2008 |
53 | EE | Patrick P. Tsang,
Man Ho Au,
Apu Kapadia,
Sean W. Smith:
PEREA: towards practical TTP-free revocation in anonymous authentication.
ACM Conference on Computer and Communications Security 2008: 333-344 |
52 | EE | Patrick P. Tsang,
Sean W. Smith:
PPAA: Peer-to-Peer Anonymous Authentication.
ACNS 2008: 55-74 |
51 | EE | Massimiliano Pala,
Shreyas Cholia,
Scott A. Rea,
Sean W. Smith:
Extending PKI Interoperability in Computational Grids.
CCGRID 2008: 645-650 |
50 | EE | Massimiliano Pala,
Sean W. Smith:
PEACHES and Peers.
EuroPKI 2008: 223-238 |
49 | EE | Patrick P. Tsang,
Sean W. Smith:
Secure Cryptographic Precomputation with Insecure Memory.
ISPEC 2008: 146-160 |
48 | EE | Patrick P. Tsang,
Sean W. Smith:
Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers.
ISPEC 2008: 188-202 |
47 | EE | Patrick P. Tsang,
Sean W. Smith:
YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems.
SEC 2008: 445-459 |
46 | EE | Sergey Bratus,
Nihal D'Cunha,
Evan Sparks,
Sean W. Smith:
TOCTOU, Traps, and Trusted Computing.
TRUST 2008: 14-32 |
45 | EE | Sergey Bratus,
Michael E. Locasto,
Ashwin Ramaswamy,
Sean W. Smith:
Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security.
VMSec 2008: 49-58 |
44 | EE | Katelin Bailey,
Apu Kapadia,
Linden Vongsathorn,
Sean W. Smith:
TwoKind authentication: protecting private information in untrustworthy environments.
WPES 2008: 39-44 |
2007 |
43 | EE | Patrick P. Tsang,
Man Ho Au,
Apu Kapadia,
Sean W. Smith:
Blacklistable anonymous credentials: blocking misbehaving users without ttps.
ACM Conference on Computer and Communications Security 2007: 72-81 |
42 | EE | Massimiliano Pala,
Sean W. Smith:
AutoPKI: A PKI Resources Discovery System.
EuroPKI 2007: 154-169 |
41 | EE | Sara Sinclair,
Sean W. Smith,
Stephanie Trudeau,
M. Eric Johnson,
Anthony Portera:
Information Risk in Financial Institutions: Field Study and Research Roadmap.
FinanceCom 2007: 165-180 |
40 | EE | Patrick P. Tsang,
Sherman S. M. Chow,
Sean W. Smith:
Batch Pairing Delegation.
IWSEC 2007: 74-90 |
39 | EE | Apu Kapadia,
Patrick P. Tsang,
Sean W. Smith:
Attribute-Based Publishing with Hidden Credentials and Hidden Policies.
NDSS 2007 |
38 | EE | Peter C. Johnson,
Apu Kapadia,
Patrick P. Tsang,
Sean W. Smith:
Nymble: Anonymous IP-Address Blocking.
Privacy Enhancing Technologies 2007: 113-133 |
37 | EE | Katelin Bailey,
Linden Vongsathorn,
Apu Kapadia,
Chris Masone,
Sean W. Smith:
TwoKind authentication: usable authenticators for untrustworthy environments.
SOUPS 2007: 169-170 |
2006 |
36 | EE | Meiyuan Zhao,
Sean W. Smith:
Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI.
EuroPKI 2006: 16-30 |
35 | EE | Gabriel Vanrenen,
Sean W. Smith,
John Marchesini:
Distributing security-mediated PKI.
Int. J. Inf. Sec. 5(1): 3-17 (2006) |
2005 |
34 | EE | Meiyuan Zhao,
Sean W. Smith,
David M. Nicol:
Aggregated path authentication for efficient BGP security.
ACM Conference on Computer and Communications Security 2005: 128-138 |
33 | EE | Sara Sinclair,
Sean W. Smith:
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness.
ACSAC 2005: 419-430 |
32 | EE | John Marchesini,
Sean W. Smith:
Modeling Public Key Infrastructures in the Real World.
EuroPKI 2005: 118-134 |
31 | EE | Mark Franklin,
Kevin Mitcham,
Sean W. Smith,
Joshua Stabiner,
Omen Wild:
CA-in-a-Box.
EuroPKI 2005: 180-190 |
30 | EE | James E. Dobson,
Jeffrey B. Woodward,
Susan A. Schwarz,
John Marchesini,
Hany Farid,
Sean W. Smith:
The Dartmouth Green Grid.
International Conference on Computational Science (2) 2005: 99-106 |
29 | EE | John Marchesini,
Sean W. Smith:
SHEMP: Secure Hardware Enhanced MyProxy.
PST 2005 |
28 | EE | John Marchesini,
Sean W. Smith,
Meiyuan Zhao:
Keyjacking: the surprising insecurity of client-side SSL.
Computers & Security 24(2): 109-123 (2005) |
27 | EE | Meiyuan Zhao,
Sean W. Smith,
David M. Nicol:
The performance impact of BGP security.
IEEE Network 19(6): 42-48 (2005) |
26 | EE | Alexander Iliev,
Sean W. Smith:
Protecting Client Privacy with Trusted Computing at the Server.
IEEE Security & Privacy 3(2): 20-28 (2005) |
25 | EE | Sean W. Smith:
Turing is from Mars, Shannon is from Venus: Computer Science and Computer Engineering.
IEEE Security & Privacy 3(2): 66-69 (2005) |
24 | EE | Sara Sinclair,
Sean W. Smith:
The TIPPI Point: Toward Trustworthy Interfaces.
IEEE Security & Privacy 3(4): 68-71 (2005) |
23 | EE | Sean W. Smith:
Pretending that Systems Are Secure.
IEEE Security & Privacy 3(6): 73-76 (2005) |
2004 |
22 | EE | John Marchesini,
Sean W. Smith,
Omen Wild,
Joshua Stabiner,
Alex Barsamian:
Open-Source Applications of TCPA Hardware.
ACSAC 2004: 294-303 |
21 | EE | Gabriel Vanrenen,
Sean W. Smith:
Distributing Security-Mediated PKI.
EuroPKI 2004: 218-231 |
20 | | Alexander Iliev,
Sean W. Smith:
Private Information Storage with Logarithm-Space Secure Hardware.
International Information Security Workshops 2004: 199-214 |
19 | EE | Anna Shubina,
Sean W. Smith:
Design and Prototype of a Coercion-Resistant, Verifiable Electronic Voting System.
PST 2004: 29-39 |
18 | EE | Sean W. Smith,
Eugene H. Spafford:
Grand Challenges in Information Security: Process and Output.
IEEE Security & Privacy 2(1): 69-71 (2004) |
17 | EE | Sean W. Smith:
Outbound authentication for programmable secure coprocessors.
Int. J. Inf. Sec. 3(1): 28-41 (2004) |
16 | EE | David M. Nicol,
Sean W. Smith,
Meiyuan Zhao:
Evaluation of efficient security for BGP route announcements using parallel simulation.
Simulation Modelling Practice and Theory 12(3-4): 187-216 (2004) |
2003 |
15 | EE | Sean W. Smith:
Fairy Dust, Secrets, and the Real World.
IEEE Security & Privacy 1(1): 89-93 (2003) |
14 | EE | Sean W. Smith:
Humans in the Loop: Human-Computer Interaction and Security.
IEEE Security & Privacy 1(3): 75-79 (2003) |
13 | EE | Sean W. Smith,
Jothy Rosenberg,
Adam Golodner:
A Funny Thing Happened on the Way to the Marketplace.
IEEE Security & Privacy 1(6): 74-78 (2003) |
12 | EE | Anna Shubina,
Sean W. Smith:
Using caching for browsing anonymity.
SIGecom Exchanges 4(2): 11-20 (2003) |
2002 |
11 | | K. Kain,
Sean W. Smith,
R. Asokan:
Digital signatures and electronic documents: a cautionary tale.
Communications and Multimedia Security 2002: 293-308 |
10 | EE | Sean W. Smith:
Outbound Authentication for Programmable Secure Coprocessors.
ESORICS 2002: 72-89 |
9 | EE | Alexander Iliev,
Sean W. Smith:
Prototyping an Armored Data Vault: Rights Management on Big Brother's Computer.
Privacy Enhancing Technologies 2002: 144-159 |
2001 |
8 | | Adrian Perrig,
Sean W. Smith,
Dawn Xiaodong Song,
J. D. Tygar:
SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware.
IPDPS 2001: 170 |
7 | EE | Sean W. Smith,
David Safford:
Practical server privacy with secure coprocessors.
IBM Systems Journal 40(3): 683-695 (2001) |
6 | EE | Joan G. Dyer,
Mark Lindemann,
Ronald Perez,
Reiner Sailer,
Leendert van Doorn,
Sean W. Smith,
Steve Weingart:
Building the IBM 4758 Secure Coprocessor.
IEEE Computer 34(10): 57-66 (2001) |
1999 |
5 | EE | Sean W. Smith,
Steve Weingart:
Building a high-performance, programmable secure coprocessor.
Computer Networks 31(8): 831-860 (1999) |
1998 |
4 | EE | Sean W. Smith,
Elaine R. Palmer,
Steve Weingart:
Using a High-Performance, Programmable Secure Coprocessor.
Financial Cryptography 1998: 73-89 |
1996 |
3 | | Sean W. Smith,
David B. Johnson:
Minimizing Timestamp Size for Completely Asynchronous Optimistic Recovery with Minimal Rollback.
SRDS 1996: 66-75 |
1995 |
2 | | Sean W. Smith,
David B. Johnson,
J. D. Tygar:
Completely Asynchronous Optimistic Recovery with Minimal Rollbacks.
FTCS 1995: 361-370 |
1991 |
1 | EE | Merrick L. Furst,
Jeffrey C. Jackson,
Sean W. Smith:
Improved Learning of AC0 Functions.
COLT 1991: 317-325 |