2008 |
10 | EE | Sam Small,
Joshua Mason,
Fabian Monrose,
Niels Provos,
Adam Stubblefield:
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads.
USENIX Security Symposium 2008: 171-184 |
2006 |
9 | EE | Joshua Mason,
Kathryn Watkins,
Jason Eisner,
Adam Stubblefield:
A natural language approach to automated cryptanalysis of two-time pads.
ACM Conference on Computer and Communications Security 2006: 235-244 |
8 | EE | Stephen Bono,
Aviel D. Rubin,
Adam Stubblefield,
Matthew Green:
Security through legality.
Commun. ACM 49(6): 41-43 (2006) |
2005 |
7 | EE | Zachary N. J. Peterson,
Randal C. Burns,
Joseph Herring,
Adam Stubblefield,
Aviel D. Rubin:
Secure Deletion for a Versioning File System.
FAST 2005 |
6 | EE | Adam Stubblefield,
Aviel D. Rubin,
Dan S. Wallach:
Managing the Performance Impact of Web Security.
Electronic Commerce Research 5(1): 99-116 (2005) |
2004 |
5 | EE | Tadayoshi Kohno,
Adam Stubblefield,
Aviel D. Rubin,
Dan S. Wallach:
Analysis of an Electronic Voting System.
IEEE Symposium on Security and Privacy 2004: 27- |
4 | EE | Adam Stubblefield,
John Ioannidis,
Aviel D. Rubin:
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP).
ACM Trans. Inf. Syst. Secur. 7(2): 319-332 (2004) |
2002 |
3 | EE | Adam Stubblefield,
John Ioannidis,
Aviel D. Rubin:
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
NDSS 2002 |
2 | EE | Drew Dean,
Matthew K. Franklin,
Adam Stubblefield:
An algebraic approach to IP traceback.
ACM Trans. Inf. Syst. Secur. 5(2): 119-137 (2002) |
2001 |
1 | EE | Drew Dean,
Matthew K. Franklin,
Adam Stubblefield:
An Algebraic Approach to IP Traceback.
NDSS 2001 |