dblp.uni-trier.dewww.uni-trier.de

Daniel R. Simon

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
17EELi Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, J. Doug Tygar: Characterizing Botnets from Email Spam Records. LEET 2008
2007
16EETed Wobber, Aydan R. Yumerefendi, Martín Abadi, Andrew Birrell, Daniel R. Simon: Authorizing applications in singularity. EuroSys 2007: 355-368
15EECollin Jackson, Daniel R. Simon, Desney S. Tan, Adam Barth: An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. Financial Cryptography 2007: 281-293
2004
14EEHelen J. Wang, Chuanxiong Guo, Daniel R. Simon, Alf Zugenmaier: Shield: vulnerability-driven network filters for preventing known vulnerability exploits. SIGCOMM 2004: 193-204
2003
13EEYi-Min Wang, Chad Verbowski, Daniel R. Simon: Persistent-State Checkpoint Comparison for Troubleshooting Configuration Failures. DSN 2003: 311-316
12EEVenkata N. Padmanabhan, Daniel R. Simon: Secure traceroute to detect faulty or malicious routing. Computer Communication Review 33(1): 77-82 (2003)
11 Steve Chien, Cynthia Dwork, Ravi Kumar, Daniel R. Simon, D. Sivakumar: Link Evolution: Analysis and Algorithms. Internet Mathematics 1(3): (2003)
2002
10EEQixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N. Padmanabhan, Lili Qiu: Statistical Identification of Encrypted Web Browsing Traffic. IEEE Symposium on Security and Privacy 2002: 19-30
2001
9EEValentin Razmov, Daniel R. Simon: Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions. ACSAC 2001: 347-357
1999
8EEJeong Han Kim, Daniel R. Simon, Prasad Tetali: Limits on the Efficiency of One-Way Permutation-Based Hash Functions. FOCS 1999: 535-542
1998
7EEDaniel R. Simon: Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions? EUROCRYPT 1998: 334-345
1997
6 Barbara Fox, Brian Beckman, Daniel R. Simon: GUMP: Grand Unified Meta-Protocols Recipes for Simple, Standards-Based Financial Cryptography. Financial Cryptography 1997: 375-394
5 Daniel R. Simon: On the Power of Quantum Computation. SIAM J. Comput. 26(5): 1474-1483 (1997)
1996
4EEDaniel R. Simon: Anonymous Communication and Anonymous Cash. CRYPTO 1996: 61-73
1994
3 Daniel R. Simon: On the Power of Quantum Cryptography FOCS 1994: 116-123
1993
2EECharles Rackoff, Daniel R. Simon: Cryptographic defense against traffic analysis. STOC 1993: 672-681
1991
1EECharles Rackoff, Daniel R. Simon: Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. CRYPTO 1991: 433-444

Coauthor Index

1Martín Abadi [16]
2Adam Barth [15]
3Brian Beckman [6]
4Andrew Birrell [16]
5Steve Chien [11]
6John Dunagan [17]
7Cynthia Dwork [11]
8Barbara Fox [6]
9Chuanxiong Guo [14]
10Collin Jackson [15]
11Jeong Han Kim [8]
12Ravi Kumar (S. Ravi Kumar) [11]
13Ivan Osipkov [17]
14Venkata N. Padmanabhan [10] [12]
15Lili Qiu [10]
16Charles Rackoff [1] [2]
17Valentin Razmov [9]
18Wilf Russell [10]
19D. Sivakumar [11]
20Qixiang Sun [10]
21Desney S. Tan [15]
22Prasad Tetali [8]
23J. Doug Tygar (J. D. Tygar) [17]
24Chad Verbowski [13]
25Helen J. Wang [14] [17]
26Yi-Min Wang [10] [13]
27Ted Wobber [16]
28Aydan R. Yumerefendi [16]
29Li Zhuang [17]
30Alf Zugenmaier [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)