2006 |
37 | EE | Hao Wang,
Somesh Jha,
Thomas W. Reps,
Stefan Schwoon,
Stuart G. Stubblebine:
Reducing the Dependence of SPKI/SDSI on PKI.
ESORICS 2006: 156-173 |
36 | EE | Paul C. van Oorschot,
Stuart G. Stubblebine:
On countering online dictionary attacks with login histories and humans-in-the-loop.
ACM Trans. Inf. Syst. Secur. 9(3): 235-258 (2006) |
2005 |
35 | EE | Craig Gentry,
Zulfikar Ramzan,
Stuart G. Stubblebine:
Secure distributed human computation.
ACM Conference on Electronic Commerce 2005: 155-164 |
34 | EE | Paul C. van Oorschot,
Stuart G. Stubblebine:
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling.
Financial Cryptography 2005: 31-43 |
33 | EE | Craig Gentry,
Zulfikar Ramzan,
Stuart G. Stubblebine:
Secure Distributed Human Computation.
Financial Cryptography 2005: 328-332 |
32 | EE | Richard Clayton,
Drew Dean,
Markus Jakobsson,
Steven Myers,
Stuart G. Stubblebine,
Michael Szydlo:
A Chat at the Old Phishin' Hole.
Financial Cryptography 2005: 88 |
2004 |
31 | EE | Stuart G. Stubblebine,
Paul C. van Oorschot:
Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract).
Financial Cryptography 2004: 39-53 |
30 | EE | Carl A. Gunter,
Michael J. May,
Stuart G. Stubblebine:
A Formal Privacy System and Its Application to Location Based Services.
Privacy Enhancing Technologies 2004: 256-282 |
29 | EE | Charles U. Martel,
Glen Nuckolls,
Premkumar T. Devanbu,
Michael Gertz,
April Kwong,
Stuart G. Stubblebine:
A General Model for Authenticated Data Structures.
Algorithmica 39(1): 21-41 (2004) |
2003 |
28 | EE | Glen Nuckolls,
Charles U. Martel,
Stuart G. Stubblebine:
Certifying data from multiple sources (extended abstract).
ACM Conference on Electronic Commerce 2003: 210-211 |
27 | EE | Stefan Schwoon,
Somesh Jha,
Thomas W. Reps,
Stuart G. Stubblebine:
On Generalized Authorization Problems.
CSFW 2003: 202- |
26 | | Glen Nuckolls,
Charles U. Martel,
Stuart G. Stubblebine:
Certifying Data from Multiple Sources.
DBSec 2003: 47-60 |
25 | | Premkumar T. Devanbu,
Michael Gertz,
Charles U. Martel,
Stuart G. Stubblebine:
Authentic Data Publication Over the Internet.
Journal of Computer Security 11(3): 291-314 (2003) |
2002 |
24 | EE | Premkumar T. Devanbu,
Stuart G. Stubblebine:
Stack and Queue Integrity on Hostile Platforms.
IEEE Trans. Software Eng. 28(1): 100-108 (2002) |
23 | EE | Stuart G. Stubblebine,
Rebecca N. Wright:
An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency.
IEEE Trans. Software Eng. 28(3): 256-285 (2002) |
2001 |
22 | EE | Premkumar T. Devanbu,
Michael Gertz,
April Kwong,
Charles U. Martel,
Glen Nuckolls,
Stuart G. Stubblebine:
Flexible authentication of XML documents.
ACM Conference on Computer and Communications Security 2001: 136-145 |
21 | EE | Philippe Golle,
Stuart G. Stubblebine:
Secure Distributed Computing in a Commercial Environment.
Financial Cryptography 2001: 279-294 |
2000 |
20 | | Premkumar T. Devanbu,
Michael Gertz,
Charles U. Martel,
Stuart G. Stubblebine:
Authentic Third-party Data Publication.
DBSec 2000: 101-112 |
19 | EE | Stuart G. Stubblebine,
Paul F. Syverson:
Authentic Attributes with Fine-Grained Anonymity Protection.
Financial Cryptography 2000: 276-294 |
18 | EE | Premkumar T. Devanbu,
Stuart G. Stubblebine:
Software engineering for security: a roadmap.
ICSE - Future of SE Track 2000: 227-239 |
17 | EE | Premkumar T. Devanbu,
Stuart G. Stubblebine:
Cryptographic Verification of Test Coverage Claims.
IEEE Trans. Software Eng. 26(2): 178-192 (2000) |
1999 |
16 | EE | Stuart G. Stubblebine,
Paul F. Syverson:
Fair On-Line Auctions without Special Trusted Parties.
Financial Cryptography 1999: 230-240 |
15 | EE | Paul F. Syverson,
Stuart G. Stubblebine:
Group Principals and the Formalization of Anonymity.
World Congress on Formal Methods 1999: 814-833 |
14 | EE | Michael K. Reiter,
Stuart G. Stubblebine:
Authentication Metric Analysis and Design.
ACM Trans. Inf. Syst. Secur. 2(2): 138-158 (1999) |
13 | EE | Stuart G. Stubblebine,
Paul F. Syverson,
David M. Goldschlag:
Unlinkable serial transactions: protocols and applications.
ACM Trans. Inf. Syst. Secur. 2(4): 354-389 (1999) |
1998 |
12 | EE | David M. Goldschlag,
Stuart G. Stubblebine:
Publicly Verifiable Lotteries: Applications of Delaying Functions.
Financial Cryptography 1998: 214-226 |
11 | | Premkumar T. Devanbu,
Philip W. L. Fong,
Stuart G. Stubblebine:
Techniques for Trusted Software Engineering.
ICSE 1998: 126-135 |
10 | EE | Premkumar T. Devanbu,
Stuart G. Stubblebine:
Stack and Queue Integrity on Hostile Platforms.
IEEE Symposium on Security and Privacy 1998: 198-206 |
9 | | Michael K. Reiter,
Stuart G. Stubblebine:
Resilient Authentication Using Path Independence.
IEEE Trans. Computers 47(12): 1351-1362 (1998) |
1997 |
8 | EE | Michael K. Reiter,
Stuart G. Stubblebine:
Path Independence for Authentication in Large-Scale Systems.
ACM Conference on Computer and Communications Security 1997: 57-66 |
7 | EE | Premkumar T. Devanbu,
Stuart G. Stubblebine:
Research Directions for Automated Software Verification: Using Trusted Hardware.
ASE 1997: 274-279 |
6 | EE | Premkumar T. Devanbu,
Stuart G. Stubblebine:
Cryptographic Verification of Test Coverage Claims.
ESEC / SIGSOFT FSE 1997: 395-413 |
5 | | Paul F. Syverson,
Stuart G. Stubblebine,
David M. Goldschlag:
Unlinkable Serial Transactions.
Financial Cryptography 1997: 39-56 |
4 | EE | Michael K. Reiter,
Stuart G. Stubblebine:
Toward Acceptable Metrics of Authentication.
IEEE Symposium on Security and Privacy 1997: 10-20 |
1996 |
3 | EE | Stuart G. Stubblebine,
Rebecca N. Wright:
An Authentication Logic Supporting Synchronization, Revocation, and Recency.
ACM Conference on Computer and Communications Security 1996: 95-105 |
1993 |
2 | | B. Clifford Neuman,
Stuart G. Stubblebine:
A Note on the Use of Timestamps as Nonces.
Operating Systems Review 27(2): 10-14 (1993) |
1991 |
1 | | Virgil D. Gligor,
Rajashekar Kailar,
Stuart G. Stubblebine,
Li Gong:
Logics for Cryptographic Protocols - Virtues and Limitations.
CSFW 1991: 219-226 |