2009 |
39 | EE | Katherine Everitt,
Tanya Bragin,
James Fogarty,
Tadayoshi Kohno:
A comprehensive study of frequency, interference, and training of multiple graphical passwords.
CHI 2009: 889-898 |
2008 |
38 | | David L. Dill,
Tadayoshi Kohno:
2008 USENIX/ACCURATE Electronic Voting Workshop, July 28-29, 2008, San Jose, CA, USA, Proceedings
USENIX Association 2008 |
37 | EE | Jaeyeon Jung,
Anmol Sheth,
Ben Greenstein,
David Wetherall,
Gabriel Maganis,
Tadayoshi Kohno:
Privacy oracle: a system for finding application leaks with black box differential testing.
ACM Conference on Computer and Communications Security 2008: 279-288 |
36 | EE | Alexei Czeskis,
Karl Koscher,
Joshua R. Smith,
Tadayoshi Kohno:
RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications.
ACM Conference on Computer and Communications Security 2008: 479-490 |
35 | EE | Tamara Denning,
Kevin Fu,
Tadayoshi Kohno:
Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security.
HotSec 2008 |
34 | EE | Michael Piatek,
Tadayoshi Kohno,
Arvind Krishnamurthy:
Challenges and Directions for Monitoring P2P File Sharing Networks - or - Why My Printer Received a DMCA Takedown Notice.
HotSec 2008 |
33 | EE | Alexei Czeskis,
David J. St. Hilaire,
Karl Koscher,
Steven D. Gribble,
Tadayoshi Kohno,
Bruce Schneier:
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications.
HotSec 2008 |
32 | EE | Daniel Halperin,
Thomas S. Heydt-Benjamin,
Benjamin Ransford,
Shane S. Clark,
Benessa Defend,
Will Morgan,
Kevin Fu,
Tadayoshi Kohno,
William H. Maisel:
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses.
IEEE Symposium on Security and Privacy 2008: 129-142 |
31 | EE | Ben Greenstein,
Damon McCoy,
Jeffrey Pang,
Tadayoshi Kohno,
Srinivasan Seshan,
David Wetherall:
Improving wireless privacy with an identifier-free link layer protocol.
MobiSys 2008: 40-53 |
30 | EE | Charles Reis,
Steven D. Gribble,
Tadayoshi Kohno,
Nicholas C. Weaver:
Detecting In-Flight Page Changes with Web Tripwires.
NSDI 2008: 31-44 |
29 | EE | Damon McCoy,
Kevin S. Bauer,
Dirk Grunwald,
Tadayoshi Kohno,
Douglas C. Sicker:
Shining Light in Dark Places: Understanding the Tor Network.
Privacy Enhancing Technologies 2008: 63-76 |
28 | EE | Thomas Ristenpart,
Gabriel Maganis,
Arvind Krishnamurthy,
Tadayoshi Kohno:
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs.
USENIX Security Symposium 2008: 275-290 |
27 | EE | Tadayoshi Kohno:
An Interview with RFID Security Expert Ari Juels.
IEEE Pervasive Computing 7(1): 10-11 (2008) |
26 | EE | Daniel Halperin,
Thomas S. Heydt-Benjamin,
Kevin Fu,
Tadayoshi Kohno,
William H. Maisel:
Security and Privacy for Implantable Medical Devices.
IEEE Pervasive Computing 7(1): 30-39 (2008) |
25 | EE | Michel Abdalla,
Mihir Bellare,
Dario Catalano,
Eike Kiltz,
Tadayoshi Kohno,
Tanja Lange,
John Malone-Lee,
Gregory Neven,
Pascal Paillier,
Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
J. Cryptology 21(3): 350-391 (2008) |
2007 |
24 | EE | Kevin S. Bauer,
Damon McCoy,
Dirk Grunwald,
Tadayoshi Kohno,
Douglas C. Sicker:
Low-resource routing attacks against tor.
WPES 2007: 11-20 |
23 | EE | Travis Kriplean,
Evan Welbourne,
Nodira Khoussainova,
Vibhor Rastogi,
Magdalena Balazinska,
Gaetano Borriello,
Tadayoshi Kohno,
Dan Suciu:
Physical Access Control for Captured RFID Data.
IEEE Pervasive Computing 6(4): 48-55 (2007) |
2006 |
22 | EE | Mihir Bellare,
Tadayoshi Kohno,
Victor Shoup:
Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation.
ACM Conference on Computer and Communications Security 2006: 380-389 |
21 | EE | John Kelsey,
Tadayoshi Kohno:
Herding Hash Functions and the Nostradamus Attack.
EUROCRYPT 2006: 183-200 |
20 | EE | David Molnar,
Tadayoshi Kohno,
Naveen Sastry,
David Wagner:
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract).
IEEE Symposium on Security and Privacy 2006: 365-370 |
2005 |
19 | EE | Michel Abdalla,
Mihir Bellare,
Dario Catalano,
Eike Kiltz,
Tadayoshi Kohno,
Tanja Lange,
John Malone-Lee,
Gregory Neven,
Pascal Paillier,
Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
CRYPTO 2005: 205-222 |
18 | EE | Tadayoshi Kohno,
Andre Broido,
Kimberly C. Claffy:
Remote Physical Device Fingerprinting.
IEEE Symposium on Security and Privacy 2005: 211-225 |
17 | EE | Tadayoshi Kohno,
Andre Broido,
Kimberly C. Claffy:
Remote Physical Device Fingerprintin.
IEEE Trans. Dependable Sec. Comput. 2(2): 93-108 (2005) |
2004 |
16 | EE | Tadayoshi Kohno:
Attacking and repairing the winZip encryption scheme.
ACM Conference on Computer and Communications Security 2004: 72-81 |
15 | EE | Mihir Bellare,
Tadayoshi Kohno:
Hash Function Balance and Its Impact on Birthday Attacks.
EUROCRYPT 2004: 401-418 |
14 | EE | Tadayoshi Kohno,
John Viega,
Doug Whiting:
CWC: A High-Performance Conventional Authenticated Encryption Mode.
FSE 2004: 408-426 |
13 | EE | Tetsu Iwata,
Tadayoshi Kohno:
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms.
FSE 2004: 427-445 |
12 | EE | Tadayoshi Kohno,
Adam Stubblefield,
Aviel D. Rubin,
Dan S. Wallach:
Analysis of an Electronic Voting System.
IEEE Symposium on Security and Privacy 2004: 27- |
11 | EE | Mihir Bellare,
Tadayoshi Kohno,
Chanathip Namprempre:
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm.
ACM Trans. Inf. Syst. Secur. 7(2): 206-241 (2004) |
2003 |
10 | EE | Mihir Bellare,
Tadayoshi Kohno:
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications.
EUROCRYPT 2003: 491-506 |
9 | EE | Lars R. Knudsen,
Tadayoshi Kohno:
Analysis of RMAC.
FSE 2003: 182-191 |
8 | EE | Niels Ferguson,
Doug Whiting,
Bruce Schneier,
John Kelsey,
Stefan Lucks,
Tadayoshi Kohno:
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive.
FSE 2003: 330-346 |
2002 |
7 | EE | Mihir Bellare,
Tadayoshi Kohno,
Chanathip Namprempre:
Authenticated encryption in SSH: provably fixing the SSH binary packet protocol.
ACM Conference on Computer and Communications Security 2002: 1-11 |
6 | EE | John Viega,
J. T. Bloch,
Tadayoshi Kohno,
Gary McGraw:
Token-based scanning of source code for security problems.
ACM Trans. Inf. Syst. Secur. 5(3): 238-261 (2002) |
2001 |
5 | EE | Tadayoshi Kohno,
Mark McGovern:
On the Global Content PMI: Improved Copy-Protected Internet Content Distribution.
Financial Cryptography 2001: 70-81 |
4 | | Harold N. Gabow,
Tadayoshi Kohno:
A Network-Flow-Based Scheduler: Design, Performance History, and Experimental Analysis.
ACM Journal of Experimental Algorithmics 6: 3 (2001) |
3 | EE | John Viega,
Tadayoshi Kohno,
Bruce Potter:
Trust (and mistrust) in secure applications.
Commun. ACM 44(2): 31-36 (2001) |
2000 |
2 | | Tadayoshi Kohno,
John Kelsey,
Bruce Schneier:
Preliminary Cryptanalysis of Reduced-Round Serpent.
AES Candidate Conference 2000: 195-211 |
1 | EE | John Kelsey,
Tadayoshi Kohno,
Bruce Schneier:
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent.
FSE 2000: 75-93 |