 3(Supplement-1): 71-81 (2006)
2005
12EESimson L. Garfinkel, David Margrave, Jeffrey I. Schiller, Erik Nordlander, Robert C. Miller: How to make secure email easier to use. CHI 2005: 701-710
11EESimson L. Garfinkel, Jeffrey I. Schiller, Erik Nordlander, David Margrave, Robert C. Miller: Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce. Financial Cryptography 2005: 188-202
10EESimson L. Garfinkel, Robert C. Miller: Johnny 2: a user test of key continuity management with S/MIME and Outlook Express. SOUPS 2005: 13-24
9EESimson L. Garfinkel, Ari Juels, Ravikanth Pappu: RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Security & Privacy 3(3): 34-43 (2005)
2004
8EESimson L. Garfinkel: Used Disk Drives. LISA 2004
7EELorrie Faith Cranor, Simson L. Garfinkel: Guest Editors' Introduction: Secure or Usable? IEEE Security & Privacy 2(5): 16-18 (2004)
2003
6EESimson L. Garfinkel: Enabling Email Confidentiality through the use of Opportunistic Encryption. DG.O 2003
5EESimson L. Garfinkel: Leaderless resistance today. First Monday 8(3): (2003)
4EESimson L. Garfinkel, Abhi Shelat: IEEE Security & Privacy: Data Forensics - Rememberance of Data Passed: A Study of Disk Sanitization Practices. IEEE Distributed Systems Online 4(2): (2003)
3EESimson L. Garfinkel, Abhi Shelat: Remembrance of Data Passed: A Study of Disk Sanitization Practices. IEEE Security & Privacy 1(1): 17-27 (2003)
2EESimson L. Garfinkel: Email-Based Identification and Authentication: An Alternative to PKI? IEEE Security & Privacy 1(6): 20-26 (2003)
1995
1 Simson L. Garfinkel: Risks of Social Security Numbers. Commun. ACM 38(10): 146 (1995)

Coauthor Index

1Uri Braun [16]
2Lorrie Faith Cranor [7]
3Karl-Alexander Dubec [17]
4David A. Holland [16]
5Ari Juels [9]
6Ivan Krstic [20]
7David J. Malan [15] [17]
8David Margrave [11] [12]
9Rob Miller (Robert C. Miller) [10] [11] [12] [18]
10Kiran-Kumar Muniswamy-Reddy [16]
11Erik Nordlander [11] [12]
12Ravikanth Pappu [9]
13Cecile Pham [17]
14Jeffrey I. Schiller [11] [12]
15Margo I. Seltzer [16]
16Abhi Shelat [3] [4]
17Christopher C. Stevens [17]
18Min Wu [18]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)