2007 | ||
---|---|---|
49 | EE | Sujata Garera, Aviel D. Rubin: An independent audit framework for software dependent voting systems. ACM Conference on Computer and Communications Security 2007: 256-265 |
2006 | ||
48 | Giovanni Di Crescenzo, Aviel D. Rubin: Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers Springer 2006 | |
47 | EE | Sujata Doshi, Fabian Monrose, Aviel D. Rubin: Efficient Memory Bound Puzzles Using Pattern Databases. ACNS 2006: 98-113 |
46 | EE | Sophie Y. Qiu, Patrick Drew McDaniel, Fabian Monrose, Aviel D. Rubin: Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing. ISCC 2006: 489-496 |
45 | EE | Stephen Bono, Aviel D. Rubin, Adam Stubblefield, Matthew Green: Security through legality. Commun. ACM 49(6): 41-43 (2006) |
2005 | ||
44 | EE | Zachary N. J. Peterson, Randal C. Burns, Joseph Herring, Adam Stubblefield, Aviel D. Rubin: Secure Deletion for a Versioning File System. FAST 2005 |
43 | EE | Patrick Drew McDaniel, Aviel D. Rubin: Web security. Computer Networks 48(5): 697-699 (2005) |
42 | EE | Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach: Managing the Performance Impact of Web Security. Electronic Commerce Research 5(1): 99-116 (2005) |
2004 | ||
41 | EE | Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach: Analysis of an Electronic Voting System. IEEE Symposium on Security and Privacy 2004: 27- |
40 | EE | Adam Stubblefield, John Ioannidis, Aviel D. Rubin: A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). ACM Trans. Inf. Syst. Secur. 7(2): 319-332 (2004) |
39 | EE | Simon Byers, Aviel D. Rubin, David P. Kormann: Defending against an Internet-based attack on the physical world. ACM Trans. Internet Techn. 4(3): 239-254 (2004) |
38 | EE | David Jefferson, Aviel D. Rubin, Barbara Simons, David Wagner: Analyzing internet voting security. Commun. ACM 47(10): 59-64 (2004) |
37 | EE | Poorvi L. Vora, Ben Adida, Ren Bucholz, David Chaum, David L. Dill, David Jefferson, Douglas W. Jones, William Lattin, Aviel D. Rubin, Michael I. Shamos, Moti Yung: Evaluation of voting systems. Commun. ACM 47(11): 144 (2004) |
36 | EE | Simon S. Y. Shim, Li Gong, Aviel D. Rubin, Linley Gwennap: Guest Editors' Introduction: Securing the High-Speed Internet. IEEE Computer 37(6): 33-35 (2004) |
35 | EE | David L. Dill, Aviel D. Rubin: Guest Editors' Introduction: E-Voting Security. IEEE Security & Privacy 2(1): 22-23 (2004) |
2003 | ||
34 | EE | Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick Drew McDaniel, Aviel D. Rubin: Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. NDSS 2003 |
33 | EE | Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin: WAR: Wireless Anonymous Routing. Security Protocols Workshop 2003: 218-232 |
32 | EE | Aviel D. Rubin: Introduction. Commun. ACM 46(5): 28-30 (2003) |
2002 | ||
31 | Will Ivancic, David Wagner, Aviel D. Rubin, Paul Ratazzi, James P. G. Sterbenz: Securing Wireless and Mobile Networks - Is It Possible? INFOCOM 2002 | |
30 | EE | Adam Stubblefield, John Ioannidis, Aviel D. Rubin: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. NDSS 2002 |
29 | EE | Simon Byers, Aviel D. Rubin, David P. Kormann: Defending against an Internet-based attack on the physical world. WPES 2002: 11-18 |
28 | EE | Aviel D. Rubin: Security considerations for remote electronic voting. Commun. ACM 45(12): 39-44 (2002) |
2001 | ||
27 | EE | Aviel D. Rubin, Rebecca N. Wright: Off-Line Generation of Limited-Use Credit Card Numbers. Financial Cryptography 2001: 187-200 |
26 | EE | Ed Gerck, C. Andrew Neff, Ronald L. Rivest, Aviel D. Rubin, Moti Yung: The Business of Electronic Voting. Financial Cryptography 2001: 234-259 |
25 | Aviel D. Rubin: Security for E-Voting in Public Elections. LISA 2001 | |
24 | EE | Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor: The architecture of robust publishing systems. ACM Trans. Internet Techn. 1(2): 199-230 (2001) |
23 | EE | Aviel D. Rubin: Security Considerations for Remote Electronic Voting over the Internet CoRR cs.CR/0108017: (2001) |
2000 | ||
22 | EE | Patrick Drew McDaniel, Aviel D. Rubin: A Response to ''Can We Eliminate Certificate Revocation Lists?''. Financial Cryptography 2000: 245-258 |
21 | EE | David P. Kormann, Aviel D. Rubin: Risks of the Passport single signon protocol. Computer Networks 33(1-6): 51-58 (2000) |
20 | EE | Fabian Monrose, Aviel D. Rubin: Keystroke dynamics as a biometric for authentication. Future Generation Comp. Syst. 16(4): 351-359 (2000) |
1999 | ||
19 | EE | William Aiello, Aviel D. Rubin, Martin Strauss: Using Smartcards to Secure a Personalized Gambling Device. ACM Conference on Computer and Communications Security 1999: 128-137 |
18 | EE | Fabian Monrose, Peter Wyckoff, Aviel D. Rubin: Distributed Execution with Remote Audit. NDSS 1999 |
17 | EE | Christian Gilmore, David P. Kormann, Aviel D. Rubin: Secure Remote Access to an Internal Web Server. NDSS 1999 |
16 | EE | Michael K. Reiter, Aviel D. Rubin: Anonymous Web Transactions with Crowds. Commun. ACM 42(2): 32-38 (1999) |
1998 | ||
15 | EE | Dahlia Malkhi, Michael K. Reiter, Aviel D. Rubin: Secure Execution of Java Applets using a Remote Playground. IEEE Symposium on Security and Privacy 1998: 40-51 |
14 | EE | Michael K. Reiter, Aviel D. Rubin: Crowds: Anonymity for Web Transactions. ACM Trans. Inf. Syst. Secur. 1(1): 66-92 (1998) |
13 | Aviel D. Rubin, Daniel E. Geer Jr.: A Survey of Web Security. IEEE Computer 31(9): 34-41 (1998) | |
12 | Aviel D. Rubin, Daniel E. Geer Jr.: Mobile Code Security. IEEE Internet Computing 2(6): 30-34 (1998) | |
1997 | ||
11 | Aviel D. Rubin, Dan Boneh, Kevin Fu: Revocation of Unread E-mail in an Untrusted Network. ACISP 1997: 62-75 | |
10 | EE | Fabian Monrose, Aviel D. Rubin: Authentication via Keystroke Dynamics. ACM Conference on Computer and Communications Security 1997: 48-56 |
9 | EE | David M. Martin Jr., Sivaramakrishnan Rajagopalan, Aviel D. Rubin: Blocking Java Applets at the Firewall. NDSS 1997 |
8 | Aviel D. Rubin: Extending NCP for Protocols Using Public Keys. MONET 2(3): 227-241 (1997) | |
1996 | ||
7 | EE | Victor Shoup, Aviel D. Rubin: Session Key Distribution Using Smart Cards. EUROCRYPT 1996: 321-331 |
6 | Aviel D. Rubin: Independent One-Time Passwords. Computing Systems 9(1): 15-27 (1996) | |
5 | Aviel D. Rubin: Response: Independent One-Time Passwords. Computing Systems 9(3): 257 (1996) | |
1995 | ||
4 | EE | Aviel D. Rubin: Extending NCP for protocols using public keys. ICCCN 1995: 94 |
3 | Aviel D. Rubin: Secure Distribution of Electronic Documents in a Hostile Environment. Computer Communications 18(6): 429-434 (1995) | |
1994 | ||
2 | Aviel D. Rubin, Peter Honeyman: Nonmonotonic Cryptographic Protocols. CSFW 1994: 100-116 | |
1977 | ||
1 | Aviel D. Rubin, Bertram C. Bruce: From Conversations to Stories: An Analysis of Differences Between Oral and Written Language Comprehension. IJCAI 1977: 141 |