dblp.uni-trier.dewww.uni-trier.de

Stephen T. Kent

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
15EEStephen T. Kent: An Infrastructure Supporting Secure Internet Routing. EuroPKI 2006: 116-129
2003
14EEStephen T. Kent: Securing the Border Gateway Protocol: A Status Update. Communications and Multimedia Security 2003: 40-53
2002
13EEStephen T. Kent: Rethinking PKI: What's Trust Got to Do with It? EUROCRYPT 2002: 398-399
12EEAlex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Beverly Schwartz, Stephen T. Kent, W. Timothy Strayer: Single-packet IP traceback. IEEE/ACM Trans. Netw. 10(6): 721-734 (2002)
2000
11EEStephen T. Kent, Charles Lynn, Joanne Mikkelson, Karen Seo: Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues. NDSS 2000
1999
10EEStephen T. Kent: Network Security: Then and Now, or, 20 Years in 10 Minutes. IEEE Symposium on Security and Privacy 1999: 117
9EEStephen T. Kent: R&D Challenges: Notes from the "Trust in Cyberspace" Report. NDSS 1999
8EEJohn Zao, Stephen T. Kent, Joshua Gahm, Gregory Troxel, Matthew Condell, Pam Helinek, Nina Yuan, Isidro Castineyra: A public-key based secure Mobile IP. Wireless Networks 5(5): 373-390 (1999)
1997
7EEJohn Zao, Stephen T. Kent, Joshua Gahm, Gregory Troxel, Matthew Condell, Pam Helinek, Nina Yuan, Isidro Castineyra: A Public-Key Based Secure Mobile IP. MOBICOM 1997: 173-184
6EEKaren E. Sirois, Stephen T. Kent: Securing the Nimrod Routing Architecture. NDSS 1997
1994
5 Susan Landau, Stephen T. Kent, Clint Brooks, Scott Charney, Dorothy E. Denning, Whitfield Diffie, Anthony Lauck, Douglas Miller, Peter G. Neumann, David Sobel: Crypto Policy Perspectives. Commun. ACM 37(8): 115-121 (1994)
1993
4 Stephen T. Kent: Internet Privacy Enhanced Mail. Commun. ACM 36(8): 48-60 (1993)
1984
3 Victor L. Voydock, Stephen T. Kent: Security Mechanisms in a Transport Layer Protocol. Computer Networks 8: 433-449 (1984)
1983
2 Victor L. Voydock, Stephen T. Kent: Security Mechanisms in High-Level Network Protocols. ACM Comput. Surv. 15(2): 135-171 (1983)
1981
1 Stephen T. Kent: Some Cryptographic Techniques for File Protection. CRYPTO 1981: 80

Coauthor Index

1Clint Brooks [5]
2Isidro Castineyra [7] [8]
3Scott Charney [5]
4Matthew Condell [7] [8]
5Dorothy E. Denning [5]
6Whitfield Diffie [5]
7Joshua Gahm [7] [8]
8Pam Helinek [7] [8]
9Christine E. Jones [12]
10Susan Landau [5]
11Anthony Lauck [5]
12Charles Lynn [11]
13Joanne Mikkelson [11]
14Douglas Miller [5]
15Peter G. Neumann [5]
16Craig Partridge [12]
17Luis A. Sanchez [12]
18Beverly Schwartz [12]
19Karen Seo [11]
20Karen E. Sirois [6]
21Alex C. Snoeren [12]
22David Sobel [5]
23W. Timothy Strayer [12]
24Fabrice Tchakountio [12]
25Gregory Troxel [7] [8]
26Victor L. Voydock [2] [3]
27Nina Yuan [7] [8]
28John Zao [7] [8]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)