| 2006 |
| 37 | EE | Hao Wang,
Somesh Jha,
Thomas W. Reps,
Stefan Schwoon,
Stuart G. Stubblebine:
Reducing the Dependence of SPKI/SDSI on PKI.
ESORICS 2006: 156-173 |
| 36 | EE | Paul C. van Oorschot,
Stuart G. Stubblebine:
On countering online dictionary attacks with login histories and humans-in-the-loop.
ACM Trans. Inf. Syst. Secur. 9(3): 235-258 (2006) |
| 2005 |
| 35 | EE | Craig Gentry,
Zulfikar Ramzan,
Stuart G. Stubblebine:
Secure distributed human computation.
ACM Conference on Electronic Commerce 2005: 155-164 |
| 34 | EE | Paul C. van Oorschot,
Stuart G. Stubblebine:
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling.
Financial Cryptography 2005: 31-43 |
| 33 | EE | Craig Gentry,
Zulfikar Ramzan,
Stuart G. Stubblebine:
Secure Distributed Human Computation.
Financial Cryptography 2005: 328-332 |
| 32 | EE | Richard Clayton,
Drew Dean,
Markus Jakobsson,
Steven Myers,
Stuart G. Stubblebine,
Michael Szydlo:
A Chat at the Old Phishin' Hole.
Financial Cryptography 2005: 88 |
| 2004 |
| 31 | EE | Stuart G. Stubblebine,
Paul C. van Oorschot:
Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract).
Financial Cryptography 2004: 39-53 |
| 30 | EE | Carl A. Gunter,
Michael J. May,
Stuart G. Stubblebine:
A Formal Privacy System and Its Application to Location Based Services.
Privacy Enhancing Technologies 2004: 256-282 |
| 29 | EE | Charles U. Martel,
Glen Nuckolls,
Premkumar T. Devanbu,
Michael Gertz,
April Kwong,
Stuart G. Stubblebine:
A General Model for Authenticated Data Structures.
Algorithmica 39(1): 21-41 (2004) |
| 2003 |
| 28 | EE | Glen Nuckolls,
Charles U. Martel,
Stuart G. Stubblebine:
Certifying data from multiple sources (extended abstract).
ACM Conference on Electronic Commerce 2003: 210-211 |
| 27 | EE | Stefan Schwoon,
Somesh Jha,
Thomas W. Reps,
Stuart G. Stubblebine:
On Generalized Authorization Problems.
CSFW 2003: 202- |
| 26 | | Glen Nuckolls,
Charles U. Martel,
Stuart G. Stubblebine:
Certifying Data from Multiple Sources.
DBSec 2003: 47-60 |
| 25 | | Premkumar T. Devanbu,
Michael Gertz,
Charles U. Martel,
Stuart G. Stubblebine:
Authentic Data Publication Over the Internet.
Journal of Computer Security 11(3): 291-314 (2003) |
| 2002 |
| 24 | EE | Premkumar T. Devanbu,
Stuart G. Stubblebine:
Stack and Queue Integrity on Hostile Platforms.
IEEE Trans. Software Eng. 28(1): 100-108 (2002) |
| 23 | EE | Stuart G. Stubblebine,
Rebecca N. Wright:
An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency.
IEEE Trans. Software Eng. 28(3): 256-285 (2002) |
| 2001 |
| 22 | EE | Premkumar T. Devanbu,
Michael Gertz,
April Kwong,
Charles U. Martel,
Glen Nuckolls,
Stuart G. Stubblebine:
Flexible authentication of XML documents.
ACM Conference on Computer and Communications Security 2001: 136-145 |
| 21 | EE | Philippe Golle,
Stuart G. Stubblebine:
Secure Distributed Computing in a Commercial Environment.
Financial Cryptography 2001: 279-294 |
| 2000 |
| 20 | | Premkumar T. Devanbu,
Michael Gertz,
Charles U. Martel,
Stuart G. Stubblebine:
Authentic Third-party Data Publication.
DBSec 2000: 101-112 |
| 19 | EE | Stuart G. Stubblebine,
Paul F. Syverson:
Authentic Attributes with Fine-Grained Anonymity Protection.
Financial Cryptography 2000: 276-294 |
| 18 | EE | Premkumar T. Devanbu,
Stuart G. Stubblebine:
Software engineering for security: a roadmap.
ICSE - Future of SE Track 2000: 227-239 |
| 17 | EE | Premkumar T. Devanbu,
Stuart G. Stubblebine:
Cryptographic Verification of Test Coverage Claims.
IEEE Trans. Software Eng. 26(2): 178-192 (2000) |
| 1999 |
| 16 | EE | Stuart G. Stubblebine,
Paul F. Syverson:
Fair On-Line Auctions without Special Trusted Parties.
Financial Cryptography 1999: 230-240 |
| 15 | EE | Paul F. Syverson,
Stuart G. Stubblebine:
Group Principals and the Formalization of Anonymity.
World Congress on Formal Methods 1999: 814-833 |
| 14 | EE | Michael K. Reiter,
Stuart G. Stubblebine:
Authentication Metric Analysis and Design.
ACM Trans. Inf. Syst. Secur. 2(2): 138-158 (1999) |
| 13 | EE | Stuart G. Stubblebine,
Paul F. Syverson,
David M. Goldschlag:
Unlinkable serial transactions: protocols and applications.
ACM Trans. Inf. Syst. Secur. 2(4): 354-389 (1999) |
| 1998 |
| 12 | EE | David M. Goldschlag,
Stuart G. Stubblebine:
Publicly Verifiable Lotteries: Applications of Delaying Functions.
Financial Cryptography 1998: 214-226 |
| 11 | | Premkumar T. Devanbu,
Philip W. L. Fong,
Stuart G. Stubblebine:
Techniques for Trusted Software Engineering.
ICSE 1998: 126-135 |
| 10 | EE | Premkumar T. Devanbu,
Stuart G. Stubblebine:
Stack and Queue Integrity on Hostile Platforms.
IEEE Symposium on Security and Privacy 1998: 198-206 |
| 9 | | Michael K. Reiter,
Stuart G. Stubblebine:
Resilient Authentication Using Path Independence.
IEEE Trans. Computers 47(12): 1351-1362 (1998) |
| 1997 |
| 8 | EE | Michael K. Reiter,
Stuart G. Stubblebine:
Path Independence for Authentication in Large-Scale Systems.
ACM Conference on Computer and Communications Security 1997: 57-66 |
| 7 | EE | Premkumar T. Devanbu,
Stuart G. Stubblebine:
Research Directions for Automated Software Verification: Using Trusted Hardware.
ASE 1997: 274-279 |
| 6 | EE | Premkumar T. Devanbu,
Stuart G. Stubblebine:
Cryptographic Verification of Test Coverage Claims.
ESEC / SIGSOFT FSE 1997: 395-413 |
| 5 | | Paul F. Syverson,
Stuart G. Stubblebine,
David M. Goldschlag:
Unlinkable Serial Transactions.
Financial Cryptography 1997: 39-56 |
| 4 | EE | Michael K. Reiter,
Stuart G. Stubblebine:
Toward Acceptable Metrics of Authentication.
IEEE Symposium on Security and Privacy 1997: 10-20 |
| 1996 |
| 3 | EE | Stuart G. Stubblebine,
Rebecca N. Wright:
An Authentication Logic Supporting Synchronization, Revocation, and Recency.
ACM Conference on Computer and Communications Security 1996: 95-105 |
| 1993 |
| 2 | | B. Clifford Neuman,
Stuart G. Stubblebine:
A Note on the Use of Timestamps as Nonces.
Operating Systems Review 27(2): 10-14 (1993) |
| 1991 |
| 1 | | Virgil D. Gligor,
Rajashekar Kailar,
Stuart G. Stubblebine,
Li Gong:
Logics for Cryptographic Protocols - Virtues and Limitations.
CSFW 1991: 219-226 |