2008 |
17 | EE | Li Zhuang,
John Dunagan,
Daniel R. Simon,
Helen J. Wang,
Ivan Osipkov,
J. Doug Tygar:
Characterizing Botnets from Email Spam Records.
LEET 2008 |
2007 |
16 | EE | Ted Wobber,
Aydan R. Yumerefendi,
Martín Abadi,
Andrew Birrell,
Daniel R. Simon:
Authorizing applications in singularity.
EuroSys 2007: 355-368 |
15 | EE | Collin Jackson,
Daniel R. Simon,
Desney S. Tan,
Adam Barth:
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks.
Financial Cryptography 2007: 281-293 |
2004 |
14 | EE | Helen J. Wang,
Chuanxiong Guo,
Daniel R. Simon,
Alf Zugenmaier:
Shield: vulnerability-driven network filters for preventing known vulnerability exploits.
SIGCOMM 2004: 193-204 |
2003 |
13 | EE | Yi-Min Wang,
Chad Verbowski,
Daniel R. Simon:
Persistent-State Checkpoint Comparison for Troubleshooting Configuration Failures.
DSN 2003: 311-316 |
12 | EE | Venkata N. Padmanabhan,
Daniel R. Simon:
Secure traceroute to detect faulty or malicious routing.
Computer Communication Review 33(1): 77-82 (2003) |
11 | | Steve Chien,
Cynthia Dwork,
Ravi Kumar,
Daniel R. Simon,
D. Sivakumar:
Link Evolution: Analysis and Algorithms.
Internet Mathematics 1(3): (2003) |
2002 |
10 | EE | Qixiang Sun,
Daniel R. Simon,
Yi-Min Wang,
Wilf Russell,
Venkata N. Padmanabhan,
Lili Qiu:
Statistical Identification of Encrypted Web Browsing Traffic.
IEEE Symposium on Security and Privacy 2002: 19-30 |
2001 |
9 | EE | Valentin Razmov,
Daniel R. Simon:
Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions.
ACSAC 2001: 347-357 |
1999 |
8 | EE | Jeong Han Kim,
Daniel R. Simon,
Prasad Tetali:
Limits on the Efficiency of One-Way Permutation-Based Hash Functions.
FOCS 1999: 535-542 |
1998 |
7 | EE | Daniel R. Simon:
Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions?
EUROCRYPT 1998: 334-345 |
1997 |
6 | | Barbara Fox,
Brian Beckman,
Daniel R. Simon:
GUMP: Grand Unified Meta-Protocols Recipes for Simple, Standards-Based Financial Cryptography.
Financial Cryptography 1997: 375-394 |
5 | | Daniel R. Simon:
On the Power of Quantum Computation.
SIAM J. Comput. 26(5): 1474-1483 (1997) |
1996 |
4 | EE | Daniel R. Simon:
Anonymous Communication and Anonymous Cash.
CRYPTO 1996: 61-73 |
1994 |
3 | | Daniel R. Simon:
On the Power of Quantum Cryptography
FOCS 1994: 116-123 |
1993 |
2 | EE | Charles Rackoff,
Daniel R. Simon:
Cryptographic defense against traffic analysis.
STOC 1993: 672-681 |
1991 |
1 | EE | Charles Rackoff,
Daniel R. Simon:
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack.
CRYPTO 1991: 433-444 |