dblp.uni-trier.dewww.uni-trier.de

Sean W. Smith

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
53EEPatrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith: PEREA: towards practical TTP-free revocation in anonymous authentication. ACM Conference on Computer and Communications Security 2008: 333-344
52EEPatrick P. Tsang, Sean W. Smith: PPAA: Peer-to-Peer Anonymous Authentication. ACNS 2008: 55-74
51EEMassimiliano Pala, Shreyas Cholia, Scott A. Rea, Sean W. Smith: Extending PKI Interoperability in Computational Grids. CCGRID 2008: 645-650
50EEMassimiliano Pala, Sean W. Smith: PEACHES and Peers. EuroPKI 2008: 223-238
49EEPatrick P. Tsang, Sean W. Smith: Secure Cryptographic Precomputation with Insecure Memory. ISPEC 2008: 146-160
48EEPatrick P. Tsang, Sean W. Smith: Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers. ISPEC 2008: 188-202
47EEPatrick P. Tsang, Sean W. Smith: YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems. SEC 2008: 445-459
46EESergey Bratus, Nihal D'Cunha, Evan Sparks, Sean W. Smith: TOCTOU, Traps, and Trusted Computing. TRUST 2008: 14-32
45EESergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith: Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security. VMSec 2008: 49-58
44EEKatelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith: TwoKind authentication: protecting private information in untrustworthy environments. WPES 2008: 39-44
2007
43EEPatrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith: Blacklistable anonymous credentials: blocking misbehaving users without ttps. ACM Conference on Computer and Communications Security 2007: 72-81
42EEMassimiliano Pala, Sean W. Smith: AutoPKI: A PKI Resources Discovery System. EuroPKI 2007: 154-169
41EESara Sinclair, Sean W. Smith, Stephanie Trudeau, M. Eric Johnson, Anthony Portera: Information Risk in Financial Institutions: Field Study and Research Roadmap. FinanceCom 2007: 165-180
40EEPatrick P. Tsang, Sherman S. M. Chow, Sean W. Smith: Batch Pairing Delegation. IWSEC 2007: 74-90
39EEApu Kapadia, Patrick P. Tsang, Sean W. Smith: Attribute-Based Publishing with Hidden Credentials and Hidden Policies. NDSS 2007
38EEPeter C. Johnson, Apu Kapadia, Patrick P. Tsang, Sean W. Smith: Nymble: Anonymous IP-Address Blocking. Privacy Enhancing Technologies 2007: 113-133
37EEKatelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith: TwoKind authentication: usable authenticators for untrustworthy environments. SOUPS 2007: 169-170
2006
36EEMeiyuan Zhao, Sean W. Smith: Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI. EuroPKI 2006: 16-30
35EEGabriel Vanrenen, Sean W. Smith, John Marchesini: Distributing security-mediated PKI. Int. J. Inf. Sec. 5(1): 3-17 (2006)
2005
34EEMeiyuan Zhao, Sean W. Smith, David M. Nicol: Aggregated path authentication for efficient BGP security. ACM Conference on Computer and Communications Security 2005: 128-138
33EESara Sinclair, Sean W. Smith: PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness. ACSAC 2005: 419-430
32EEJohn Marchesini, Sean W. Smith: Modeling Public Key Infrastructures in the Real World. EuroPKI 2005: 118-134
31EEMark Franklin, Kevin Mitcham, Sean W. Smith, Joshua Stabiner, Omen Wild: CA-in-a-Box. EuroPKI 2005: 180-190
30EEJames E. Dobson, Jeffrey B. Woodward, Susan A. Schwarz, John Marchesini, Hany Farid, Sean W. Smith: The Dartmouth Green Grid. International Conference on Computational Science (2) 2005: 99-106
29EEJohn Marchesini, Sean W. Smith: SHEMP: Secure Hardware Enhanced MyProxy. PST 2005
28EEJohn Marchesini, Sean W. Smith, Meiyuan Zhao: Keyjacking: the surprising insecurity of client-side SSL. Computers & Security 24(2): 109-123 (2005)
27EEMeiyuan Zhao, Sean W. Smith, David M. Nicol: The performance impact of BGP security. IEEE Network 19(6): 42-48 (2005)
26EEAlexander Iliev, Sean W. Smith: Protecting Client Privacy with Trusted Computing at the Server. IEEE Security & Privacy 3(2): 20-28 (2005)
25EESean W. Smith: Turing is from Mars, Shannon is from Venus: Computer Science and Computer Engineering. IEEE Security & Privacy 3(2): 66-69 (2005)
24EESara Sinclair, Sean W. Smith: The TIPPI Point: Toward Trustworthy Interfaces. IEEE Security & Privacy 3(4): 68-71 (2005)
23EESean W. Smith: Pretending that Systems Are Secure. IEEE Security & Privacy 3(6): 73-76 (2005)
2004
22EEJohn Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian: Open-Source Applications of TCPA Hardware. ACSAC 2004: 294-303
21EEGabriel Vanrenen, Sean W. Smith: Distributing Security-Mediated PKI. EuroPKI 2004: 218-231
20 Alexander Iliev, Sean W. Smith: Private Information Storage with Logarithm-Space Secure Hardware. International Information Security Workshops 2004: 199-214
19EEAnna Shubina, Sean W. Smith: Design and Prototype of a Coercion-Resistant, Verifiable Electronic Voting System. PST 2004: 29-39
18EESean W. Smith, Eugene H. Spafford: Grand Challenges in Information Security: Process and Output. IEEE Security & Privacy 2(1): 69-71 (2004)
17EESean W. Smith: Outbound authentication for programmable secure coprocessors. Int. J. Inf. Sec. 3(1): 28-41 (2004)
16EEDavid M. Nicol, Sean W. Smith, Meiyuan Zhao: Evaluation of efficient security for BGP route announcements using parallel simulation. Simulation Modelling Practice and Theory 12(3-4): 187-216 (2004)
2003
15EESean W. Smith: Fairy Dust, Secrets, and the Real World. IEEE Security & Privacy 1(1): 89-93 (2003)
14EESean W. Smith: Humans in the Loop: Human-Computer Interaction and Security. IEEE Security & Privacy 1(3): 75-79 (2003)
13EESean W. Smith, Jothy Rosenberg, Adam Golodner: A Funny Thing Happened on the Way to the Marketplace. IEEE Security & Privacy 1(6): 74-78 (2003)
12EEAnna Shubina, Sean W. Smith: Using caching for browsing anonymity. SIGecom Exchanges 4(2): 11-20 (2003)
2002
11 K. Kain, Sean W. Smith, R. Asokan: Digital signatures and electronic documents: a cautionary tale. Communications and Multimedia Security 2002: 293-308
10EESean W. Smith: Outbound Authentication for Programmable Secure Coprocessors. ESORICS 2002: 72-89
9EEAlexander Iliev, Sean W. Smith: Prototyping an Armored Data Vault: Rights Management on Big Brother's Computer. Privacy Enhancing Technologies 2002: 144-159
2001
8 Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar: SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. IPDPS 2001: 170
7EESean W. Smith, David Safford: Practical server privacy with secure coprocessors. IBM Systems Journal 40(3): 683-695 (2001)
6EEJoan G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, Leendert van Doorn, Sean W. Smith, Steve Weingart: Building the IBM 4758 Secure Coprocessor. IEEE Computer 34(10): 57-66 (2001)
1999
5EESean W. Smith, Steve Weingart: Building a high-performance, programmable secure coprocessor. Computer Networks 31(8): 831-860 (1999)
1998
4EESean W. Smith, Elaine R. Palmer, Steve Weingart: Using a High-Performance, Programmable Secure Coprocessor. Financial Cryptography 1998: 73-89
1996
3 Sean W. Smith, David B. Johnson: Minimizing Timestamp Size for Completely Asynchronous Optimistic Recovery with Minimal Rollback. SRDS 1996: 66-75
1995
2 Sean W. Smith, David B. Johnson, J. D. Tygar: Completely Asynchronous Optimistic Recovery with Minimal Rollbacks. FTCS 1995: 361-370
1991
1EEMerrick L. Furst, Jeffrey C. Jackson, Sean W. Smith: Improved Learning of AC0 Functions. COLT 1991: 317-325

Coauthor Index

1R. Asokan [11]
2Man Ho Au [43] [53]
3Katelin Bailey [37] [44]
4Alex Barsamian [22]
5Sergey Bratus [45] [46]
6Shreyas Cholia [51]
7Sherman S. M. Chow [40]
8Nihal D'Cunha [46]
9James E. Dobson [30]
10Leendert van Doorn [6]
11Joan G. Dyer [6]
12Hany Farid [30]
13Mark Franklin [31]
14Merrick L. Furst [1]
15Adam Golodner [13]
16Alexander Iliev [9] [20] [26]
17Jeffrey C. Jackson [1]
18David B. Johnson [2] [3]
19M. Eric Johnson [41]
20Peter C. Johnson [38]
21K. Kain [11]
22Apu Kapadia [37] [38] [39] [43] [44] [53]
23Mark Lindemann [6]
24Michael E. Locasto [45]
25John Marchesini [22] [28] [29] [30] [32] [35]
26Chris Masone [37]
27Kevin Mitcham [31]
28David M. Nicol [16] [27] [34]
29Massimiliano Pala [42] [50] [51]
30Elaine R. Palmer [4]
31Ronald Perez [6]
32Adrian Perrig [8]
33Anthony Portera [41]
34Ashwin Ramaswamy [45]
35Scott A. Rea [51]
36Jothy Rosenberg [13]
37David Safford [7]
38Reiner Sailer [6]
39Susan A. Schwarz [30]
40Anna Shubina [12] [19]
41Sara Sinclair [24] [33] [41]
42Dawn Xiaodong Song [8]
43Eugene H. Spafford [18]
44Evan Sparks [46]
45Joshua Stabiner [22] [31]
46Stephanie Trudeau [41]
47Patrick P. Tsang [38] [39] [40] [43] [47] [48] [49] [52] [53]
48J. Doug Tygar (J. D. Tygar) [2] [8]
49Gabriel Vanrenen [21] [35]
50Linden Vongsathorn [37] [44]
51Steve Weingart [4] [5] [6]
52Omen Wild [22] [31]
53Jeffrey B. Woodward [30]
54Meiyuan Zhao [16] [27] [28] [34] [36]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)