default search action
BibTeX records: Steven M. Bellovin
@article{DBLP:journals/cybersecurity/AbelsonABBBCDLNRSSTT24, author = {Harold Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Jon Callas and Whitfield Diffie and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Vanessa Teague and Carmela Troncoso}, title = {Bugs in our pockets: the risks of client-side scanning}, journal = {J. Cybersecur.}, volume = {10}, number = {1}, year = {2024}, url = {https://doi.org/10.1093/cybsec/tyad020}, doi = {10.1093/CYBSEC/TYAD020}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBCDLNRSSTT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin24, author = {Steven M. Bellovin}, title = {Degenerative AI?}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {3}, pages = {88}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3385549}, doi = {10.1109/MSEC.2024.3385549}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-01649, author = {Susan Landau and James X. Dempsey and Ece Kamar and Steven M. Bellovin}, title = {Recommendations for Government Development and Use of Advanced Automated Systems to Make Decisions about Individuals}, journal = {CoRR}, volume = {abs/2403.01649}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.01649}, doi = {10.48550/ARXIV.2403.01649}, eprinttype = {arXiv}, eprint = {2403.01649}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-01649.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2406-10430, author = {Susan Landau and James X. Dempsey and Ece Kamar and Steven M. Bellovin and Robert Pool}, title = {Challenging the Machine: Contestability in Government {AI} Systems}, journal = {CoRR}, volume = {abs/2406.10430}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2406.10430}, doi = {10.48550/ARXIV.2406.10430}, eprinttype = {arXiv}, eprint = {2406.10430}, timestamp = {Wed, 10 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2406-10430.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin23, author = {Steven M. Bellovin}, title = {Is Cybersecurity Liability a Liability?}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {4}, pages = {99--100}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3273461}, doi = {10.1109/MSEC.2023.3273461}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc9446, author = {Stephen Farrell and Farzaneh Badii and Bruce Schneier and Steven M. Bellovin}, title = {Reflections on Ten Years Past the Snowden Revelations}, journal = {{RFC}}, volume = {9446}, pages = {1--29}, year = {2023}, url = {https://doi.org/10.17487/RFC9446}, doi = {10.17487/RFC9446}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc9446.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin22, author = {Steven M. Bellovin}, title = {Open Source and Trust}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {2}, pages = {107--108}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2022.3142464}, doi = {10.1109/MSEC.2022.3142464}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin22a, author = {Steven M. Bellovin}, title = {What Do We Owe?}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {6}, pages = {83--84}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2022.3205512}, doi = {10.1109/MSEC.2022.3205512}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChristRB22, author = {Miranda Christ and Sarah Radway and Steven M. Bellovin}, title = {Differential Privacy and Swapping: Examining De-Identification's Impact on Minority Representation and Privacy Preservation in the {U.S.} Census}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {457--472}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833668}, doi = {10.1109/SP46214.2022.9833668}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/ChristRB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin21, author = {Steven M. Bellovin}, title = {The Law and Lawful Hacking}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {4}, pages = {76}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3077374}, doi = {10.1109/MSEC.2021.3077374}, timestamp = {Wed, 14 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/KohNB21, author = {John S. Koh and Jason Nieh and Steven M. Bellovin}, editor = {Suman Banerjee and Luca Mottola and Xia Zhou}, title = {Encrypted cloud photo storage using Google photos}, booktitle = {MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June - 2 July, 2021}, pages = {136--149}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3458864.3468220}, doi = {10.1145/3458864.3468220}, timestamp = {Thu, 27 Apr 2023 08:25:09 +0200}, biburl = {https://dblp.org/rec/conf/mobisys/KohNB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-07450, author = {Hal Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Jon Callas and Whitfield Diffie and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Vanessa Teague and Carmela Troncoso}, title = {Bugs in our Pockets: The Risks of Client-Side Scanning}, journal = {CoRR}, volume = {abs/2110.07450}, year = {2021}, url = {https://arxiv.org/abs/2110.07450}, eprinttype = {arXiv}, eprint = {2110.07450}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-07450.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin20, author = {Steven M. Bellovin}, title = {Policies on Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {18}, number = {2}, pages = {76}, year = {2020}, url = {https://doi.org/10.1109/MSEC.2020.2966900}, doi = {10.1109/MSEC.2020.2966900}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin20a, author = {Steven M. Bellovin}, title = {Security, Privacy, and Scale}, journal = {{IEEE} Secur. Priv.}, volume = {18}, number = {6}, pages = {63--64}, year = {2020}, url = {https://doi.org/10.1109/MSEC.2020.3019709}, doi = {10.1109/MSEC.2020.3019709}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin19, author = {Steven M. Bellovin}, title = {Layered Insecurity}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {3}, pages = {96--95}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2906807}, doi = {10.1109/MSEC.2019.2906807}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/KohBN19, author = {John S. Koh and Steven M. Bellovin and Jason Nieh}, title = {Making It Easier to Encrypt Your Emails}, journal = {login Usenix Mag.}, volume = {44}, number = {3}, year = {2019}, url = {https://www.usenix.org/publications/login/fall2019/koh}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/KohBN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/KohBN19, author = {John S. Koh and Steven M. Bellovin and Jason Nieh}, editor = {George Candea and Robbert van Renesse and Christof Fetzer}, title = {Why Joanie Can Encrypt: Easy Email Encryption with Easy Key Management}, booktitle = {Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019}, pages = {2:1--2:16}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3302424.3303980}, doi = {10.1145/3302424.3303980}, timestamp = {Thu, 28 Mar 2019 13:37:53 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/KohBN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BellovinN18, author = {Steven M. Bellovin and Peter G. Neumann}, title = {The big picture}, journal = {Commun. {ACM}}, volume = {61}, number = {11}, pages = {24--26}, year = {2018}, url = {https://doi.org/10.1145/3277564}, doi = {10.1145/3277564}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BellovinN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin18, author = {Steven M. Bellovin}, title = {Toward a National Cybersecurity Policy}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {3}, pages = {108}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.2701148}, doi = {10.1109/MSP.2018.2701148}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/BellovinLL17, author = {Steven M. Bellovin and Susan Landau and Herbert S. Lin}, title = {Limiting the undesired impact of cyber weapons: technical requirements and policy implications}, journal = {J. Cybersecur.}, volume = {3}, number = {1}, pages = {59--68}, year = {2017}, url = {https://doi.org/10.1093/cybsec/tyx001}, doi = {10.1093/CYBSEC/TYX001}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/BellovinLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin17, author = {Steven M. Bellovin}, title = {Jurisdiction and the Internet}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {3}, pages = {96}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.55}, doi = {10.1109/MSP.2017.55}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin17a, author = {Steven M. Bellovin}, title = {Who Are You?}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {6}, pages = {88}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.4251120}, doi = {10.1109/MSP.2017.4251120}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZimmeckWZI0SWSB17, author = {Sebastian Zimmeck and Ziqi Wang and Lieyong Zou and Roger Iyengar and Bin Liu and Florian Schaub and Shomir Wilson and Norman M. Sadeh and Steven M. Bellovin and Joel R. Reidenberg}, title = {Automated Analysis of Privacy Requirements for Mobile Apps}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/automated-analysis-privacy-requirements-mobile-apps/}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ZimmeckWZI0SWSB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZimmeckLKBJ17, author = {Sebastian Zimmeck and Jie S. Li and Hyungtae Kim and Steven M. Bellovin and Tony Jebara}, editor = {Engin Kirda and Thomas Ristenpart}, title = {A Privacy Analysis of Cross-device Tracking}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {1391--1408}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/zimmeck}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZimmeckLKBJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BellovinB016, author = {Steven M. Bellovin and Matt Blaze and Susan Landau}, title = {Insecure Surveillance: Technical Issues with Remote Computer Searches}, journal = {Computer}, volume = {49}, number = {3}, pages = {14--24}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.68}, doi = {10.1109/MC.2016.68}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BellovinB016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin16, author = {Steven M. Bellovin}, title = {Attack Surfaces}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {3}, pages = {88}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.55}, doi = {10.1109/MSP.2016.55}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin16a, author = {Steven M. Bellovin}, title = {Easy Email Encryption}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {6}, pages = {96}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.132}, doi = {10.1109/MSP.2016.132}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaaifs/ZimmeckWZILSWSB16, author = {Sebastian Zimmeck and Ziqi Wang and Lieyong Zou and Roger Iyengar and Bin Liu and Florian Schaub and Shomir Wilson and Norman M. Sadeh and Steven M. Bellovin and Joel R. Reidenberg}, title = {Automated Analysis of Privacy Requirements for Mobile Apps}, booktitle = {2016 {AAAI} Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016}, publisher = {{AAAI} Press}, year = {2016}, url = {http://aaai.org/ocs/index.php/FSS/FSS16/paper/view/14113}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaaifs/ZimmeckWZILSWSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Bellovin16, author = {Steven M. Bellovin}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {40--66}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_4}, doi = {10.1007/978-3-662-49301-4\_4}, timestamp = {Sat, 19 Oct 2019 20:29:10 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Bellovin16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GutmannBBRS16, author = {Peter Gutmann and Steven M. Bellovin and Matt Blaze and Ronald L. Rivest and Nigel P. Smart}, title = {An IBE-based Signcryption Scheme for Group Key Management}, journal = {CoRR}, volume = {abs/1603.09526}, year = {2016}, url = {http://arxiv.org/abs/1603.09526}, eprinttype = {arXiv}, eprint = {1603.09526}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GutmannBBRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/AbelsonABBBDGGL15, author = {Harold Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Whitfield Diffie and John Gilmore and Matthew Green and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Michael A. Specter and Daniel J. Weitzner}, title = {Keys under doormats}, journal = {Commun. {ACM}}, volume = {58}, number = {10}, pages = {24--26}, year = {2015}, url = {https://doi.org/10.1145/2814825}, doi = {10.1145/2814825}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/AbelsonABBBDGGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/AbelsonABBBDGG015, author = {Harold Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Whitfield Diffie and John Gilmore and Matthew Green and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Michael A. Specter and Daniel J. Weitzner}, title = {Keys under doormats: mandating insecurity by requiring government access to all data and communications}, journal = {J. Cybersecur.}, volume = {1}, number = {1}, pages = {69--79}, year = {2015}, url = {https://doi.org/10.1093/cybsec/tyv009}, doi = {10.1093/CYBSEC/TYV009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBDGG015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin15, author = {Steven M. Bellovin}, title = {What a Real Cybersecurity Bill Should Address}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {3}, pages = {92}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.52}, doi = {10.1109/MSP.2015.52}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin15a, author = {Steven M. Bellovin}, title = {The Key to the Key}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {6}, pages = {96}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.120}, doi = {10.1109/MSP.2015.120}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosn/RiedererZPCB15, author = {Christopher J. Riederer and Sebastian Zimmeck and Coralie Phanord and Augustin Chaintreau and Steven M. Bellovin}, editor = {Aneesh Sharma and Rakesh Agrawal and Matthias Grossglauser}, title = {"I don't have a photograph, but you can have my footprints.": Revealing the Demographics of Location Data}, booktitle = {Proceedings of the 2015 {ACM} on Conference on Online Social Networks, {COSN} 2015, Palo Alto, California, USA, November 2-3, 2015}, pages = {185--195}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2817946.2817968}, doi = {10.1145/2817946.2817968}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosn/RiedererZPCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/RiedererZPCB15, author = {Christopher J. Riederer and Sebastian Zimmeck and Coralie Phanord and Augustin Chaintreau and Steven M. Bellovin}, editor = {Meeyoung Cha and Cecilia Mascolo and Christian Sandvig}, title = {"I Don't Have a Photograph, But You Can Have My Footprints" - Revealing the Demographics of Location Data}, booktitle = {Proceedings of the Ninth International Conference on Web and Social Media, {ICWSM} 2015, University of Oxford, Oxford, UK, May 26-29, 2015}, pages = {682--685}, publisher = {{AAAI} Press}, year = {2015}, url = {http://www.aaai.org/ocs/index.php/ICWSM/ICWSM15/paper/view/10576}, timestamp = {Fri, 05 Feb 2021 11:07:20 +0100}, biburl = {https://dblp.org/rec/conf/icwsm/RiedererZPCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FiscVKKKMB15, author = {Ben A. Fisch and Binh Vo and Fernando Krell and Abishek Kumarasubramanian and Vladimir Kolesnikov and Tal Malkin and Steven M. Bellovin}, title = {Malicious-Client Security in Blind Seer: {A} Scalable Private {DBMS}}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {395--410}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.31}, doi = {10.1109/SP.2015.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/FiscVKKKMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin14, author = {Steven M. Bellovin}, title = {Dr. Strangecode}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {88}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.42}, doi = {10.1109/MSP.2014.42}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin14a, author = {Steven M. Bellovin}, title = {By Any Means Possible: How Intelligence Agencies Have Gotten Their Data}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {80--84}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.63}, doi = {10.1109/MSP.2014.63}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin14b, author = {Steven M. Bellovin}, title = {What Should Crypto Look Like?}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {108}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.131}, doi = {10.1109/MSP.2014.131}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/VoB14, author = {Binh Vo and Steven M. Bellovin}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {Anonymous Publish-Subscribe Systems}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {152}, pages = {195--211}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23829-6\_15}, doi = {10.1007/978-3-319-23829-6\_15}, timestamp = {Tue, 23 May 2017 01:12:12 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/VoB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PappasKVKMCGKB14, author = {Vasilis Pappas and Fernando Krell and Binh Vo and Vladimir Kolesnikov and Tal Malkin and Seung Geol Choi and Wesley George and Angelos D. Keromytis and Steven M. Bellovin}, title = {Blind Seer: {A} Scalable Private {DBMS}}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {359--374}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.30}, doi = {10.1109/SP.2014.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/PappasKVKMCGKB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZimmeckB14, author = {Sebastian Zimmeck and Steven M. Bellovin}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Privee: An Architecture for Automatically Analyzing Web Privacy Policies}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {1--16}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/zimmeck}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZimmeckB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischVKKKMB14, author = {Ben Fisch and Binh Vo and Fernando Krell and Abishek Kumarasubramanian and Vladimir Kolesnikov and Tal Malkin and Steven M. Bellovin}, title = {Malicious-Client Security in Blind Seer: {A} Scalable Private {DBMS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {963}, year = {2014}, url = {http://eprint.iacr.org/2014/963}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischVKKKMB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc7353, author = {Steven M. Bellovin and Randy Bush and David Ward}, title = {Security Requirements for {BGP} Path Validation}, journal = {{RFC}}, volume = {7353}, pages = {1--9}, year = {2014}, url = {https://doi.org/10.17487/RFC7353}, doi = {10.17487/RFC7353}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc7353.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BellovinBCL13, author = {Steven M. Bellovin and Matt Blaze and Sandy Clark and Susan Landau}, title = {Going Bright: Wiretapping without Weakening Communications Infrastructure}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {1}, pages = {62--72}, year = {2013}, url = {https://doi.org/10.1109/MSP.2012.138}, doi = {10.1109/MSP.2012.138}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BellovinBCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin13, author = {Steven M. Bellovin}, title = {Military Cybersomethings}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {3}, pages = {88}, year = {2013}, url = {https://doi.org/10.1109/MSP.2013.63}, doi = {10.1109/MSP.2013.63}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin13a, author = {Steven M. Bellovin}, title = {Walls and Gates}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {6}, pages = {88}, year = {2013}, url = {https://doi.org/10.1109/MSP.2013.157}, doi = {10.1109/MSP.2013.157}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin12, author = {Steven M. Bellovin}, title = {Fighting the Last War}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {3}, pages = {96}, year = {2012}, url = {https://doi.org/10.1109/MSP.2012.66}, doi = {10.1109/MSP.2012.66}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/0001CVLMBS12, author = {Mariana Raykova and Ang Cui and Binh Vo and Bin Liu and Tal Malkin and Steven M. Bellovin and Salvatore J. Stolfo}, title = {Usable, Secure, Private Search}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {5}, pages = {53--60}, year = {2012}, url = {https://doi.org/10.1109/MSP.2011.155}, doi = {10.1109/MSP.2011.155}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/0001CVLMBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin12a, author = {Steven M. Bellovin}, title = {The Major Cyberincident Investigations Board}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {6}, pages = {96}, year = {2012}, url = {https://doi.org/10.1109/MSP.2012.158}, doi = {10.1109/MSP.2012.158}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/LandwehrBMBLL12, author = {Carl E. Landwehr and Dan Boneh and John C. Mitchell and Steven M. Bellovin and Susan Landau and Michael E. Lesk}, title = {Privacy and Cybersecurity: The Next 100 Years}, journal = {Proc. {IEEE}}, volume = {100}, number = {Centennial-Issue}, pages = {1659--1673}, year = {2012}, url = {https://doi.org/10.1109/JPROC.2012.2189794}, doi = {10.1109/JPROC.2012.2189794}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/LandwehrBMBLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RaykovaZB12, author = {Mariana Raykova and Hang Zhao and Steven M. Bellovin}, editor = {Angelos D. Keromytis}, title = {Privacy Enhanced Access Control for Outsourced Data Sharing}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, February 27 - March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {223--238}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_17}, doi = {10.1007/978-3-642-32946-3\_17}, timestamp = {Tue, 30 Jul 2024 10:38:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/RaykovaZB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/MadejskiJB12, author = {Michelle Madejski and Maritza L. Johnson and Steven M. Bellovin}, title = {A study of privacy settings errors in an online social network}, booktitle = {Tenth Annual {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2012, March 19-23, 2012, Lugano, Switzerland, Workshop Proceedings}, pages = {340--345}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/PerComW.2012.6197507}, doi = {10.1109/PERCOMW.2012.6197507}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/MadejskiJB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/JohnsonEB12, author = {Maritza L. Johnson and Serge Egelman and Steven M. Bellovin}, editor = {Lorrie Faith Cranor}, title = {Facebook and privacy: it's complicated}, booktitle = {Symposium On Usable Privacy and Security, {SOUPS} '12, Washington, DC, {USA} - July 11 - 13, 2012}, pages = {9}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2335356.2335369}, doi = {10.1145/2335356.2335369}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/JohnsonEB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc6528, author = {Fernando Gont and Steven M. Bellovin}, title = {Defending against Sequence Number Attacks}, journal = {{RFC}}, volume = {6528}, pages = {1--12}, year = {2012}, url = {https://doi.org/10.17487/RFC6528}, doi = {10.17487/RFC6528}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc6528.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BellovinBDLR11, author = {Steven M. Bellovin and Scott O. Bradner and Whitfield Diffie and Susan Landau and Jennifer Rexford}, title = {As simple as possible - but not more so}, journal = {Commun. {ACM}}, volume = {54}, number = {8}, pages = {30--33}, year = {2011}, url = {https://doi.org/10.1145/1978542.1978553}, doi = {10.1145/1978542.1978553}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/BellovinBDLR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bellovin11, author = {Steven M. Bellovin}, title = {Frank Miller: Inventor of the One-Time Pad}, journal = {Cryptologia}, volume = {35}, number = {3}, pages = {203--222}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.583711}, doi = {10.1080/01611194.2011.583711}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Bellovin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/StolfoBE11, author = {Salvatore J. Stolfo and Steven M. Bellovin and David Evans}, title = {Measuring Security}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {3}, pages = {60--65}, year = {2011}, url = {https://doi.org/10.1109/MSP.2011.56}, doi = {10.1109/MSP.2011.56}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/StolfoBE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin11, author = {Steven M. Bellovin}, title = {Clouds from Both Sides}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {3}, pages = {88}, year = {2011}, url = {https://doi.org/10.1109/MSP.2011.48}, doi = {10.1109/MSP.2011.48}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin11a, author = {Steven M. Bellovin}, title = {Security Think}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {6}, pages = {88}, year = {2011}, url = {https://doi.org/10.1109/MSP.2011.172}, doi = {10.1109/MSP.2011.172}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PappasRVBM11, author = {Vasilis Pappas and Mariana Raykova and Binh Vo and Steven M. Bellovin and Tal Malkin}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Private search in the real world}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {83--92}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076744}, doi = {10.1145/2076732.2076744}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PappasRVBM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JohnsonBK11, author = {Maritza L. Johnson and Steven M. Bellovin and Angelos D. Keromytis}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {131--137}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_11}, doi = {10.1007/978-3-642-29889-9\_11}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/JohnsonBK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/ZhaoLRB11, author = {Hang Zhao and Jorge Lobo and Arnab Roy and Steven M. Bellovin}, editor = {Nazim Agoulmine and Claudio Bartolini and Tom Pfeifer and Declan O'Sullivan}, title = {Policy refinement of network services for MANETs}, booktitle = {Proceedings of the 12th {IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2011, Dublin, Ireland, 23-27 May 2011}, pages = {113--120}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INM.2011.5990681}, doi = {10.1109/INM.2011.5990681}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/im/ZhaoLRB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bellovin11, author = {Steven M. Bellovin}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{IP} Traceback}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {632--634}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_268}, doi = {10.1007/978-1-4419-5906-5\_268}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bellovin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin10, author = {Steven M. Bellovin}, title = {Identity and Security}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {2}, pages = {88}, year = {2010}, url = {https://doi.org/10.1109/MSP.2010.71}, doi = {10.1109/MSP.2010.71}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin10a, author = {Steven M. Bellovin}, title = {Perceptions and Reality}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {5}, pages = {88}, year = {2010}, url = {https://doi.org/10.1109/MSP.2010.160}, doi = {10.1109/MSP.2010.160}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AndroulakiVB10, author = {Elli Androulaki and Binh Vo and Steven M. Bellovin}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {Privacy-Preserving, Taxable Bank Accounts}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {37--54}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_3}, doi = {10.1007/978-3-642-15497-3\_3}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AndroulakiVB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AndroulakiB10, author = {Elli Androulaki and Steven M. Bellovin}, editor = {Radu Sion and Reza Curtmola and Sven Dietrich and Aggelos Kiayias and Josep M. Miret and Kazue Sako and Francesc Seb{\'{e}}}, title = {A Secure and Privacy-Preserving Targeted Ad-System}, booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6054}, pages = {123--135}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14992-4\_12}, doi = {10.1007/978-3-642-14992-4\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AndroulakiB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/ZhaoB10, author = {Hang Zhao and Steven M. Bellovin}, editor = {Sajal K. Das and Anke Xue}, title = {High Performance Firewalls in MANETs}, booktitle = {Sixth International Conference on Mobile Ad-hoc and Sensor Networks, {MSN} 2010, Hangzhou, China, December 20-22, 2010}, pages = {154--160}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MSN.2010.30}, doi = {10.1109/MSN.2010.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msn/ZhaoB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JohnsonB10, author = {Maritza L. Johnson and Steven M. Bellovin}, editor = {Kevin Fu and Tadayoshi Kohno and Aviel D. Rubin}, title = {Policy Management for E-Health Records}, booktitle = {1st {USENIX} Workshop on Health Security and Privacy, HealthSec'10, Washington, D.C., USA, August 10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/healthsec10/policy-management-e-health-records}, timestamp = {Mon, 01 Feb 2021 08:43:06 +0100}, biburl = {https://dblp.org/rec/conf/uss/JohnsonB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/AlexanderCCGKSB09, author = {D. Scott Alexander and Yuu{-}Heng Cheng and Brian A. Coan and Andrei Ghetie and Vikram Kaul and Bruce Siegell and Steven M. Bellovin and Nicholas F. Maxemchuk and Henning Schulzrinne and Stephen Schwab and Angelos Stavrou and Jonathan M. Smith}, title = {The dynamic community of interest and its realization in {ZODIAC}}, journal = {{IEEE} Commun. Mag.}, volume = {47}, number = {10}, pages = {40--47}, year = {2009}, url = {https://doi.org/10.1109/MCOM.2009.5273807}, doi = {10.1109/MCOM.2009.5273807}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/AlexanderCCGKSB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin09, author = {Steven M. Bellovin}, title = {The Government and Cybersecurity}, journal = {{IEEE} Secur. Priv.}, volume = {7}, number = {2}, pages = {96}, year = {2009}, url = {https://doi.org/10.1109/MSP.2009.55}, doi = {10.1109/MSP.2009.55}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BellovinC09, author = {Steven M. Bellovin and Daniel G. Conway}, title = {Security as a Systems Property}, journal = {{IEEE} Secur. Priv.}, volume = {7}, number = {5}, pages = {88}, year = {2009}, url = {https://doi.org/10.1109/MSP.2009.134}, doi = {10.1109/MSP.2009.134}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BellovinC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/BellovinB09, author = {Steven M. Bellovin and Randy Bush}, title = {Configuration management and security}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {27}, number = {3}, pages = {268--274}, year = {2009}, url = {https://doi.org/10.1109/JSAC.2009.090403}, doi = {10.1109/JSAC.2009.090403}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/BellovinB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RaykovaVBM09, author = {Mariana Raykova and Binh Vo and Steven M. Bellovin and Tal Malkin}, editor = {Radu Sion and Dawn Song}, title = {Secure anonymous database search}, booktitle = {Proceedings of the first {ACM} Cloud Computing Security Workshop, {CCSW} 2009, Chicago, IL, USA, November 13, 2009}, pages = {115--126}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655008.1655025}, doi = {10.1145/1655008.1655025}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RaykovaVBM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/PotterBN09, author = {Shaya Potter and Steven M. Bellovin and Jason Nieh}, editor = {Adam Moskowitz}, title = {Two-Person Control Administation: Preventing Administation Faults through Duplication}, booktitle = {Proceedings of the 23rd Large Installation System Administration Conference, November 1-6, 2009, Baltimore, MD, {USA}}, pages = {15--27}, publisher = {{USENIX} Association}, year = {2009}, url = {http://www.usenix.org/events/lisa09/tech/full\_papers/potter.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/PotterBN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/JohnsonBRS09, author = {Maritza L. Johnson and Steven M. Bellovin and Robert W. Reeder and Stuart E. Schechter}, editor = {Anil Somayaji and Richard Ford}, title = {Laissez-faire file sharing: access control designed for individuals at the endpoints}, booktitle = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009}, pages = {1--10}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1719030.1719032}, doi = {10.1145/1719030.1719032}, timestamp = {Tue, 06 Nov 2018 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/nspw/JohnsonBRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/AndroulakiB09, author = {Elli Androulaki and Steven M. Bellovin}, editor = {Ian Goldberg and Mikhail J. Atallah}, title = {{APOD:} Anonymous Physical Object Delivery}, booktitle = {Privacy Enhancing Technologies, 9th International Symposium, {PETS} 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5672}, pages = {202--215}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03168-7\_12}, doi = {10.1007/978-3-642-03168-7\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/AndroulakiB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/ChengRPAEB09, author = {Yuu{-}Heng Cheng and Mariana Raykova and Alexander Poylisher and D. Scott Alexander and Martin Eiger and Steven M. Bellovin}, title = {The Zodiac Policy Subsystem: {A} Policy-Based Management System for a High-Security {MANET}}, booktitle = {{POLICY} 2009, {IEEE} International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009}, pages = {174--177}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/POLICY.2009.7}, doi = {10.1109/POLICY.2009.7}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/ChengRPAEB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/AndroulakiB09, author = {Elli Androulaki and Steven M. Bellovin}, editor = {Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis and G{\"{u}}nther Pernul}, title = {An Anonymous Credit Card System}, booktitle = {Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5695}, pages = {42--51}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03748-1\_5}, doi = {10.1007/978-3-642-03748-1\_5}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/AndroulakiB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc5406, author = {Steven M. Bellovin}, title = {Guidelines for Specifying the Use of IPsec Version 2}, journal = {{RFC}}, volume = {5406}, pages = {1--13}, year = {2009}, url = {https://doi.org/10.17487/RFC5406}, doi = {10.17487/RFC5406}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc5406.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Bellovin08, author = {Steven M. Bellovin}, title = {The physical world and the real world}, journal = {Commun. {ACM}}, volume = {51}, number = {5}, pages = {104}, year = {2008}, url = {https://doi.org/10.1145/1342327.1342345}, doi = {10.1145/1342327.1342345}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Bellovin08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/StrayerAABJM08, author = {Tim Strayer and Mark Allman and Grenville J. Armitage and Steven M. Bellovin and Shudong Jin and Andrew W. Moore}, title = {{IMRG} workshop on application classification and identification report}, journal = {Comput. Commun. Rev.}, volume = {38}, number = {3}, pages = {87--90}, year = {2008}, url = {https://doi.org/10.1145/1384609.1384621}, doi = {10.1145/1384609.1384621}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/StrayerAABJM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BellovinBBDDEV08, author = {Steven M. Bellovin and Terry V. Benzel and Bob Blakley and Dorothy E. Denning and Whitfield Diffie and Jeremy Epstein and Paulo Ver{\'{\i}}ssimo}, title = {Information Assurance Technology Forecast 2008}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {1}, pages = {16--23}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.13}, doi = {10.1109/MSP.2008.13}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BellovinBBDDEV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BellovinBDSNR08, author = {Steven M. Bellovin and Matt Blaze and Whitfield Diffie and Susan Landau and Peter G. Neumann and Jennifer Rexford}, title = {Risking Communications Security: Potential Hazards of the Protect America Act}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {1}, pages = {24--33}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.17}, doi = {10.1109/MSP.2008.17}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BellovinBDSNR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin08, author = {Steven M. Bellovin}, title = {Security by Checklist}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {2}, pages = {88}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.43}, doi = {10.1109/MSP.2008.43}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin08a, author = {Steven M. Bellovin}, title = {The Puzzle of Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {5}, pages = {88}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.129}, doi = {10.1109/MSP.2008.129}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/JohnsonAABK08, author = {Maritza L. Johnson and Chaitanya Atreya and Adam J. Aviv and Steven M. Bellovin and Gail E. Kaiser}, editor = {Elizabeth F. Churchill and Rachna Dhamija}, title = {{RUST:} {A} Retargetable Usability Testbed for Web Site Authentication Technologies}, booktitle = {Usability, Psychology, and Security, UPSEC'08, San Francisco, CA, USA, April 14, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/upsec08/tech/full\_papers/johnson/johnson.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/JohnsonAABK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ZhaoCB08, author = {Hang Zhao and Chi{-}Kin Chau and Steven M. Bellovin}, editor = {Matt Bishop and Christian W. Probst and Angelos D. Keromytis and Anil Somayaji}, title = {{ROFL:} routing as the firewall layer}, booktitle = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008}, pages = {23--31}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1595676.1595681}, doi = {10.1145/1595676.1595681}, timestamp = {Tue, 06 Nov 2018 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ZhaoCB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/AndroulakiCBM08, author = {Elli Androulaki and Seung Geol Choi and Steven M. Bellovin and Tal Malkin}, editor = {Nikita Borisov and Ian Goldberg}, title = {Reputation Systems for Anonymous Networks}, booktitle = {Privacy Enhancing Technologies, 8th International Symposium, {PETS} 2008, Leuven, Belgium, July 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5134}, pages = {202--218}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70630-4\_13}, doi = {10.1007/978-3-540-70630-4\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/AndroulakiCBM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/AndroulakiRSSB08, author = {Elli Androulaki and Mariana Raykova and Shreyas Srivatsan and Angelos Stavrou and Steven M. Bellovin}, editor = {Nikita Borisov and Ian Goldberg}, title = {{PAR:} Payment for Anonymous Routing}, booktitle = {Privacy Enhancing Technologies, 8th International Symposium, {PETS} 2008, Leuven, Belgium, July 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5134}, pages = {219--236}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70630-4\_14}, doi = {10.1007/978-3-540-70630-4\_14}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/AndroulakiRSSB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/ZhaoLB08, author = {Hang Zhao and Jorge Lobo and Steven M. Bellovin}, title = {An Algebra for Integration and Analysis of Ponder2 Policies}, booktitle = {9th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2008), 2-4 June 2008, Palisades, New York, {USA}}, pages = {74--77}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/POLICY.2008.42}, doi = {10.1109/POLICY.2008.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/ZhaoLB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Bellovin08, author = {Steven M. Bellovin}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {The Insider Attack Problem Nature and Scope}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {1--4}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_1}, doi = {10.1007/978-0-387-77322-3\_1}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/Bellovin08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2008, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0}, doi = {10.1007/978-3-540-68914-0}, isbn = {978-3-540-68913-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/39, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3}, doi = {10.1007/978-0-387-77322-3}, isbn = {978-0-387-77321-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/39.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BellovinBDLRN07, author = {Steven M. Bellovin and Matt Blaze and Whitfield Diffie and Susan Landau and Jennifer Rexford and Peter G. Neumann}, title = {Internal surveillance, external risks}, journal = {Commun. {ACM}}, volume = {50}, number = {12}, pages = {128}, year = {2007}, url = {https://doi.org/10.1145/1323688.1323717}, doi = {10.1145/1323688.1323717}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/BellovinBDLRN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin07, author = {Steven M. Bellovin}, title = {DRM, Complexity, and Correctness}, journal = {{IEEE} Secur. Priv.}, volume = {5}, number = {1}, pages = {80}, year = {2007}, url = {https://doi.org/10.1109/MSP.2007.5}, doi = {10.1109/MSP.2007.5}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin07a, author = {Steven M. Bellovin}, title = {Seers and Craftspeople}, journal = {{IEEE} Secur. Priv.}, volume = {5}, number = {5}, pages = {88}, year = {2007}, url = {https://doi.org/10.1109/MSP.2007.120}, doi = {10.1109/MSP.2007.120}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/IoannidisBIKAS07, author = {Sotiris Ioannidis and Steven M. Bellovin and John Ioannidis and Angelos D. Keromytis and Kostas G. Anagnostakis and Jonathan M. Smith}, title = {Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {1}, pages = {69--80}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p69-80.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/IoannidisBIKAS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sruti/2007, editor = {Steven M. Bellovin}, title = {3rd Workshop on Steps to Reducing Unwanted Traffic on the Internet, SRUTI'07, Santa Clara, CA, USA, June 18, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/sruti07}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sruti/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4808, author = {Steven M. Bellovin}, title = {Key Change Strategies for {TCP-MD5}}, journal = {{RFC}}, volume = {4808}, pages = {1--8}, year = {2007}, url = {https://doi.org/10.17487/RFC4808}, doi = {10.17487/RFC4808}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4808.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Bellovin06, author = {Steven M. Bellovin}, title = {Virtual machines, virtual security?}, journal = {Commun. {ACM}}, volume = {49}, number = {10}, pages = {104}, year = {2006}, url = {https://doi.org/10.1145/1164394.1164414}, doi = {10.1145/1164394.1164414}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Bellovin06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin06, author = {Steven M. Bellovin}, title = {Unconventional Wisdom}, journal = {{IEEE} Secur. Priv.}, volume = {4}, number = {1}, pages = {88}, year = {2006}, url = {https://doi.org/10.1109/MSP.2006.28}, doi = {10.1109/MSP.2006.28}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin06a, author = {Steven M. Bellovin}, title = {On the Brittleness of Software and the Infeasibility of Security Metrics}, journal = {{IEEE} Secur. Priv.}, volume = {4}, number = {4}, pages = {96--96}, year = {2006}, url = {https://doi.org/10.1109/MSP.2006.101}, doi = {10.1109/MSP.2006.101}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/BellovinCK06, author = {Steven M. Bellovin and Bill Cheswick and Angelos D. Keromytis}, title = {Worm Propagation Strategies in an IPv6 Internet}, journal = {login Usenix Mag.}, volume = {31}, number = {1}, year = {2006}, url = {https://www.usenix.org/publications/login/february-2006-volume-31-number-1/worm-propagation-strategies-ipv6-internet}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/BellovinCK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BellovinR06, author = {Steven M. Bellovin and Eric Rescorla}, title = {Deploying a New Hash Algorithm}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2006, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2006}, url = {https://www.ndss-symposium.org/ndss2006/deploying-new-hash-algorithm/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BellovinR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/Bellovin06, author = {Steven M. Bellovin}, editor = {Atul Adya and Erich M. Nahum}, title = {Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography}, booktitle = {Proceedings of the 2006 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2006, Boston, MA, USA, May 30 - June 3, 2006}, publisher = {{USENIX}}, year = {2006}, url = {http://www.usenix.org/events/usenix06/tech/slides/bellovin\_2006.pdf}, timestamp = {Tue, 16 Jul 2024 09:12:32 +0200}, biburl = {https://dblp.org/rec/conf/usenix/Bellovin06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/Bellovin06a, author = {Steven M. Bellovin}, editor = {Atul Adya and Erich M. Nahum}, title = {Privacy {\&} Cryptography}, booktitle = {Proceedings of the 2006 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2006, Boston, MA, USA, May 30 - June 3, 2006}, publisher = {{USENIX}}, year = {2006}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/usenix/Bellovin06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YeeWHB06, author = {Ka{-}Ping Yee and David A. Wagner and Marti A. Hearst and Steven M. Bellovin}, editor = {Dan S. Wallach and Ronald L. Rivest}, title = {Prerendered User Interfaces for Higher-Assurance Electronic Voting}, booktitle = {2006 {USENIX/ACCURATE} Electronic Voting Technology Workshop, EVT'06, Vancouver, BC, Canada, August 1, 2006}, publisher = {{USENIX} Association}, year = {2006}, url = {https://www.usenix.org/conference/evt-06/prerendered-user-interfaces-higher-assurance-electronic-voting}, timestamp = {Mon, 01 Feb 2021 08:43:11 +0100}, biburl = {https://dblp.org/rec/conf/uss/YeeWHB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sruti/2006, editor = {Steven M. Bellovin}, title = {2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, SRUTI'06, San Jose, CA, USA, July 7, 2006}, publisher = {{USENIX} Association}, year = {2006}, url = {https://www.usenix.org/conference/sruti06}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sruti/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4278, author = {Steven M. Bellovin and Alex Zinin}, title = {Standards Maturity Variance Regarding the {TCP} {MD5} Signature Option {(RFC} 2385) and the {BGP-4} Specification}, journal = {{RFC}}, volume = {4278}, pages = {1--7}, year = {2006}, url = {https://doi.org/10.17487/RFC4278}, doi = {10.17487/RFC4278}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4278.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BellovinBL05, author = {Steven M. Bellovin and Matt Blaze and Susan Landau}, title = {The real national-security needs for VoIP}, journal = {Commun. {ACM}}, volume = {48}, number = {11}, pages = {120}, year = {2005}, url = {https://doi.org/10.1145/1096000.1096030}, doi = {10.1145/1096000.1096030}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BellovinBL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bellovin05, author = {Steven M. Bellovin}, title = {Security and Privacy: Enemies or Allies?}, journal = {{IEEE} Secur. Priv.}, volume = {3}, number = {3}, pages = {92}, year = {2005}, url = {https://doi.org/10.1109/MSP.2005.80}, doi = {10.1109/MSP.2005.80}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Bellovin05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4107, author = {Steven M. Bellovin and Russell Housley}, title = {Guidelines for Cryptographic Key Management}, journal = {{RFC}}, volume = {4107}, pages = {1--7}, year = {2005}, url = {https://doi.org/10.17487/RFC4107}, doi = {10.17487/RFC4107}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4107.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Bellovin04, author = {Steven M. Bellovin}, title = {Spamming, phishing, authentication, and privacy}, journal = {Commun. {ACM}}, volume = {47}, number = {12}, pages = {144}, year = {2004}, url = {https://doi.org/10.1145/1035134.1035159}, doi = {10.1145/1035134.1035159}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Bellovin04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AielloBBCIKR04, author = {William Aiello and Steven M. Bellovin and Matt Blaze and Ran Canetti and John Ioannidis and Angelos D. Keromytis and Omer Reingold}, title = {Just fast keying: Key agreement in a hostile internet}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {2}, pages = {242--273}, year = {2004}, url = {https://doi.org/10.1145/996943.996946}, doi = {10.1145/996943.996946}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AielloBBCIKR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Bellovin04, author = {Steven M. Bellovin}, title = {A Look Back at "Security Problems in the {TCP/IP} Protocol Suite"}, booktitle = {20th Annual Computer Security Applications Conference {(ACSAC} 2004), 6-10 December 2004, Tucson, AZ, {USA}}, pages = {229--249}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CSAC.2004.3}, doi = {10.1109/CSAC.2004.3}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Bellovin04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Bellovin04, author = {Steven M. Bellovin}, editor = {Matt Blaze}, title = {Nuclear Weapons, Permissive Action Links, and the History of Public Key Cryptography}, booktitle = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13, 2004, San Diego, CA, {USA}}, publisher = {{USENIX}}, year = {2004}, url = {http://www.research.att.com/\%7Esmb/talks/pal.pdf}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/uss/Bellovin04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellovinC04, author = {Steven M. Bellovin and William R. Cheswick}, title = {Privacy-Enhanced Searches Using Encrypted Bloom Filters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2004}, url = {http://eprint.iacr.org/2004/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellovinC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/IoannidisBIKS03, author = {Sotiris Ioannidis and Steven M. Bellovin and John Ioannidis and Angelos D. Keromytis and Jonathan M. Smith}, title = {Design and Implementation of Virtual Private Services}, booktitle = {12th {IEEE} International Workshops on Enabling Technologies {(WETICE} 2003), Infrastructure for Collaborative Enterprises, 9-11 June 2003, Linz, Austria}, pages = {269--274}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ENABL.2003.1231419}, doi = {10.1109/ENABL.2003.1231419}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/IoannidisBIKS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc3514, author = {Steven M. Bellovin}, title = {The Security Flag in the IPv4 Header}, journal = {{RFC}}, volume = {3514}, pages = {1--6}, year = {2003}, url = {https://doi.org/10.17487/RFC3514}, doi = {10.17487/RFC3514}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc3514.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc3554, author = {Steven M. Bellovin and John Ioannidis and Angelos D. Keromytis and Randall R. Stewart}, title = {On the Use of Stream Control Transmission Protocol {(SCTP)} with IPsec}, journal = {{RFC}}, volume = {3554}, pages = {1--9}, year = {2003}, url = {https://doi.org/10.17487/RFC3554}, doi = {10.17487/RFC3554}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc3554.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc3631, author = {Steven M. Bellovin and Jeffrey I. Schiller and Charlie Kaufman}, title = {Security Mechanisms for the Internet}, journal = {{RFC}}, volume = {3631}, pages = {1--20}, year = {2003}, url = {https://doi.org/10.17487/RFC3631}, doi = {10.17487/RFC3631}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc3631.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/MahajanBFIPS02, author = {Ratul Mahajan and Steven M. Bellovin and Sally Floyd and John Ioannidis and Vern Paxson and Scott Shenker}, title = {Aggregate congestion control}, journal = {Comput. Commun. Rev.}, volume = {32}, number = {1}, pages = {69}, year = {2002}, url = {https://doi.org/10.1145/510726.510743}, doi = {10.1145/510726.510743}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/MahajanBFIPS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/MahajanBFIPS02a, author = {Ratul Mahajan and Steven M. Bellovin and Sally Floyd and John Ioannidis and Vern Paxson and Scott Shenker}, title = {Controlling high bandwidth aggregates in the network}, journal = {Comput. Commun. Rev.}, volume = {32}, number = {3}, pages = {62--73}, year = {2002}, url = {https://doi.org/10.1145/571697.571724}, doi = {10.1145/571697.571724}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/MahajanBFIPS02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AielloBBIRCK02, author = {William Aiello and Steven M. Bellovin and Matt Blaze and John Ioannidis and Omer Reingold and Ran Canetti and Angelos D. Keromytis}, editor = {Vijayalakshmi Atluri}, title = {Efficient, DoS-resistant, secure key exchange for internet protocols}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {48--58}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586118}, doi = {10.1145/586110.586118}, timestamp = {Tue, 10 Nov 2020 20:00:47 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AielloBBIRCK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LandwehrB02, author = {Carl E. Landwehr and Steven M. Bellovin}, title = {Intrusion Tolerant Systems Workshop}, booktitle = {2002 International Conference on Dependable Systems and Networks {(DSN} 2002), 23-26 June 2002, Bethesda, MD, USA, Proceedings}, pages = {785--786}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.ieeecomputersociety.org/10.1109/DSN.2002.10015}, doi = {10.1109/DSN.2002.10015}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LandwehrB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/Bellovin02, author = {Steven M. Bellovin}, title = {A technique for counting natted hosts}, booktitle = {Proceedings of the 2nd {ACM} {SIGCOMM} Internet Measurement Workshop, {IMW} 2002, Marseille, France, November 6-8, 2002}, pages = {267--272}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/637201.637243}, doi = {10.1145/637201.637243}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/Bellovin02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/IoannidisB02, author = {John Ioannidis and Steven M. Bellovin}, title = {Implementing Pushback: Router-Based Defense Against DDoS Attacks}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2002, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2002}, url = {https://www.ndss-symposium.org/ndss2002/implementing-pushback-router-based-defense-against-ddos-attacks/}, timestamp = {Mon, 01 Feb 2021 08:42:25 +0100}, biburl = {https://dblp.org/rec/conf/ndss/IoannidisB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigopsE/IoannidisBS02, author = {Sotiris Ioannidis and Steven M. Bellovin and Jonathan M. Smith}, editor = {Gilles Muller and Eric Jul}, title = {Sub-operating systems: a new approach to application security}, booktitle = {Proceedings of the 10th {ACM} {SIGOPS} European Workshop, Saint-Emilion, France, July 1, 2002}, pages = {108--115}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/1133373.1133394}, doi = {10.1145/1133373.1133394}, timestamp = {Thu, 07 Nov 2019 10:24:25 +0100}, biburl = {https://dblp.org/rec/conf/sigopsE/IoannidisBS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Bellovin01, author = {Steven M. Bellovin}, title = {Computer security - an end state?}, journal = {Commun. {ACM}}, volume = {44}, number = {3}, pages = {131--132}, year = {2001}, url = {https://doi.org/10.1145/365181.365241}, doi = {10.1145/365181.365241}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/Bellovin01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Bellovin01, author = {Steven M. Bellovin}, title = {Security Risks Of Peer-To-Peer Networking}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2001, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2001}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Bellovin01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AielloBBCIKR01, author = {William Aiello and Steven M. Bellovin and Matt Blaze and Ran Canetti and John Ioannidis and Angelos D. Keromytis and Omer Reingold}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {27--39}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_5}, doi = {10.1007/3-540-45807-7\_5}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/AielloBBCIKR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/IoannidisB01, author = {Sotiris Ioannidis and Steven M. Bellovin}, editor = {Clem Cole}, title = {Building a Secure Web Browser}, booktitle = {Proceedings of the {FREENIX} Track: 2001 {USENIX} Annual Technical Conference, June 25-30, 2001, Boston, Massachusetts, {USA}}, pages = {127--134}, publisher = {{USENIX}}, year = {2001}, url = {http://www.usenix.org/publications/library/proceedings/usenix01/freenix01/ioannidis.html}, timestamp = {Tue, 16 Jul 2024 09:12:32 +0200}, biburl = {https://dblp.org/rec/conf/usenix/IoannidisB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GleitzB01, author = {Peter M. Gleitz and Steven M. Bellovin}, editor = {Dan S. Wallach}, title = {Transient Addressing for Related Processes: Improved Firewalling by Using {IPV6} and Multiple Addresses per Host}, booktitle = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington, D.C., {USA}}, publisher = {{USENIX}}, year = {2001}, url = {http://www.usenix.org/publications/library/proceedings/sec01/gleitz.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GleitzB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BlazeB00, author = {Matt Blaze and Steven M. Bellovin}, title = {Tapping on my network door}, journal = {Commun. {ACM}}, volume = {43}, number = {10}, pages = {136}, year = {2000}, url = {https://doi.org/10.1145/352183.352213}, doi = {10.1145/352183.352213}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BlazeB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IoannidisKBS00, author = {Sotiris Ioannidis and Angelos D. Keromytis and Steven M. Bellovin and Jonathan M. Smith}, editor = {Dimitris Gritzalis and Sushil Jajodia and Pierangela Samarati}, title = {Implementing a distributed firewall}, booktitle = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000}, pages = {190--199}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/352600.353052}, doi = {10.1145/352600.353052}, timestamp = {Tue, 10 Nov 2020 20:00:15 +0100}, biburl = {https://dblp.org/rec/conf/ccs/IoannidisKBS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2000, editor = {Steven M. Bellovin and Greg Rose}, title = {9th {USENIX} Security Symposium, Denver, Colorado, USA, August 14-17, 2000}, publisher = {{USENIX} Association}, year = {2000}, url = {https://www.usenix.org/conference/9thusenixsecuritysymposium}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/SchneiderB99, author = {Fred B. Schneider and Steven M. Bellovin}, title = {Evolving Telephone Networks}, journal = {Commun. {ACM}}, volume = {42}, number = {1}, pages = {160}, year = {1999}, url = {https://doi.org/10.1145/291469.291485}, doi = {10.1145/291469.291485}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/SchneiderB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/SchneiderBI99, author = {Fred B. Schneider and Steven M. Bellovin and Alan S. Inouye}, title = {Building Trustworthy Systems: Lessons from the {PTN} and Internet}, journal = {{IEEE} Internet Comput.}, volume = {3}, number = {6}, pages = {64--72}, year = {1999}, url = {https://doi.org/10.1109/4236.807013}, doi = {10.1109/4236.807013}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/SchneiderBI99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/DenkerBDMKP99, author = {John S. Denker and Steven M. Bellovin and Hugh Daniel and Nancy L. Mintz and Tom Killian and Mark Plotnick}, editor = {David W. Parter}, title = {Moat: a Virtual Private Network Appliance and Services Platform}, booktitle = {Proceedings of the 13th Conference on Systems Administration (LISA-99), Seattle, WA, USA, November 7-12, 1999}, pages = {251--260}, publisher = {{USENIX}}, year = {1999}, url = {http://www.usenix.org/publications/library/proceedings/lisa99/denker.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/DenkerBDMKP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Bellovin99, author = {Steven M. Bellovin}, title = {Why Do We Need More Research?}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 1999, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {1999}, url = {https://www.ndss-symposium.org/ndss1999/why-do-we-need-more-research/}, timestamp = {Mon, 01 Feb 2021 08:42:19 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Bellovin99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Bellovin99a, author = {Steven M. Bellovin}, title = {Transport-Friendly {ESP}}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 1999, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {1999}, url = {https://www.ndss-symposium.org/ndss1999/transport-friendly-esp/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Bellovin99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Bellovin98, author = {Steven M. Bellovin}, editor = {Hugo Krawczyk}, title = {Cryptography and the Internet}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {46--55}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055719}, doi = {10.1007/BFB0055719}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Bellovin98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc2316, author = {Steven M. Bellovin}, title = {Report of the {IAB} Security Architecture Workshop}, journal = {{RFC}}, volume = {2316}, pages = {1--9}, year = {1998}, url = {https://doi.org/10.17487/RFC2316}, doi = {10.17487/RFC2316}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc2316.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc2458, author = {Hui{-}Lan Lu and Murali Krishnaswamy and Lawrence Conroy and Steven M. Bellovin and Fred M. Burg and Antonio DeSimone and Kamlesh T. Tewani and Paul Davidson and Henning Schulzrinne and Kumar Vishwanathan}, title = {Toward the PSTN/Internet Inter-Networking-Pre-PINT Implementations}, journal = {{RFC}}, volume = {2458}, pages = {1--60}, year = {1998}, url = {https://doi.org/10.17487/RFC2458}, doi = {10.17487/RFC2458}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc2458.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Bellovin97, author = {Steven M. Bellovin}, title = {Network and Internet Security}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {6}, number = {3}, pages = {20--34}, year = {1997}, url = {https://doi.org/10.1080/10658989709342539}, doi = {10.1080/10658989709342539}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Bellovin97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wwwj/AbelsonABBBDGNR97, author = {Hal Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Whitfield Diffie and John Gilmore and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier}, title = {The risks of key recovery, key escrow, and trusted third-party encryption}, journal = {World Wide Web J.}, volume = {2}, pages = {241--257}, year = {1997}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wwwj/AbelsonABBBDGNR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Bellovin97, author = {Steven M. Bellovin}, title = {Probable Plaintext Cryptanalysis of the {IP} Security Protocols}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 1997, San Diego, California, {USA}}, pages = {52--59}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/NDSS.1997.579220}, doi = {10.1109/NDSS.1997.579220}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Bellovin97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/tucker97/Bellovin97, author = {Steven M. Bellovin}, editor = {Allen B. Tucker}, title = {Network and Internet Security}, booktitle = {The Computer Science and Engineering Handbook}, pages = {1949--1961}, publisher = {{CRC} Press}, year = {1997}, timestamp = {Sun, 09 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/crc/tucker97/Bellovin97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WagnerB96, author = {David A. Wagner and Steven M. Bellovin}, editor = {James T. Ellis and B. Clifford Neuman and David M. Balenson}, title = {A "bump in the stack" encryptor for {MS-DOS} systems}, booktitle = {1996 Symposium on Network and Distributed System Security, {(S)NDSS} '96, San Diego, CA, USA, February 22-23, 1996}, pages = {155--161}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/NDSS.1996.492422}, doi = {10.1109/NDSS.1996.492422}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WagnerB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Bellovin96, author = {Steven M. Bellovin}, title = {Problem Areas for the {IP} Security Protocols}, booktitle = {Proceedings of the 6th {USENIX} Security Symposium, San Jose, CA, USA, July 22-25, 1996}, publisher = {{USENIX} Association}, year = {1996}, url = {https://www.usenix.org/conference/6th-usenix-security-symposium/problem-areas-ip-security-protocols}, timestamp = {Mon, 01 Feb 2021 08:43:15 +0100}, biburl = {https://dblp.org/rec/conf/uss/Bellovin96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc1948, author = {Steven M. Bellovin}, title = {Defending Against Sequence Number Attacks}, journal = {{RFC}}, volume = {1948}, pages = {1--6}, year = {1996}, url = {https://doi.org/10.17487/RFC1948}, doi = {10.17487/RFC1948}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc1948.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0076963, author = {William R. Cheswick and Steven M. Bellovin}, title = {Firewalls and internet security - repelling the wily hacker}, series = {Addison-Wesley professional computing series}, publisher = {Addison-Wesley}, year = {1995}, isbn = {978-0-201-63357-3}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0076963.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Bellovin95, author = {Steven M. Bellovin}, editor = {Frederick M. Avolio and Steven M. Bellovin}, title = {Using the Domain Name System for System Break-ins}, booktitle = {Proceedings of the 5th {USENIX} Security Symposium, Salt Lake City, Utah, USA, June 5-7, 1995}, publisher = {{USENIX} Association}, year = {1995}, url = {https://www.usenix.org/legacy/publications/library/proceedings/security95/bellovin.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Bellovin95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BlazeB95, author = {Matt Blaze and Steven M. Bellovin}, editor = {Frederick M. Avolio and Steven M. Bellovin}, title = {Session-Layer Encryption}, booktitle = {Proceedings of the 5th {USENIX} Security Symposium, Salt Lake City, Utah, USA, June 5-7, 1995}, publisher = {{USENIX} Association}, year = {1995}, url = {https://www.usenix.org/legacy/publications/library/proceedings/security95/blaze.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BlazeB95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/1995, editor = {Frederick M. Avolio and Steven M. Bellovin}, title = {Proceedings of the 5th {USENIX} Security Symposium, Salt Lake City, Utah, USA, June 5-7, 1995}, publisher = {{USENIX} Association}, year = {1995}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/1995.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/BellovinC94, author = {Steven M. Bellovin and William R. Cheswick}, title = {Network firewalls}, journal = {{IEEE} Commun. Mag.}, volume = {32}, number = {9}, pages = {50--57}, year = {1994}, url = {https://doi.org/10.1109/35.312843}, doi = {10.1109/35.312843}, timestamp = {Wed, 05 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/BellovinC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BellovinM94, author = {Steven M. Bellovin and Michael Merritt}, title = {An attack on the Interlock Protocol when used for authentication}, journal = {{IEEE} Trans. Inf. Theory}, volume = {40}, number = {1}, pages = {273--275}, year = {1994}, url = {https://doi.org/10.1109/18.272497}, doi = {10.1109/18.272497}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/BellovinM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc1579, author = {Steven M. Bellovin}, title = {Firewall-Friendly {FTP}}, journal = {{RFC}}, volume = {1579}, pages = {1--4}, year = {1994}, url = {https://doi.org/10.17487/RFC1579}, doi = {10.17487/RFC1579}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc1579.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc1675, author = {Steven M. Bellovin}, title = {Security Concerns for IPng}, journal = {{RFC}}, volume = {1675}, pages = {1--4}, year = {1994}, url = {https://doi.org/10.17487/RFC1675}, doi = {10.17487/RFC1675}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc1675.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc1681, author = {Steven M. Bellovin}, title = {On Many Addresses per Host}, journal = {{RFC}}, volume = {1681}, pages = {1--5}, year = {1994}, url = {https://doi.org/10.17487/RFC1681}, doi = {10.17487/RFC1681}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc1681.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/Bellovin93, author = {Steven M. Bellovin}, title = {Packets found on an internet}, journal = {Comput. Commun. Rev.}, volume = {23}, number = {3}, pages = {26--31}, year = {1993}, url = {https://doi.org/10.1145/174194.174199}, doi = {10.1145/174194.174199}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/Bellovin93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellovinM93, author = {Steven M. Bellovin and Michael Merritt}, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu and Victoria Ashby}, title = {Augmented Encrypted Key Exchange: {A} Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise}, booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993}, pages = {244--250}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/168588.168618}, doi = {10.1145/168588.168618}, timestamp = {Tue, 10 Nov 2020 20:00:40 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BellovinM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BellovinM92, author = {Steven M. Bellovin and Michael Merritt}, title = {Encrypted key exchange: password-based protocols secure against dictionary attacks}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {72--84}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213269}, doi = {10.1109/RISP.1992.213269}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/BellovinM92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/Bellovin92, author = {Steven M. Bellovin}, title = {There Be Dragons}, booktitle = {{USENIX} Summer 1992 Technical Conference, San Antonio, TX, USA, June 8-12, 1992}, publisher = {{USENIX} Association}, year = {1992}, url = {https://www.usenix.org/conference/usenix-summer-1992-technical-conference/there-be-dragons}, timestamp = {Mon, 01 Feb 2021 08:43:51 +0100}, biburl = {https://dblp.org/rec/conf/usenix/Bellovin92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/BellovinM91, author = {Steven M. Bellovin and Michael Merritt}, title = {Limitations of the Kerberos Authentication System}, booktitle = {Proceedings of the Usenix Winter 1991 Conference, Dallas, TX, USA, January 1991}, pages = {253--268}, publisher = {{USENIX} Association}, year = {1991}, timestamp = {Thu, 15 May 2014 18:36:23 +0200}, biburl = {https://dblp.org/rec/conf/usenix/BellovinM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/BellovinM90, author = {Steven M. Bellovin and Michael Merritt}, title = {Limitations of the Kerberos authentication system}, journal = {Comput. Commun. Rev.}, volume = {20}, number = {5}, pages = {119--132}, year = {1990}, url = {https://doi.org/10.1145/381906.381946}, doi = {10.1145/381906.381946}, timestamp = {Wed, 21 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/BellovinM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/Bellovin89, author = {Steven M. Bellovin}, title = {Security problems in the {TCP/IP} protocol suite}, journal = {Comput. Commun. Rev.}, volume = {19}, number = {2}, pages = {32--48}, year = {1989}, url = {https://doi.org/10.1145/378444.378449}, doi = {10.1145/378444.378449}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/Bellovin89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/HoneymanB86, author = {Peter Honeyman and Steven M. Bellovin}, title = {{PATHALIAS} or The Care and Feeding of Relative Addresses}, booktitle = {Proceedings of the {USENIX} Summer Conference, Altanta, GA, USA, June 1986}, pages = {126--141}, publisher = {{USENIX} Association}, year = {1986}, timestamp = {Thu, 15 May 2014 18:36:23 +0200}, biburl = {https://dblp.org/rec/conf/usenix/HoneymanB86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.