| 2008 |
| 17 | EE | Li Zhuang,
John Dunagan,
Daniel R. Simon,
Helen J. Wang,
Ivan Osipkov,
J. Doug Tygar:
Characterizing Botnets from Email Spam Records.
LEET 2008 |
| 2007 |
| 16 | EE | Ted Wobber,
Aydan R. Yumerefendi,
Martín Abadi,
Andrew Birrell,
Daniel R. Simon:
Authorizing applications in singularity.
EuroSys 2007: 355-368 |
| 15 | EE | Collin Jackson,
Daniel R. Simon,
Desney S. Tan,
Adam Barth:
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks.
Financial Cryptography 2007: 281-293 |
| 2004 |
| 14 | EE | Helen J. Wang,
Chuanxiong Guo,
Daniel R. Simon,
Alf Zugenmaier:
Shield: vulnerability-driven network filters for preventing known vulnerability exploits.
SIGCOMM 2004: 193-204 |
| 2003 |
| 13 | EE | Yi-Min Wang,
Chad Verbowski,
Daniel R. Simon:
Persistent-State Checkpoint Comparison for Troubleshooting Configuration Failures.
DSN 2003: 311-316 |
| 12 | EE | Venkata N. Padmanabhan,
Daniel R. Simon:
Secure traceroute to detect faulty or malicious routing.
Computer Communication Review 33(1): 77-82 (2003) |
| 11 | | Steve Chien,
Cynthia Dwork,
Ravi Kumar,
Daniel R. Simon,
D. Sivakumar:
Link Evolution: Analysis and Algorithms.
Internet Mathematics 1(3): (2003) |
| 2002 |
| 10 | EE | Qixiang Sun,
Daniel R. Simon,
Yi-Min Wang,
Wilf Russell,
Venkata N. Padmanabhan,
Lili Qiu:
Statistical Identification of Encrypted Web Browsing Traffic.
IEEE Symposium on Security and Privacy 2002: 19-30 |
| 2001 |
| 9 | EE | Valentin Razmov,
Daniel R. Simon:
Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions.
ACSAC 2001: 347-357 |
| 1999 |
| 8 | EE | Jeong Han Kim,
Daniel R. Simon,
Prasad Tetali:
Limits on the Efficiency of One-Way Permutation-Based Hash Functions.
FOCS 1999: 535-542 |
| 1998 |
| 7 | EE | Daniel R. Simon:
Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions?
EUROCRYPT 1998: 334-345 |
| 1997 |
| 6 | | Barbara Fox,
Brian Beckman,
Daniel R. Simon:
GUMP: Grand Unified Meta-Protocols Recipes for Simple, Standards-Based Financial Cryptography.
Financial Cryptography 1997: 375-394 |
| 5 | | Daniel R. Simon:
On the Power of Quantum Computation.
SIAM J. Comput. 26(5): 1474-1483 (1997) |
| 1996 |
| 4 | EE | Daniel R. Simon:
Anonymous Communication and Anonymous Cash.
CRYPTO 1996: 61-73 |
| 1994 |
| 3 | | Daniel R. Simon:
On the Power of Quantum Cryptography
FOCS 1994: 116-123 |
| 1993 |
| 2 | EE | Charles Rackoff,
Daniel R. Simon:
Cryptographic defense against traffic analysis.
STOC 1993: 672-681 |
| 1991 |
| 1 | EE | Charles Rackoff,
Daniel R. Simon:
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack.
CRYPTO 1991: 433-444 |