2007 |
49 | EE | Sujata Garera,
Aviel D. Rubin:
An independent audit framework for software dependent voting systems.
ACM Conference on Computer and Communications Security 2007: 256-265 |
2006 |
48 | | Giovanni Di Crescenzo,
Aviel D. Rubin:
Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers
Springer 2006 |
47 | EE | Sujata Doshi,
Fabian Monrose,
Aviel D. Rubin:
Efficient Memory Bound Puzzles Using Pattern Databases.
ACNS 2006: 98-113 |
46 | EE | Sophie Y. Qiu,
Patrick Drew McDaniel,
Fabian Monrose,
Aviel D. Rubin:
Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing.
ISCC 2006: 489-496 |
45 | EE | Stephen Bono,
Aviel D. Rubin,
Adam Stubblefield,
Matthew Green:
Security through legality.
Commun. ACM 49(6): 41-43 (2006) |
2005 |
44 | EE | Zachary N. J. Peterson,
Randal C. Burns,
Joseph Herring,
Adam Stubblefield,
Aviel D. Rubin:
Secure Deletion for a Versioning File System.
FAST 2005 |
43 | EE | Patrick Drew McDaniel,
Aviel D. Rubin:
Web security.
Computer Networks 48(5): 697-699 (2005) |
42 | EE | Adam Stubblefield,
Aviel D. Rubin,
Dan S. Wallach:
Managing the Performance Impact of Web Security.
Electronic Commerce Research 5(1): 99-116 (2005) |
2004 |
41 | EE | Tadayoshi Kohno,
Adam Stubblefield,
Aviel D. Rubin,
Dan S. Wallach:
Analysis of an Electronic Voting System.
IEEE Symposium on Security and Privacy 2004: 27- |
40 | EE | Adam Stubblefield,
John Ioannidis,
Aviel D. Rubin:
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP).
ACM Trans. Inf. Syst. Secur. 7(2): 319-332 (2004) |
39 | EE | Simon Byers,
Aviel D. Rubin,
David P. Kormann:
Defending against an Internet-based attack on the physical world.
ACM Trans. Internet Techn. 4(3): 239-254 (2004) |
38 | EE | David Jefferson,
Aviel D. Rubin,
Barbara Simons,
David Wagner:
Analyzing internet voting security.
Commun. ACM 47(10): 59-64 (2004) |
37 | EE | Poorvi L. Vora,
Ben Adida,
Ren Bucholz,
David Chaum,
David L. Dill,
David Jefferson,
Douglas W. Jones,
William Lattin,
Aviel D. Rubin,
Michael I. Shamos,
Moti Yung:
Evaluation of voting systems.
Commun. ACM 47(11): 144 (2004) |
36 | EE | Simon S. Y. Shim,
Li Gong,
Aviel D. Rubin,
Linley Gwennap:
Guest Editors' Introduction: Securing the High-Speed Internet.
IEEE Computer 37(6): 33-35 (2004) |
35 | EE | David L. Dill,
Aviel D. Rubin:
Guest Editors' Introduction: E-Voting Security.
IEEE Security & Privacy 2(1): 22-23 (2004) |
2003 |
34 | EE | Geoffrey Goodell,
William Aiello,
Timothy Griffin,
John Ioannidis,
Patrick Drew McDaniel,
Aviel D. Rubin:
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing.
NDSS 2003 |
33 | EE | Matt Blaze,
John Ioannidis,
Angelos D. Keromytis,
Tal Malkin,
Aviel D. Rubin:
WAR: Wireless Anonymous Routing.
Security Protocols Workshop 2003: 218-232 |
32 | EE | Aviel D. Rubin:
Introduction.
Commun. ACM 46(5): 28-30 (2003) |
2002 |
31 | | Will Ivancic,
David Wagner,
Aviel D. Rubin,
Paul Ratazzi,
James P. G. Sterbenz:
Securing Wireless and Mobile Networks - Is It Possible?
INFOCOM 2002 |
30 | EE | Adam Stubblefield,
John Ioannidis,
Aviel D. Rubin:
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
NDSS 2002 |
29 | EE | Simon Byers,
Aviel D. Rubin,
David P. Kormann:
Defending against an Internet-based attack on the physical world.
WPES 2002: 11-18 |
28 | EE | Aviel D. Rubin:
Security considerations for remote electronic voting.
Commun. ACM 45(12): 39-44 (2002) |
2001 |
27 | EE | Aviel D. Rubin,
Rebecca N. Wright:
Off-Line Generation of Limited-Use Credit Card Numbers.
Financial Cryptography 2001: 187-200 |
26 | EE | Ed Gerck,
C. Andrew Neff,
Ronald L. Rivest,
Aviel D. Rubin,
Moti Yung:
The Business of Electronic Voting.
Financial Cryptography 2001: 234-259 |
25 | | Aviel D. Rubin:
Security for E-Voting in Public Elections.
LISA 2001 |
24 | EE | Marc Waldman,
Aviel D. Rubin,
Lorrie Faith Cranor:
The architecture of robust publishing systems.
ACM Trans. Internet Techn. 1(2): 199-230 (2001) |
23 | EE | Aviel D. Rubin:
Security Considerations for Remote Electronic Voting over the Internet
CoRR cs.CR/0108017: (2001) |
2000 |
22 | EE | Patrick Drew McDaniel,
Aviel D. Rubin:
A Response to ''Can We Eliminate Certificate Revocation Lists?''.
Financial Cryptography 2000: 245-258 |
21 | EE | David P. Kormann,
Aviel D. Rubin:
Risks of the Passport single signon protocol.
Computer Networks 33(1-6): 51-58 (2000) |
20 | EE | Fabian Monrose,
Aviel D. Rubin:
Keystroke dynamics as a biometric for authentication.
Future Generation Comp. Syst. 16(4): 351-359 (2000) |
1999 |
19 | EE | William Aiello,
Aviel D. Rubin,
Martin Strauss:
Using Smartcards to Secure a Personalized Gambling Device.
ACM Conference on Computer and Communications Security 1999: 128-137 |
18 | EE | Fabian Monrose,
Peter Wyckoff,
Aviel D. Rubin:
Distributed Execution with Remote Audit.
NDSS 1999 |
17 | EE | Christian Gilmore,
David P. Kormann,
Aviel D. Rubin:
Secure Remote Access to an Internal Web Server.
NDSS 1999 |
16 | EE | Michael K. Reiter,
Aviel D. Rubin:
Anonymous Web Transactions with Crowds.
Commun. ACM 42(2): 32-38 (1999) |
1998 |
15 | EE | Dahlia Malkhi,
Michael K. Reiter,
Aviel D. Rubin:
Secure Execution of Java Applets using a Remote Playground.
IEEE Symposium on Security and Privacy 1998: 40-51 |
14 | EE | Michael K. Reiter,
Aviel D. Rubin:
Crowds: Anonymity for Web Transactions.
ACM Trans. Inf. Syst. Secur. 1(1): 66-92 (1998) |
13 | | Aviel D. Rubin,
Daniel E. Geer Jr.:
A Survey of Web Security.
IEEE Computer 31(9): 34-41 (1998) |
12 | | Aviel D. Rubin,
Daniel E. Geer Jr.:
Mobile Code Security.
IEEE Internet Computing 2(6): 30-34 (1998) |
1997 |
11 | | Aviel D. Rubin,
Dan Boneh,
Kevin Fu:
Revocation of Unread E-mail in an Untrusted Network.
ACISP 1997: 62-75 |
10 | EE | Fabian Monrose,
Aviel D. Rubin:
Authentication via Keystroke Dynamics.
ACM Conference on Computer and Communications Security 1997: 48-56 |
9 | EE | David M. Martin Jr.,
Sivaramakrishnan Rajagopalan,
Aviel D. Rubin:
Blocking Java Applets at the Firewall.
NDSS 1997 |
8 | | Aviel D. Rubin:
Extending NCP for Protocols Using Public Keys.
MONET 2(3): 227-241 (1997) |
1996 |
7 | EE | Victor Shoup,
Aviel D. Rubin:
Session Key Distribution Using Smart Cards.
EUROCRYPT 1996: 321-331 |
6 | | Aviel D. Rubin:
Independent One-Time Passwords.
Computing Systems 9(1): 15-27 (1996) |
5 | | Aviel D. Rubin:
Response: Independent One-Time Passwords.
Computing Systems 9(3): 257 (1996) |
1995 |
4 | EE | Aviel D. Rubin:
Extending NCP for protocols using public keys.
ICCCN 1995: 94 |
3 | | Aviel D. Rubin:
Secure Distribution of Electronic Documents in a Hostile Environment.
Computer Communications 18(6): 429-434 (1995) |
1994 |
2 | | Aviel D. Rubin,
Peter Honeyman:
Nonmonotonic Cryptographic Protocols.
CSFW 1994: 100-116 |
1977 |
1 | | Aviel D. Rubin,
Bertram C. Bruce:
From Conversations to Stories: An Analysis of Differences Between Oral and Written Language Comprehension.
IJCAI 1977: 141 |