2009 | ||
---|---|---|
39 | EE | Katherine Everitt, Tanya Bragin, James Fogarty, Tadayoshi Kohno: A comprehensive study of frequency, interference, and training of multiple graphical passwords. CHI 2009: 889-898 |
2008 | ||
38 | David L. Dill, Tadayoshi Kohno: 2008 USENIX/ACCURATE Electronic Voting Workshop, July 28-29, 2008, San Jose, CA, USA, Proceedings USENIX Association 2008 | |
37 | EE | Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David Wetherall, Gabriel Maganis, Tadayoshi Kohno: Privacy oracle: a system for finding application leaks with black box differential testing. ACM Conference on Computer and Communications Security 2008: 279-288 |
36 | EE | Alexei Czeskis, Karl Koscher, Joshua R. Smith, Tadayoshi Kohno: RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. ACM Conference on Computer and Communications Security 2008: 479-490 |
35 | EE | Tamara Denning, Kevin Fu, Tadayoshi Kohno: Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security. HotSec 2008 |
34 | EE | Michael Piatek, Tadayoshi Kohno, Arvind Krishnamurthy: Challenges and Directions for Monitoring P2P File Sharing Networks - or - Why My Printer Received a DMCA Takedown Notice. HotSec 2008 |
33 | EE | Alexei Czeskis, David J. St. Hilaire, Karl Koscher, Steven D. Gribble, Tadayoshi Kohno, Bruce Schneier: Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications. HotSec 2008 |
32 | EE | Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, William H. Maisel: Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. IEEE Symposium on Security and Privacy 2008: 129-142 |
31 | EE | Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayoshi Kohno, Srinivasan Seshan, David Wetherall: Improving wireless privacy with an identifier-free link layer protocol. MobiSys 2008: 40-53 |
30 | EE | Charles Reis, Steven D. Gribble, Tadayoshi Kohno, Nicholas C. Weaver: Detecting In-Flight Page Changes with Web Tripwires. NSDI 2008: 31-44 |
29 | EE | Damon McCoy, Kevin S. Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas C. Sicker: Shining Light in Dark Places: Understanding the Tor Network. Privacy Enhancing Technologies 2008: 63-76 |
28 | EE | Thomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy, Tadayoshi Kohno: Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs. USENIX Security Symposium 2008: 275-290 |
27 | EE | Tadayoshi Kohno: An Interview with RFID Security Expert Ari Juels. IEEE Pervasive Computing 7(1): 10-11 (2008) |
26 | EE | Daniel Halperin, Thomas S. Heydt-Benjamin, Kevin Fu, Tadayoshi Kohno, William H. Maisel: Security and Privacy for Implantable Medical Devices. IEEE Pervasive Computing 7(1): 30-39 (2008) |
25 | EE | Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. J. Cryptology 21(3): 350-391 (2008) |
2007 | ||
24 | EE | Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, Douglas C. Sicker: Low-resource routing attacks against tor. WPES 2007: 11-20 |
23 | EE | Travis Kriplean, Evan Welbourne, Nodira Khoussainova, Vibhor Rastogi, Magdalena Balazinska, Gaetano Borriello, Tadayoshi Kohno, Dan Suciu: Physical Access Control for Captured RFID Data. IEEE Pervasive Computing 6(4): 48-55 (2007) |
2006 | ||
22 | EE | Mihir Bellare, Tadayoshi Kohno, Victor Shoup: Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. ACM Conference on Computer and Communications Security 2006: 380-389 |
21 | EE | John Kelsey, Tadayoshi Kohno: Herding Hash Functions and the Nostradamus Attack. EUROCRYPT 2006: 183-200 |
20 | EE | David Molnar, Tadayoshi Kohno, Naveen Sastry, David Wagner: Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 365-370 |
2005 | ||
19 | EE | Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. CRYPTO 2005: 205-222 |
18 | EE | Tadayoshi Kohno, Andre Broido, Kimberly C. Claffy: Remote Physical Device Fingerprinting. IEEE Symposium on Security and Privacy 2005: 211-225 |
17 | EE | Tadayoshi Kohno, Andre Broido, Kimberly C. Claffy: Remote Physical Device Fingerprintin. IEEE Trans. Dependable Sec. Comput. 2(2): 93-108 (2005) |
2004 | ||
16 | EE | Tadayoshi Kohno: Attacking and repairing the winZip encryption scheme. ACM Conference on Computer and Communications Security 2004: 72-81 |
15 | EE | Mihir Bellare, Tadayoshi Kohno: Hash Function Balance and Its Impact on Birthday Attacks. EUROCRYPT 2004: 401-418 |
14 | EE | Tadayoshi Kohno, John Viega, Doug Whiting: CWC: A High-Performance Conventional Authenticated Encryption Mode. FSE 2004: 408-426 |
13 | EE | Tetsu Iwata, Tadayoshi Kohno: New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. FSE 2004: 427-445 |
12 | EE | Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach: Analysis of an Electronic Voting System. IEEE Symposium on Security and Privacy 2004: 27- |
11 | EE | Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre: Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. ACM Trans. Inf. Syst. Secur. 7(2): 206-241 (2004) |
2003 | ||
10 | EE | Mihir Bellare, Tadayoshi Kohno: A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications. EUROCRYPT 2003: 491-506 |
9 | EE | Lars R. Knudsen, Tadayoshi Kohno: Analysis of RMAC. FSE 2003: 182-191 |
8 | EE | Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno: Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. FSE 2003: 330-346 |
2002 | ||
7 | EE | Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre: Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. ACM Conference on Computer and Communications Security 2002: 1-11 |
6 | EE | John Viega, J. T. Bloch, Tadayoshi Kohno, Gary McGraw: Token-based scanning of source code for security problems. ACM Trans. Inf. Syst. Secur. 5(3): 238-261 (2002) |
2001 | ||
5 | EE | Tadayoshi Kohno, Mark McGovern: On the Global Content PMI: Improved Copy-Protected Internet Content Distribution. Financial Cryptography 2001: 70-81 |
4 | Harold N. Gabow, Tadayoshi Kohno: A Network-Flow-Based Scheduler: Design, Performance History, and Experimental Analysis. ACM Journal of Experimental Algorithmics 6: 3 (2001) | |
3 | EE | John Viega, Tadayoshi Kohno, Bruce Potter: Trust (and mistrust) in secure applications. Commun. ACM 44(2): 31-36 (2001) |
2000 | ||
2 | Tadayoshi Kohno, John Kelsey, Bruce Schneier: Preliminary Cryptanalysis of Reduced-Round Serpent. AES Candidate Conference 2000: 195-211 | |
1 | EE | John Kelsey, Tadayoshi Kohno, Bruce Schneier: Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. FSE 2000: 75-93 |