2006 |
15 | EE | Stephen T. Kent:
An Infrastructure Supporting Secure Internet Routing.
EuroPKI 2006: 116-129 |
2003 |
14 | EE | Stephen T. Kent:
Securing the Border Gateway Protocol: A Status Update.
Communications and Multimedia Security 2003: 40-53 |
2002 |
13 | EE | Stephen T. Kent:
Rethinking PKI: What's Trust Got to Do with It?
EUROCRYPT 2002: 398-399 |
12 | EE | Alex C. Snoeren,
Craig Partridge,
Luis A. Sanchez,
Christine E. Jones,
Fabrice Tchakountio,
Beverly Schwartz,
Stephen T. Kent,
W. Timothy Strayer:
Single-packet IP traceback.
IEEE/ACM Trans. Netw. 10(6): 721-734 (2002) |
2000 |
11 | EE | Stephen T. Kent,
Charles Lynn,
Joanne Mikkelson,
Karen Seo:
Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues.
NDSS 2000 |
1999 |
10 | EE | Stephen T. Kent:
Network Security: Then and Now, or, 20 Years in 10 Minutes.
IEEE Symposium on Security and Privacy 1999: 117 |
9 | EE | Stephen T. Kent:
R&D Challenges: Notes from the "Trust in Cyberspace" Report.
NDSS 1999 |
8 | EE | John Zao,
Stephen T. Kent,
Joshua Gahm,
Gregory Troxel,
Matthew Condell,
Pam Helinek,
Nina Yuan,
Isidro Castineyra:
A public-key based secure Mobile IP.
Wireless Networks 5(5): 373-390 (1999) |
1997 |
7 | EE | John Zao,
Stephen T. Kent,
Joshua Gahm,
Gregory Troxel,
Matthew Condell,
Pam Helinek,
Nina Yuan,
Isidro Castineyra:
A Public-Key Based Secure Mobile IP.
MOBICOM 1997: 173-184 |
6 | EE | Karen E. Sirois,
Stephen T. Kent:
Securing the Nimrod Routing Architecture.
NDSS 1997 |
1994 |
5 | | Susan Landau,
Stephen T. Kent,
Clint Brooks,
Scott Charney,
Dorothy E. Denning,
Whitfield Diffie,
Anthony Lauck,
Douglas Miller,
Peter G. Neumann,
David Sobel:
Crypto Policy Perspectives.
Commun. ACM 37(8): 115-121 (1994) |
1993 |
4 | | Stephen T. Kent:
Internet Privacy Enhanced Mail.
Commun. ACM 36(8): 48-60 (1993) |
1984 |
3 | | Victor L. Voydock,
Stephen T. Kent:
Security Mechanisms in a Transport Layer Protocol.
Computer Networks 8: 433-449 (1984) |
1983 |
2 | | Victor L. Voydock,
Stephen T. Kent:
Security Mechanisms in High-Level Network Protocols.
ACM Comput. Surv. 15(2): 135-171 (1983) |
1981 |
1 | | Stephen T. Kent:
Some Cryptographic Techniques for File Protection.
CRYPTO 1981: 80 |