2008 | ||
---|---|---|
53 | EE | Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith: PEREA: towards practical TTP-free revocation in anonymous authentication. ACM Conference on Computer and Communications Security 2008: 333-344 |
52 | EE | Patrick P. Tsang, Sean W. Smith: PPAA: Peer-to-Peer Anonymous Authentication. ACNS 2008: 55-74 |
51 | EE | Massimiliano Pala, Shreyas Cholia, Scott A. Rea, Sean W. Smith: Extending PKI Interoperability in Computational Grids. CCGRID 2008: 645-650 |
50 | EE | Massimiliano Pala, Sean W. Smith: PEACHES and Peers. EuroPKI 2008: 223-238 |
49 | EE | Patrick P. Tsang, Sean W. Smith: Secure Cryptographic Precomputation with Insecure Memory. ISPEC 2008: 146-160 |
48 | EE | Patrick P. Tsang, Sean W. Smith: Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers. ISPEC 2008: 188-202 |
47 | EE | Patrick P. Tsang, Sean W. Smith: YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems. SEC 2008: 445-459 |
46 | EE | Sergey Bratus, Nihal D'Cunha, Evan Sparks, Sean W. Smith: TOCTOU, Traps, and Trusted Computing. TRUST 2008: 14-32 |
45 | EE | Sergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith: Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security. VMSec 2008: 49-58 |
44 | EE | Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith: TwoKind authentication: protecting private information in untrustworthy environments. WPES 2008: 39-44 |
2007 | ||
43 | EE | Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith: Blacklistable anonymous credentials: blocking misbehaving users without ttps. ACM Conference on Computer and Communications Security 2007: 72-81 |
42 | EE | Massimiliano Pala, Sean W. Smith: AutoPKI: A PKI Resources Discovery System. EuroPKI 2007: 154-169 |
41 | EE | Sara Sinclair, Sean W. Smith, Stephanie Trudeau, M. Eric Johnson, Anthony Portera: Information Risk in Financial Institutions: Field Study and Research Roadmap. FinanceCom 2007: 165-180 |
40 | EE | Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smith: Batch Pairing Delegation. IWSEC 2007: 74-90 |
39 | EE | Apu Kapadia, Patrick P. Tsang, Sean W. Smith: Attribute-Based Publishing with Hidden Credentials and Hidden Policies. NDSS 2007 |
38 | EE | Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, Sean W. Smith: Nymble: Anonymous IP-Address Blocking. Privacy Enhancing Technologies 2007: 113-133 |
37 | EE | Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith: TwoKind authentication: usable authenticators for untrustworthy environments. SOUPS 2007: 169-170 |
2006 | ||
36 | EE | Meiyuan Zhao, Sean W. Smith: Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI. EuroPKI 2006: 16-30 |
35 | EE | Gabriel Vanrenen, Sean W. Smith, John Marchesini: Distributing security-mediated PKI. Int. J. Inf. Sec. 5(1): 3-17 (2006) |
2005 | ||
34 | EE | Meiyuan Zhao, Sean W. Smith, David M. Nicol: Aggregated path authentication for efficient BGP security. ACM Conference on Computer and Communications Security 2005: 128-138 |
33 | EE | Sara Sinclair, Sean W. Smith: PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness. ACSAC 2005: 419-430 |
32 | EE | John Marchesini, Sean W. Smith: Modeling Public Key Infrastructures in the Real World. EuroPKI 2005: 118-134 |
31 | EE | Mark Franklin, Kevin Mitcham, Sean W. Smith, Joshua Stabiner, Omen Wild: CA-in-a-Box. EuroPKI 2005: 180-190 |
30 | EE | James E. Dobson, Jeffrey B. Woodward, Susan A. Schwarz, John Marchesini, Hany Farid, Sean W. Smith: The Dartmouth Green Grid. International Conference on Computational Science (2) 2005: 99-106 |
29 | EE | John Marchesini, Sean W. Smith: SHEMP: Secure Hardware Enhanced MyProxy. PST 2005 |
28 | EE | John Marchesini, Sean W. Smith, Meiyuan Zhao: Keyjacking: the surprising insecurity of client-side SSL. Computers & Security 24(2): 109-123 (2005) |
27 | EE | Meiyuan Zhao, Sean W. Smith, David M. Nicol: The performance impact of BGP security. IEEE Network 19(6): 42-48 (2005) |
26 | EE | Alexander Iliev, Sean W. Smith: Protecting Client Privacy with Trusted Computing at the Server. IEEE Security & Privacy 3(2): 20-28 (2005) |
25 | EE | Sean W. Smith: Turing is from Mars, Shannon is from Venus: Computer Science and Computer Engineering. IEEE Security & Privacy 3(2): 66-69 (2005) |
24 | EE | Sara Sinclair, Sean W. Smith: The TIPPI Point: Toward Trustworthy Interfaces. IEEE Security & Privacy 3(4): 68-71 (2005) |
23 | EE | Sean W. Smith: Pretending that Systems Are Secure. IEEE Security & Privacy 3(6): 73-76 (2005) |
2004 | ||
22 | EE | John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian: Open-Source Applications of TCPA Hardware. ACSAC 2004: 294-303 |
21 | EE | Gabriel Vanrenen, Sean W. Smith: Distributing Security-Mediated PKI. EuroPKI 2004: 218-231 |
20 | Alexander Iliev, Sean W. Smith: Private Information Storage with Logarithm-Space Secure Hardware. International Information Security Workshops 2004: 199-214 | |
19 | EE | Anna Shubina, Sean W. Smith: Design and Prototype of a Coercion-Resistant, Verifiable Electronic Voting System. PST 2004: 29-39 |
18 | EE | Sean W. Smith, Eugene H. Spafford: Grand Challenges in Information Security: Process and Output. IEEE Security & Privacy 2(1): 69-71 (2004) |
17 | EE | Sean W. Smith: Outbound authentication for programmable secure coprocessors. Int. J. Inf. Sec. 3(1): 28-41 (2004) |
16 | EE | David M. Nicol, Sean W. Smith, Meiyuan Zhao: Evaluation of efficient security for BGP route announcements using parallel simulation. Simulation Modelling Practice and Theory 12(3-4): 187-216 (2004) |
2003 | ||
15 | EE | Sean W. Smith: Fairy Dust, Secrets, and the Real World. IEEE Security & Privacy 1(1): 89-93 (2003) |
14 | EE | Sean W. Smith: Humans in the Loop: Human-Computer Interaction and Security. IEEE Security & Privacy 1(3): 75-79 (2003) |
13 | EE | Sean W. Smith, Jothy Rosenberg, Adam Golodner: A Funny Thing Happened on the Way to the Marketplace. IEEE Security & Privacy 1(6): 74-78 (2003) |
12 | EE | Anna Shubina, Sean W. Smith: Using caching for browsing anonymity. SIGecom Exchanges 4(2): 11-20 (2003) |
2002 | ||
11 | K. Kain, Sean W. Smith, R. Asokan: Digital signatures and electronic documents: a cautionary tale. Communications and Multimedia Security 2002: 293-308 | |
10 | EE | Sean W. Smith: Outbound Authentication for Programmable Secure Coprocessors. ESORICS 2002: 72-89 |
9 | EE | Alexander Iliev, Sean W. Smith: Prototyping an Armored Data Vault: Rights Management on Big Brother's Computer. Privacy Enhancing Technologies 2002: 144-159 |
2001 | ||
8 | Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar: SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. IPDPS 2001: 170 | |
7 | EE | Sean W. Smith, David Safford: Practical server privacy with secure coprocessors. IBM Systems Journal 40(3): 683-695 (2001) |
6 | EE | Joan G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, Leendert van Doorn, Sean W. Smith, Steve Weingart: Building the IBM 4758 Secure Coprocessor. IEEE Computer 34(10): 57-66 (2001) |
1999 | ||
5 | EE | Sean W. Smith, Steve Weingart: Building a high-performance, programmable secure coprocessor. Computer Networks 31(8): 831-860 (1999) |
1998 | ||
4 | EE | Sean W. Smith, Elaine R. Palmer, Steve Weingart: Using a High-Performance, Programmable Secure Coprocessor. Financial Cryptography 1998: 73-89 |
1996 | ||
3 | Sean W. Smith, David B. Johnson: Minimizing Timestamp Size for Completely Asynchronous Optimistic Recovery with Minimal Rollback. SRDS 1996: 66-75 | |
1995 | ||
2 | Sean W. Smith, David B. Johnson, J. D. Tygar: Completely Asynchronous Optimistic Recovery with Minimal Rollbacks. FTCS 1995: 361-370 | |
1991 | ||
1 | EE | Merrick L. Furst, Jeffrey C. Jackson, Sean W. Smith: Improved Learning of AC0 Functions. COLT 1991: 317-325 |