BibTeX records: Steven M. Bellovin

download as .bib file

@article{DBLP:journals/cybersecurity/AbelsonABBBCDLNRSSTT24,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Jon Callas and
                  Whitfield Diffie and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Vanessa Teague and
                  Carmela Troncoso},
  title        = {Bugs in our pockets: the risks of client-side scanning},
  journal      = {J. Cybersecur.},
  volume       = {10},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1093/cybsec/tyad020},
  doi          = {10.1093/CYBSEC/TYAD020},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBCDLNRSSTT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin24,
  author       = {Steven M. Bellovin},
  title        = {Degenerative AI?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {22},
  number       = {3},
  pages        = {88},
  year         = {2024},
  url          = {https://doi.org/10.1109/MSEC.2024.3385549},
  doi          = {10.1109/MSEC.2024.3385549},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-01649,
  author       = {Susan Landau and
                  James X. Dempsey and
                  Ece Kamar and
                  Steven M. Bellovin},
  title        = {Recommendations for Government Development and Use of Advanced Automated
                  Systems to Make Decisions about Individuals},
  journal      = {CoRR},
  volume       = {abs/2403.01649},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.01649},
  doi          = {10.48550/ARXIV.2403.01649},
  eprinttype    = {arXiv},
  eprint       = {2403.01649},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-01649.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2406-10430,
  author       = {Susan Landau and
                  James X. Dempsey and
                  Ece Kamar and
                  Steven M. Bellovin and
                  Robert Pool},
  title        = {Challenging the Machine: Contestability in Government {AI} Systems},
  journal      = {CoRR},
  volume       = {abs/2406.10430},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2406.10430},
  doi          = {10.48550/ARXIV.2406.10430},
  eprinttype    = {arXiv},
  eprint       = {2406.10430},
  timestamp    = {Wed, 10 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2406-10430.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin23,
  author       = {Steven M. Bellovin},
  title        = {Is Cybersecurity Liability a Liability?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {4},
  pages        = {99--100},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3273461},
  doi          = {10.1109/MSEC.2023.3273461},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc9446,
  author       = {Stephen Farrell and
                  Farzaneh Badii and
                  Bruce Schneier and
                  Steven M. Bellovin},
  title        = {Reflections on Ten Years Past the Snowden Revelations},
  journal      = {{RFC}},
  volume       = {9446},
  pages        = {1--29},
  year         = {2023},
  url          = {https://doi.org/10.17487/RFC9446},
  doi          = {10.17487/RFC9446},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc9446.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin22,
  author       = {Steven M. Bellovin},
  title        = {Open Source and Trust},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {2},
  pages        = {107--108},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2022.3142464},
  doi          = {10.1109/MSEC.2022.3142464},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin22a,
  author       = {Steven M. Bellovin},
  title        = {What Do We Owe?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {6},
  pages        = {83--84},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2022.3205512},
  doi          = {10.1109/MSEC.2022.3205512},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChristRB22,
  author       = {Miranda Christ and
                  Sarah Radway and
                  Steven M. Bellovin},
  title        = {Differential Privacy and Swapping: Examining De-Identification's Impact
                  on Minority Representation and Privacy Preservation in the {U.S.}
                  Census},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {457--472},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833668},
  doi          = {10.1109/SP46214.2022.9833668},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ChristRB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin21,
  author       = {Steven M. Bellovin},
  title        = {The Law and Lawful Hacking},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {4},
  pages        = {76},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3077374},
  doi          = {10.1109/MSEC.2021.3077374},
  timestamp    = {Wed, 14 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/KohNB21,
  author       = {John S. Koh and
                  Jason Nieh and
                  Steven M. Bellovin},
  editor       = {Suman Banerjee and
                  Luca Mottola and
                  Xia Zhou},
  title        = {Encrypted cloud photo storage using Google photos},
  booktitle    = {MobiSys '21: The 19th Annual International Conference on Mobile Systems,
                  Applications, and Services, Virtual Event, Wisconsin, USA, 24 June
                  - 2 July, 2021},
  pages        = {136--149},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3458864.3468220},
  doi          = {10.1145/3458864.3468220},
  timestamp    = {Thu, 27 Apr 2023 08:25:09 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/KohNB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-07450,
  author       = {Hal Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Jon Callas and
                  Whitfield Diffie and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Vanessa Teague and
                  Carmela Troncoso},
  title        = {Bugs in our Pockets: The Risks of Client-Side Scanning},
  journal      = {CoRR},
  volume       = {abs/2110.07450},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.07450},
  eprinttype    = {arXiv},
  eprint       = {2110.07450},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-07450.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin20,
  author       = {Steven M. Bellovin},
  title        = {Policies on Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {2},
  pages        = {76},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2020.2966900},
  doi          = {10.1109/MSEC.2020.2966900},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin20a,
  author       = {Steven M. Bellovin},
  title        = {Security, Privacy, and Scale},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {6},
  pages        = {63--64},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2020.3019709},
  doi          = {10.1109/MSEC.2020.3019709},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin19,
  author       = {Steven M. Bellovin},
  title        = {Layered Insecurity},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {3},
  pages        = {96--95},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2906807},
  doi          = {10.1109/MSEC.2019.2906807},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/KohBN19,
  author       = {John S. Koh and
                  Steven M. Bellovin and
                  Jason Nieh},
  title        = {Making It Easier to Encrypt Your Emails},
  journal      = {login Usenix Mag.},
  volume       = {44},
  number       = {3},
  year         = {2019},
  url          = {https://www.usenix.org/publications/login/fall2019/koh},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/KohBN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/KohBN19,
  author       = {John S. Koh and
                  Steven M. Bellovin and
                  Jason Nieh},
  editor       = {George Candea and
                  Robbert van Renesse and
                  Christof Fetzer},
  title        = {Why Joanie Can Encrypt: Easy Email Encryption with Easy Key Management},
  booktitle    = {Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany,
                  March 25-28, 2019},
  pages        = {2:1--2:16},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3302424.3303980},
  doi          = {10.1145/3302424.3303980},
  timestamp    = {Thu, 28 Mar 2019 13:37:53 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/KohBN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BellovinN18,
  author       = {Steven M. Bellovin and
                  Peter G. Neumann},
  title        = {The big picture},
  journal      = {Commun. {ACM}},
  volume       = {61},
  number       = {11},
  pages        = {24--26},
  year         = {2018},
  url          = {https://doi.org/10.1145/3277564},
  doi          = {10.1145/3277564},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/BellovinN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin18,
  author       = {Steven M. Bellovin},
  title        = {Toward a National Cybersecurity Policy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {3},
  pages        = {108},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.2701148},
  doi          = {10.1109/MSP.2018.2701148},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/BellovinLL17,
  author       = {Steven M. Bellovin and
                  Susan Landau and
                  Herbert S. Lin},
  title        = {Limiting the undesired impact of cyber weapons: technical requirements
                  and policy implications},
  journal      = {J. Cybersecur.},
  volume       = {3},
  number       = {1},
  pages        = {59--68},
  year         = {2017},
  url          = {https://doi.org/10.1093/cybsec/tyx001},
  doi          = {10.1093/CYBSEC/TYX001},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/BellovinLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin17,
  author       = {Steven M. Bellovin},
  title        = {Jurisdiction and the Internet},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {3},
  pages        = {96},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.55},
  doi          = {10.1109/MSP.2017.55},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin17a,
  author       = {Steven M. Bellovin},
  title        = {Who Are You?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {6},
  pages        = {88},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.4251120},
  doi          = {10.1109/MSP.2017.4251120},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZimmeckWZI0SWSB17,
  author       = {Sebastian Zimmeck and
                  Ziqi Wang and
                  Lieyong Zou and
                  Roger Iyengar and
                  Bin Liu and
                  Florian Schaub and
                  Shomir Wilson and
                  Norman M. Sadeh and
                  Steven M. Bellovin and
                  Joel R. Reidenberg},
  title        = {Automated Analysis of Privacy Requirements for Mobile Apps},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/automated-analysis-privacy-requirements-mobile-apps/},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ZimmeckWZI0SWSB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZimmeckLKBJ17,
  author       = {Sebastian Zimmeck and
                  Jie S. Li and
                  Hyungtae Kim and
                  Steven M. Bellovin and
                  Tony Jebara},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {A Privacy Analysis of Cross-device Tracking},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {1391--1408},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/zimmeck},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZimmeckLKBJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BellovinB016,
  author       = {Steven M. Bellovin and
                  Matt Blaze and
                  Susan Landau},
  title        = {Insecure Surveillance: Technical Issues with Remote Computer Searches},
  journal      = {Computer},
  volume       = {49},
  number       = {3},
  pages        = {14--24},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.68},
  doi          = {10.1109/MC.2016.68},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BellovinB016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin16,
  author       = {Steven M. Bellovin},
  title        = {Attack Surfaces},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {3},
  pages        = {88},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.55},
  doi          = {10.1109/MSP.2016.55},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin16a,
  author       = {Steven M. Bellovin},
  title        = {Easy Email Encryption},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {6},
  pages        = {96},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.132},
  doi          = {10.1109/MSP.2016.132},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaaifs/ZimmeckWZILSWSB16,
  author       = {Sebastian Zimmeck and
                  Ziqi Wang and
                  Lieyong Zou and
                  Roger Iyengar and
                  Bin Liu and
                  Florian Schaub and
                  Shomir Wilson and
                  Norman M. Sadeh and
                  Steven M. Bellovin and
                  Joel R. Reidenberg},
  title        = {Automated Analysis of Privacy Requirements for Mobile Apps},
  booktitle    = {2016 {AAAI} Fall Symposia, Arlington, Virginia, USA, November 17-19,
                  2016},
  publisher    = {{AAAI} Press},
  year         = {2016},
  url          = {http://aaai.org/ocs/index.php/FSS/FSS16/paper/view/14113},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaaifs/ZimmeckWZILSWSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Bellovin16,
  author       = {Steven M. Bellovin},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of
                  Coincidence},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {40--66},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_4},
  doi          = {10.1007/978-3-662-49301-4\_4},
  timestamp    = {Sat, 19 Oct 2019 20:29:10 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Bellovin16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GutmannBBRS16,
  author       = {Peter Gutmann and
                  Steven M. Bellovin and
                  Matt Blaze and
                  Ronald L. Rivest and
                  Nigel P. Smart},
  title        = {An IBE-based Signcryption Scheme for Group Key Management},
  journal      = {CoRR},
  volume       = {abs/1603.09526},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.09526},
  eprinttype    = {arXiv},
  eprint       = {1603.09526},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GutmannBBRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/AbelsonABBBDGGL15,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Whitfield Diffie and
                  John Gilmore and
                  Matthew Green and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Michael A. Specter and
                  Daniel J. Weitzner},
  title        = {Keys under doormats},
  journal      = {Commun. {ACM}},
  volume       = {58},
  number       = {10},
  pages        = {24--26},
  year         = {2015},
  url          = {https://doi.org/10.1145/2814825},
  doi          = {10.1145/2814825},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/AbelsonABBBDGGL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/AbelsonABBBDGG015,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Whitfield Diffie and
                  John Gilmore and
                  Matthew Green and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Michael A. Specter and
                  Daniel J. Weitzner},
  title        = {Keys under doormats: mandating insecurity by requiring government
                  access to all data and communications},
  journal      = {J. Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {69--79},
  year         = {2015},
  url          = {https://doi.org/10.1093/cybsec/tyv009},
  doi          = {10.1093/CYBSEC/TYV009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBDGG015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin15,
  author       = {Steven M. Bellovin},
  title        = {What a Real Cybersecurity Bill Should Address},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {3},
  pages        = {92},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2015.52},
  doi          = {10.1109/MSP.2015.52},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin15a,
  author       = {Steven M. Bellovin},
  title        = {The Key to the Key},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {6},
  pages        = {96},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2015.120},
  doi          = {10.1109/MSP.2015.120},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosn/RiedererZPCB15,
  author       = {Christopher J. Riederer and
                  Sebastian Zimmeck and
                  Coralie Phanord and
                  Augustin Chaintreau and
                  Steven M. Bellovin},
  editor       = {Aneesh Sharma and
                  Rakesh Agrawal and
                  Matthias Grossglauser},
  title        = {"I don't have a photograph, but you can have my footprints.":
                  Revealing the Demographics of Location Data},
  booktitle    = {Proceedings of the 2015 {ACM} on Conference on Online Social Networks,
                  {COSN} 2015, Palo Alto, California, USA, November 2-3, 2015},
  pages        = {185--195},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2817946.2817968},
  doi          = {10.1145/2817946.2817968},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosn/RiedererZPCB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/RiedererZPCB15,
  author       = {Christopher J. Riederer and
                  Sebastian Zimmeck and
                  Coralie Phanord and
                  Augustin Chaintreau and
                  Steven M. Bellovin},
  editor       = {Meeyoung Cha and
                  Cecilia Mascolo and
                  Christian Sandvig},
  title        = {"I Don't Have a Photograph, But You Can Have My Footprints"
                  - Revealing the Demographics of Location Data},
  booktitle    = {Proceedings of the Ninth International Conference on Web and Social
                  Media, {ICWSM} 2015, University of Oxford, Oxford, UK, May 26-29,
                  2015},
  pages        = {682--685},
  publisher    = {{AAAI} Press},
  year         = {2015},
  url          = {http://www.aaai.org/ocs/index.php/ICWSM/ICWSM15/paper/view/10576},
  timestamp    = {Fri, 05 Feb 2021 11:07:20 +0100},
  biburl       = {https://dblp.org/rec/conf/icwsm/RiedererZPCB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FiscVKKKMB15,
  author       = {Ben A. Fisch and
                  Binh Vo and
                  Fernando Krell and
                  Abishek Kumarasubramanian and
                  Vladimir Kolesnikov and
                  Tal Malkin and
                  Steven M. Bellovin},
  title        = {Malicious-Client Security in Blind Seer: {A} Scalable Private {DBMS}},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {395--410},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.31},
  doi          = {10.1109/SP.2015.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/FiscVKKKMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin14,
  author       = {Steven M. Bellovin},
  title        = {Dr. Strangecode},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {88},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.42},
  doi          = {10.1109/MSP.2014.42},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin14a,
  author       = {Steven M. Bellovin},
  title        = {By Any Means Possible: How Intelligence Agencies Have Gotten Their
                  Data},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {80--84},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.63},
  doi          = {10.1109/MSP.2014.63},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin14b,
  author       = {Steven M. Bellovin},
  title        = {What Should Crypto Look Like?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {6},
  pages        = {108},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.131},
  doi          = {10.1109/MSP.2014.131},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/VoB14,
  author       = {Binh Vo and
                  Steven M. Bellovin},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {Anonymous Publish-Subscribe Systems},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {152},
  pages        = {195--211},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23829-6\_15},
  doi          = {10.1007/978-3-319-23829-6\_15},
  timestamp    = {Tue, 23 May 2017 01:12:12 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/VoB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PappasKVKMCGKB14,
  author       = {Vasilis Pappas and
                  Fernando Krell and
                  Binh Vo and
                  Vladimir Kolesnikov and
                  Tal Malkin and
                  Seung Geol Choi and
                  Wesley George and
                  Angelos D. Keromytis and
                  Steven M. Bellovin},
  title        = {Blind Seer: {A} Scalable Private {DBMS}},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {359--374},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.30},
  doi          = {10.1109/SP.2014.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/PappasKVKMCGKB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZimmeckB14,
  author       = {Sebastian Zimmeck and
                  Steven M. Bellovin},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Privee: An Architecture for Automatically Analyzing Web Privacy Policies},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {1--16},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/zimmeck},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZimmeckB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischVKKKMB14,
  author       = {Ben Fisch and
                  Binh Vo and
                  Fernando Krell and
                  Abishek Kumarasubramanian and
                  Vladimir Kolesnikov and
                  Tal Malkin and
                  Steven M. Bellovin},
  title        = {Malicious-Client Security in Blind Seer: {A} Scalable Private {DBMS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {963},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/963},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischVKKKMB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc7353,
  author       = {Steven M. Bellovin and
                  Randy Bush and
                  David Ward},
  title        = {Security Requirements for {BGP} Path Validation},
  journal      = {{RFC}},
  volume       = {7353},
  pages        = {1--9},
  year         = {2014},
  url          = {https://doi.org/10.17487/RFC7353},
  doi          = {10.17487/RFC7353},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc7353.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BellovinBCL13,
  author       = {Steven M. Bellovin and
                  Matt Blaze and
                  Sandy Clark and
                  Susan Landau},
  title        = {Going Bright: Wiretapping without Weakening Communications Infrastructure},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {11},
  number       = {1},
  pages        = {62--72},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2012.138},
  doi          = {10.1109/MSP.2012.138},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BellovinBCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin13,
  author       = {Steven M. Bellovin},
  title        = {Military Cybersomethings},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {11},
  number       = {3},
  pages        = {88},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2013.63},
  doi          = {10.1109/MSP.2013.63},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin13a,
  author       = {Steven M. Bellovin},
  title        = {Walls and Gates},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {11},
  number       = {6},
  pages        = {88},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2013.157},
  doi          = {10.1109/MSP.2013.157},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin12,
  author       = {Steven M. Bellovin},
  title        = {Fighting the Last War},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {10},
  number       = {3},
  pages        = {96},
  year         = {2012},
  url          = {https://doi.org/10.1109/MSP.2012.66},
  doi          = {10.1109/MSP.2012.66},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/0001CVLMBS12,
  author       = {Mariana Raykova and
                  Ang Cui and
                  Binh Vo and
                  Bin Liu and
                  Tal Malkin and
                  Steven M. Bellovin and
                  Salvatore J. Stolfo},
  title        = {Usable, Secure, Private Search},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {10},
  number       = {5},
  pages        = {53--60},
  year         = {2012},
  url          = {https://doi.org/10.1109/MSP.2011.155},
  doi          = {10.1109/MSP.2011.155},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/0001CVLMBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin12a,
  author       = {Steven M. Bellovin},
  title        = {The Major Cyberincident Investigations Board},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {10},
  number       = {6},
  pages        = {96},
  year         = {2012},
  url          = {https://doi.org/10.1109/MSP.2012.158},
  doi          = {10.1109/MSP.2012.158},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/LandwehrBMBLL12,
  author       = {Carl E. Landwehr and
                  Dan Boneh and
                  John C. Mitchell and
                  Steven M. Bellovin and
                  Susan Landau and
                  Michael E. Lesk},
  title        = {Privacy and Cybersecurity: The Next 100 Years},
  journal      = {Proc. {IEEE}},
  volume       = {100},
  number       = {Centennial-Issue},
  pages        = {1659--1673},
  year         = {2012},
  url          = {https://doi.org/10.1109/JPROC.2012.2189794},
  doi          = {10.1109/JPROC.2012.2189794},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/LandwehrBMBLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/RaykovaZB12,
  author       = {Mariana Raykova and
                  Hang Zhao and
                  Steven M. Bellovin},
  editor       = {Angelos D. Keromytis},
  title        = {Privacy Enhanced Access Control for Outsourced Data Sharing},
  booktitle    = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, February 27 - March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {223--238},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3\_17},
  doi          = {10.1007/978-3-642-32946-3\_17},
  timestamp    = {Tue, 30 Jul 2024 10:38:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/RaykovaZB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/MadejskiJB12,
  author       = {Michelle Madejski and
                  Maritza L. Johnson and
                  Steven M. Bellovin},
  title        = {A study of privacy settings errors in an online social network},
  booktitle    = {Tenth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2012, March 19-23, 2012, Lugano, Switzerland,
                  Workshop Proceedings},
  pages        = {340--345},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/PerComW.2012.6197507},
  doi          = {10.1109/PERCOMW.2012.6197507},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/MadejskiJB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/JohnsonEB12,
  author       = {Maritza L. Johnson and
                  Serge Egelman and
                  Steven M. Bellovin},
  editor       = {Lorrie Faith Cranor},
  title        = {Facebook and privacy: it's complicated},
  booktitle    = {Symposium On Usable Privacy and Security, {SOUPS} '12, Washington,
                  DC, {USA} - July 11 - 13, 2012},
  pages        = {9},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2335356.2335369},
  doi          = {10.1145/2335356.2335369},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/JohnsonEB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc6528,
  author       = {Fernando Gont and
                  Steven M. Bellovin},
  title        = {Defending against Sequence Number Attacks},
  journal      = {{RFC}},
  volume       = {6528},
  pages        = {1--12},
  year         = {2012},
  url          = {https://doi.org/10.17487/RFC6528},
  doi          = {10.17487/RFC6528},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc6528.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BellovinBDLR11,
  author       = {Steven M. Bellovin and
                  Scott O. Bradner and
                  Whitfield Diffie and
                  Susan Landau and
                  Jennifer Rexford},
  title        = {As simple as possible - but not more so},
  journal      = {Commun. {ACM}},
  volume       = {54},
  number       = {8},
  pages        = {30--33},
  year         = {2011},
  url          = {https://doi.org/10.1145/1978542.1978553},
  doi          = {10.1145/1978542.1978553},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/BellovinBDLR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bellovin11,
  author       = {Steven M. Bellovin},
  title        = {Frank Miller: Inventor of the One-Time Pad},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {3},
  pages        = {203--222},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.583711},
  doi          = {10.1080/01611194.2011.583711},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bellovin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/StolfoBE11,
  author       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  David Evans},
  title        = {Measuring Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {9},
  number       = {3},
  pages        = {60--65},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSP.2011.56},
  doi          = {10.1109/MSP.2011.56},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/StolfoBE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin11,
  author       = {Steven M. Bellovin},
  title        = {Clouds from Both Sides},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {9},
  number       = {3},
  pages        = {88},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSP.2011.48},
  doi          = {10.1109/MSP.2011.48},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin11a,
  author       = {Steven M. Bellovin},
  title        = {Security Think},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {9},
  number       = {6},
  pages        = {88},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSP.2011.172},
  doi          = {10.1109/MSP.2011.172},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PappasRVBM11,
  author       = {Vasilis Pappas and
                  Mariana Raykova and
                  Binh Vo and
                  Steven M. Bellovin and
                  Tal Malkin},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Private search in the real world},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {83--92},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076744},
  doi          = {10.1145/2076732.2076744},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PappasRVBM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JohnsonBK11,
  author       = {Maritza L. Johnson and
                  Steven M. Bellovin and
                  Angelos D. Keromytis},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Computer Security Research with Human Subjects: Risks, Benefits and
                  Informed Consent},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {131--137},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_11},
  doi          = {10.1007/978-3-642-29889-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JohnsonBK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/ZhaoLRB11,
  author       = {Hang Zhao and
                  Jorge Lobo and
                  Arnab Roy and
                  Steven M. Bellovin},
  editor       = {Nazim Agoulmine and
                  Claudio Bartolini and
                  Tom Pfeifer and
                  Declan O'Sullivan},
  title        = {Policy refinement of network services for MANETs},
  booktitle    = {Proceedings of the 12th {IFIP/IEEE} International Symposium on Integrated
                  Network Management, {IM} 2011, Dublin, Ireland, 23-27 May 2011},
  pages        = {113--120},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INM.2011.5990681},
  doi          = {10.1109/INM.2011.5990681},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/im/ZhaoLRB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bellovin11,
  author       = {Steven M. Bellovin},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{IP} Traceback},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {632--634},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_268},
  doi          = {10.1007/978-1-4419-5906-5\_268},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bellovin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin10,
  author       = {Steven M. Bellovin},
  title        = {Identity and Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {8},
  number       = {2},
  pages        = {88},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSP.2010.71},
  doi          = {10.1109/MSP.2010.71},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin10a,
  author       = {Steven M. Bellovin},
  title        = {Perceptions and Reality},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {8},
  number       = {5},
  pages        = {88},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSP.2010.160},
  doi          = {10.1109/MSP.2010.160},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AndroulakiVB10,
  author       = {Elli Androulaki and
                  Binh Vo and
                  Steven M. Bellovin},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Privacy-Preserving, Taxable Bank Accounts},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_3},
  doi          = {10.1007/978-3-642-15497-3\_3},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AndroulakiVB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AndroulakiB10,
  author       = {Elli Androulaki and
                  Steven M. Bellovin},
  editor       = {Radu Sion and
                  Reza Curtmola and
                  Sven Dietrich and
                  Aggelos Kiayias and
                  Josep M. Miret and
                  Kazue Sako and
                  Francesc Seb{\'{e}}},
  title        = {A Secure and Privacy-Preserving Targeted Ad-System},
  booktitle    = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS,
                  WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  pages        = {123--135},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14992-4\_12},
  doi          = {10.1007/978-3-642-14992-4\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AndroulakiB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/ZhaoB10,
  author       = {Hang Zhao and
                  Steven M. Bellovin},
  editor       = {Sajal K. Das and
                  Anke Xue},
  title        = {High Performance Firewalls in MANETs},
  booktitle    = {Sixth International Conference on Mobile Ad-hoc and Sensor Networks,
                  {MSN} 2010, Hangzhou, China, December 20-22, 2010},
  pages        = {154--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSN.2010.30},
  doi          = {10.1109/MSN.2010.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/ZhaoB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JohnsonB10,
  author       = {Maritza L. Johnson and
                  Steven M. Bellovin},
  editor       = {Kevin Fu and
                  Tadayoshi Kohno and
                  Aviel D. Rubin},
  title        = {Policy Management for E-Health Records},
  booktitle    = {1st {USENIX} Workshop on Health Security and Privacy, HealthSec'10,
                  Washington, D.C., USA, August 10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/healthsec10/policy-management-e-health-records},
  timestamp    = {Mon, 01 Feb 2021 08:43:06 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JohnsonB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/AlexanderCCGKSB09,
  author       = {D. Scott Alexander and
                  Yuu{-}Heng Cheng and
                  Brian A. Coan and
                  Andrei Ghetie and
                  Vikram Kaul and
                  Bruce Siegell and
                  Steven M. Bellovin and
                  Nicholas F. Maxemchuk and
                  Henning Schulzrinne and
                  Stephen Schwab and
                  Angelos Stavrou and
                  Jonathan M. Smith},
  title        = {The dynamic community of interest and its realization in {ZODIAC}},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {47},
  number       = {10},
  pages        = {40--47},
  year         = {2009},
  url          = {https://doi.org/10.1109/MCOM.2009.5273807},
  doi          = {10.1109/MCOM.2009.5273807},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/AlexanderCCGKSB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin09,
  author       = {Steven M. Bellovin},
  title        = {The Government and Cybersecurity},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {7},
  number       = {2},
  pages        = {96},
  year         = {2009},
  url          = {https://doi.org/10.1109/MSP.2009.55},
  doi          = {10.1109/MSP.2009.55},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BellovinC09,
  author       = {Steven M. Bellovin and
                  Daniel G. Conway},
  title        = {Security as a Systems Property},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {7},
  number       = {5},
  pages        = {88},
  year         = {2009},
  url          = {https://doi.org/10.1109/MSP.2009.134},
  doi          = {10.1109/MSP.2009.134},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BellovinC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/BellovinB09,
  author       = {Steven M. Bellovin and
                  Randy Bush},
  title        = {Configuration management and security},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {27},
  number       = {3},
  pages        = {268--274},
  year         = {2009},
  url          = {https://doi.org/10.1109/JSAC.2009.090403},
  doi          = {10.1109/JSAC.2009.090403},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/BellovinB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RaykovaVBM09,
  author       = {Mariana Raykova and
                  Binh Vo and
                  Steven M. Bellovin and
                  Tal Malkin},
  editor       = {Radu Sion and
                  Dawn Song},
  title        = {Secure anonymous database search},
  booktitle    = {Proceedings of the first {ACM} Cloud Computing Security Workshop,
                  {CCSW} 2009, Chicago, IL, USA, November 13, 2009},
  pages        = {115--126},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655008.1655025},
  doi          = {10.1145/1655008.1655025},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RaykovaVBM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/PotterBN09,
  author       = {Shaya Potter and
                  Steven M. Bellovin and
                  Jason Nieh},
  editor       = {Adam Moskowitz},
  title        = {Two-Person Control Administation: Preventing Administation Faults
                  through Duplication},
  booktitle    = {Proceedings of the 23rd Large Installation System Administration Conference,
                  November 1-6, 2009, Baltimore, MD, {USA}},
  pages        = {15--27},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {http://www.usenix.org/events/lisa09/tech/full\_papers/potter.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/PotterBN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/JohnsonBRS09,
  author       = {Maritza L. Johnson and
                  Steven M. Bellovin and
                  Robert W. Reeder and
                  Stuart E. Schechter},
  editor       = {Anil Somayaji and
                  Richard Ford},
  title        = {Laissez-faire file sharing: access control designed for individuals
                  at the endpoints},
  booktitle    = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
                  United Kingdom, September 8-11, 2009},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1719030.1719032},
  doi          = {10.1145/1719030.1719032},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/JohnsonBRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/AndroulakiB09,
  author       = {Elli Androulaki and
                  Steven M. Bellovin},
  editor       = {Ian Goldberg and
                  Mikhail J. Atallah},
  title        = {{APOD:} Anonymous Physical Object Delivery},
  booktitle    = {Privacy Enhancing Technologies, 9th International Symposium, {PETS}
                  2009, Seattle, WA, USA, August 5-7, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5672},
  pages        = {202--215},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03168-7\_12},
  doi          = {10.1007/978-3-642-03168-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/AndroulakiB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/ChengRPAEB09,
  author       = {Yuu{-}Heng Cheng and
                  Mariana Raykova and
                  Alexander Poylisher and
                  D. Scott Alexander and
                  Martin Eiger and
                  Steven M. Bellovin},
  title        = {The Zodiac Policy Subsystem: {A} Policy-Based Management System for
                  a High-Security {MANET}},
  booktitle    = {{POLICY} 2009, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, London, UK, 20-22 July 2009},
  pages        = {174--177},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/POLICY.2009.7},
  doi          = {10.1109/POLICY.2009.7},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/ChengRPAEB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/AndroulakiB09,
  author       = {Elli Androulaki and
                  Steven M. Bellovin},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul},
  title        = {An Anonymous Credit Card System},
  booktitle    = {Trust, Privacy and Security in Digital Business, 6th International
                  Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5695},
  pages        = {42--51},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03748-1\_5},
  doi          = {10.1007/978-3-642-03748-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/AndroulakiB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc5406,
  author       = {Steven M. Bellovin},
  title        = {Guidelines for Specifying the Use of IPsec Version 2},
  journal      = {{RFC}},
  volume       = {5406},
  pages        = {1--13},
  year         = {2009},
  url          = {https://doi.org/10.17487/RFC5406},
  doi          = {10.17487/RFC5406},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc5406.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Bellovin08,
  author       = {Steven M. Bellovin},
  title        = {The physical world and the real world},
  journal      = {Commun. {ACM}},
  volume       = {51},
  number       = {5},
  pages        = {104},
  year         = {2008},
  url          = {https://doi.org/10.1145/1342327.1342345},
  doi          = {10.1145/1342327.1342345},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Bellovin08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/StrayerAABJM08,
  author       = {Tim Strayer and
                  Mark Allman and
                  Grenville J. Armitage and
                  Steven M. Bellovin and
                  Shudong Jin and
                  Andrew W. Moore},
  title        = {{IMRG} workshop on application classification and identification report},
  journal      = {Comput. Commun. Rev.},
  volume       = {38},
  number       = {3},
  pages        = {87--90},
  year         = {2008},
  url          = {https://doi.org/10.1145/1384609.1384621},
  doi          = {10.1145/1384609.1384621},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/StrayerAABJM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BellovinBBDDEV08,
  author       = {Steven M. Bellovin and
                  Terry V. Benzel and
                  Bob Blakley and
                  Dorothy E. Denning and
                  Whitfield Diffie and
                  Jeremy Epstein and
                  Paulo Ver{\'{\i}}ssimo},
  title        = {Information Assurance Technology Forecast 2008},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {1},
  pages        = {16--23},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.13},
  doi          = {10.1109/MSP.2008.13},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BellovinBBDDEV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BellovinBDSNR08,
  author       = {Steven M. Bellovin and
                  Matt Blaze and
                  Whitfield Diffie and
                  Susan Landau and
                  Peter G. Neumann and
                  Jennifer Rexford},
  title        = {Risking Communications Security: Potential Hazards of the Protect
                  America Act},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {1},
  pages        = {24--33},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.17},
  doi          = {10.1109/MSP.2008.17},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BellovinBDSNR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin08,
  author       = {Steven M. Bellovin},
  title        = {Security by Checklist},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {2},
  pages        = {88},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.43},
  doi          = {10.1109/MSP.2008.43},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin08a,
  author       = {Steven M. Bellovin},
  title        = {The Puzzle of Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {5},
  pages        = {88},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.129},
  doi          = {10.1109/MSP.2008.129},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/JohnsonAABK08,
  author       = {Maritza L. Johnson and
                  Chaitanya Atreya and
                  Adam J. Aviv and
                  Steven M. Bellovin and
                  Gail E. Kaiser},
  editor       = {Elizabeth F. Churchill and
                  Rachna Dhamija},
  title        = {{RUST:} {A} Retargetable Usability Testbed for Web Site Authentication
                  Technologies},
  booktitle    = {Usability, Psychology, and Security, UPSEC'08, San Francisco, CA,
                  USA, April 14, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/upsec08/tech/full\_papers/johnson/johnson.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/JohnsonAABK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ZhaoCB08,
  author       = {Hang Zhao and
                  Chi{-}Kin Chau and
                  Steven M. Bellovin},
  editor       = {Matt Bishop and
                  Christian W. Probst and
                  Angelos D. Keromytis and
                  Anil Somayaji},
  title        = {{ROFL:} routing as the firewall layer},
  booktitle    = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe,
                  CA, USA, September 22-25, 2008},
  pages        = {23--31},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1595676.1595681},
  doi          = {10.1145/1595676.1595681},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ZhaoCB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/AndroulakiCBM08,
  author       = {Elli Androulaki and
                  Seung Geol Choi and
                  Steven M. Bellovin and
                  Tal Malkin},
  editor       = {Nikita Borisov and
                  Ian Goldberg},
  title        = {Reputation Systems for Anonymous Networks},
  booktitle    = {Privacy Enhancing Technologies, 8th International Symposium, {PETS}
                  2008, Leuven, Belgium, July 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5134},
  pages        = {202--218},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70630-4\_13},
  doi          = {10.1007/978-3-540-70630-4\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/AndroulakiCBM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/AndroulakiRSSB08,
  author       = {Elli Androulaki and
                  Mariana Raykova and
                  Shreyas Srivatsan and
                  Angelos Stavrou and
                  Steven M. Bellovin},
  editor       = {Nikita Borisov and
                  Ian Goldberg},
  title        = {{PAR:} Payment for Anonymous Routing},
  booktitle    = {Privacy Enhancing Technologies, 8th International Symposium, {PETS}
                  2008, Leuven, Belgium, July 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5134},
  pages        = {219--236},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70630-4\_14},
  doi          = {10.1007/978-3-540-70630-4\_14},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/AndroulakiRSSB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/ZhaoLB08,
  author       = {Hang Zhao and
                  Jorge Lobo and
                  Steven M. Bellovin},
  title        = {An Algebra for Integration and Analysis of Ponder2 Policies},
  booktitle    = {9th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2008), 2-4 June 2008, Palisades, New York,
                  {USA}},
  pages        = {74--77},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/POLICY.2008.42},
  doi          = {10.1109/POLICY.2008.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/ZhaoLB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Bellovin08,
  author       = {Steven M. Bellovin},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {The Insider Attack Problem Nature and Scope},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {1--4},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_1},
  doi          = {10.1007/978-0-387-77322-3\_1},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Bellovin08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2008,
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0},
  doi          = {10.1007/978-3-540-68914-0},
  isbn         = {978-3-540-68913-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/39,
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3},
  doi          = {10.1007/978-0-387-77322-3},
  isbn         = {978-0-387-77321-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/39.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BellovinBDLRN07,
  author       = {Steven M. Bellovin and
                  Matt Blaze and
                  Whitfield Diffie and
                  Susan Landau and
                  Jennifer Rexford and
                  Peter G. Neumann},
  title        = {Internal surveillance, external risks},
  journal      = {Commun. {ACM}},
  volume       = {50},
  number       = {12},
  pages        = {128},
  year         = {2007},
  url          = {https://doi.org/10.1145/1323688.1323717},
  doi          = {10.1145/1323688.1323717},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/BellovinBDLRN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin07,
  author       = {Steven M. Bellovin},
  title        = {DRM, Complexity, and Correctness},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {5},
  number       = {1},
  pages        = {80},
  year         = {2007},
  url          = {https://doi.org/10.1109/MSP.2007.5},
  doi          = {10.1109/MSP.2007.5},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin07a,
  author       = {Steven M. Bellovin},
  title        = {Seers and Craftspeople},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {5},
  number       = {5},
  pages        = {88},
  year         = {2007},
  url          = {https://doi.org/10.1109/MSP.2007.120},
  doi          = {10.1109/MSP.2007.120},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/IoannidisBIKAS07,
  author       = {Sotiris Ioannidis and
                  Steven M. Bellovin and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Kostas G. Anagnostakis and
                  Jonathan M. Smith},
  title        = {Virtual Private Services: Coordinated Policy Enforcement for Distributed
                  Applications},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {69--80},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p69-80.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/IoannidisBIKAS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sruti/2007,
  editor       = {Steven M. Bellovin},
  title        = {3rd Workshop on Steps to Reducing Unwanted Traffic on the Internet,
                  SRUTI'07, Santa Clara, CA, USA, June 18, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/sruti07},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sruti/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4808,
  author       = {Steven M. Bellovin},
  title        = {Key Change Strategies for {TCP-MD5}},
  journal      = {{RFC}},
  volume       = {4808},
  pages        = {1--8},
  year         = {2007},
  url          = {https://doi.org/10.17487/RFC4808},
  doi          = {10.17487/RFC4808},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4808.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Bellovin06,
  author       = {Steven M. Bellovin},
  title        = {Virtual machines, virtual security?},
  journal      = {Commun. {ACM}},
  volume       = {49},
  number       = {10},
  pages        = {104},
  year         = {2006},
  url          = {https://doi.org/10.1145/1164394.1164414},
  doi          = {10.1145/1164394.1164414},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Bellovin06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin06,
  author       = {Steven M. Bellovin},
  title        = {Unconventional Wisdom},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {4},
  number       = {1},
  pages        = {88},
  year         = {2006},
  url          = {https://doi.org/10.1109/MSP.2006.28},
  doi          = {10.1109/MSP.2006.28},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin06a,
  author       = {Steven M. Bellovin},
  title        = {On the Brittleness of Software and the Infeasibility of Security Metrics},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {4},
  number       = {4},
  pages        = {96--96},
  year         = {2006},
  url          = {https://doi.org/10.1109/MSP.2006.101},
  doi          = {10.1109/MSP.2006.101},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/BellovinCK06,
  author       = {Steven M. Bellovin and
                  Bill Cheswick and
                  Angelos D. Keromytis},
  title        = {Worm Propagation Strategies in an IPv6 Internet},
  journal      = {login Usenix Mag.},
  volume       = {31},
  number       = {1},
  year         = {2006},
  url          = {https://www.usenix.org/publications/login/february-2006-volume-31-number-1/worm-propagation-strategies-ipv6-internet},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/BellovinCK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BellovinR06,
  author       = {Steven M. Bellovin and
                  Eric Rescorla},
  title        = {Deploying a New Hash Algorithm},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2006, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2006},
  url          = {https://www.ndss-symposium.org/ndss2006/deploying-new-hash-algorithm/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BellovinR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/Bellovin06,
  author       = {Steven M. Bellovin},
  editor       = {Atul Adya and
                  Erich M. Nahum},
  title        = {Permissive Action Links, Nuclear Weapons, and the History of Public
                  Key Cryptography},
  booktitle    = {Proceedings of the 2006 {USENIX} Annual Technical Conference, {USENIX}
                  {ATC} 2006, Boston, MA, USA, May 30 - June 3, 2006},
  publisher    = {{USENIX}},
  year         = {2006},
  url          = {http://www.usenix.org/events/usenix06/tech/slides/bellovin\_2006.pdf},
  timestamp    = {Tue, 16 Jul 2024 09:12:32 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/Bellovin06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/Bellovin06a,
  author       = {Steven M. Bellovin},
  editor       = {Atul Adya and
                  Erich M. Nahum},
  title        = {Privacy {\&} Cryptography},
  booktitle    = {Proceedings of the 2006 {USENIX} Annual Technical Conference, {USENIX}
                  {ATC} 2006, Boston, MA, USA, May 30 - June 3, 2006},
  publisher    = {{USENIX}},
  year         = {2006},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/Bellovin06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YeeWHB06,
  author       = {Ka{-}Ping Yee and
                  David A. Wagner and
                  Marti A. Hearst and
                  Steven M. Bellovin},
  editor       = {Dan S. Wallach and
                  Ronald L. Rivest},
  title        = {Prerendered User Interfaces for Higher-Assurance Electronic Voting},
  booktitle    = {2006 {USENIX/ACCURATE} Electronic Voting Technology Workshop, EVT'06,
                  Vancouver, BC, Canada, August 1, 2006},
  publisher    = {{USENIX} Association},
  year         = {2006},
  url          = {https://www.usenix.org/conference/evt-06/prerendered-user-interfaces-higher-assurance-electronic-voting},
  timestamp    = {Mon, 01 Feb 2021 08:43:11 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/YeeWHB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sruti/2006,
  editor       = {Steven M. Bellovin},
  title        = {2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet,
                  SRUTI'06, San Jose, CA, USA, July 7, 2006},
  publisher    = {{USENIX} Association},
  year         = {2006},
  url          = {https://www.usenix.org/conference/sruti06},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sruti/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4278,
  author       = {Steven M. Bellovin and
                  Alex Zinin},
  title        = {Standards Maturity Variance Regarding the {TCP} {MD5} Signature Option
                  {(RFC} 2385) and the {BGP-4} Specification},
  journal      = {{RFC}},
  volume       = {4278},
  pages        = {1--7},
  year         = {2006},
  url          = {https://doi.org/10.17487/RFC4278},
  doi          = {10.17487/RFC4278},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4278.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BellovinBL05,
  author       = {Steven M. Bellovin and
                  Matt Blaze and
                  Susan Landau},
  title        = {The real national-security needs for VoIP},
  journal      = {Commun. {ACM}},
  volume       = {48},
  number       = {11},
  pages        = {120},
  year         = {2005},
  url          = {https://doi.org/10.1145/1096000.1096030},
  doi          = {10.1145/1096000.1096030},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/BellovinBL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Bellovin05,
  author       = {Steven M. Bellovin},
  title        = {Security and Privacy: Enemies or Allies?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {92},
  year         = {2005},
  url          = {https://doi.org/10.1109/MSP.2005.80},
  doi          = {10.1109/MSP.2005.80},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Bellovin05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4107,
  author       = {Steven M. Bellovin and
                  Russell Housley},
  title        = {Guidelines for Cryptographic Key Management},
  journal      = {{RFC}},
  volume       = {4107},
  pages        = {1--7},
  year         = {2005},
  url          = {https://doi.org/10.17487/RFC4107},
  doi          = {10.17487/RFC4107},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4107.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Bellovin04,
  author       = {Steven M. Bellovin},
  title        = {Spamming, phishing, authentication, and privacy},
  journal      = {Commun. {ACM}},
  volume       = {47},
  number       = {12},
  pages        = {144},
  year         = {2004},
  url          = {https://doi.org/10.1145/1035134.1035159},
  doi          = {10.1145/1035134.1035159},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Bellovin04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AielloBBCIKR04,
  author       = {William Aiello and
                  Steven M. Bellovin and
                  Matt Blaze and
                  Ran Canetti and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Omer Reingold},
  title        = {Just fast keying: Key agreement in a hostile internet},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {242--273},
  year         = {2004},
  url          = {https://doi.org/10.1145/996943.996946},
  doi          = {10.1145/996943.996946},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AielloBBCIKR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Bellovin04,
  author       = {Steven M. Bellovin},
  title        = {A Look Back at "Security Problems in the {TCP/IP} Protocol Suite"},
  booktitle    = {20th Annual Computer Security Applications Conference {(ACSAC} 2004),
                  6-10 December 2004, Tucson, AZ, {USA}},
  pages        = {229--249},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CSAC.2004.3},
  doi          = {10.1109/CSAC.2004.3},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Bellovin04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Bellovin04,
  author       = {Steven M. Bellovin},
  editor       = {Matt Blaze},
  title        = {Nuclear Weapons, Permissive Action Links, and the History of Public
                  Key Cryptography},
  booktitle    = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13,
                  2004, San Diego, CA, {USA}},
  publisher    = {{USENIX}},
  year         = {2004},
  url          = {http://www.research.att.com/\%7Esmb/talks/pal.pdf},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Bellovin04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellovinC04,
  author       = {Steven M. Bellovin and
                  William R. Cheswick},
  title        = {Privacy-Enhanced Searches Using Encrypted Bloom Filters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellovinC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/IoannidisBIKS03,
  author       = {Sotiris Ioannidis and
                  Steven M. Bellovin and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Jonathan M. Smith},
  title        = {Design and Implementation of Virtual Private Services},
  booktitle    = {12th {IEEE} International Workshops on Enabling Technologies {(WETICE}
                  2003), Infrastructure for Collaborative Enterprises, 9-11 June 2003,
                  Linz, Austria},
  pages        = {269--274},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ENABL.2003.1231419},
  doi          = {10.1109/ENABL.2003.1231419},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/IoannidisBIKS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc3514,
  author       = {Steven M. Bellovin},
  title        = {The Security Flag in the IPv4 Header},
  journal      = {{RFC}},
  volume       = {3514},
  pages        = {1--6},
  year         = {2003},
  url          = {https://doi.org/10.17487/RFC3514},
  doi          = {10.17487/RFC3514},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc3514.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc3554,
  author       = {Steven M. Bellovin and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Randall R. Stewart},
  title        = {On the Use of Stream Control Transmission Protocol {(SCTP)} with IPsec},
  journal      = {{RFC}},
  volume       = {3554},
  pages        = {1--9},
  year         = {2003},
  url          = {https://doi.org/10.17487/RFC3554},
  doi          = {10.17487/RFC3554},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc3554.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc3631,
  author       = {Steven M. Bellovin and
                  Jeffrey I. Schiller and
                  Charlie Kaufman},
  title        = {Security Mechanisms for the Internet},
  journal      = {{RFC}},
  volume       = {3631},
  pages        = {1--20},
  year         = {2003},
  url          = {https://doi.org/10.17487/RFC3631},
  doi          = {10.17487/RFC3631},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc3631.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/MahajanBFIPS02,
  author       = {Ratul Mahajan and
                  Steven M. Bellovin and
                  Sally Floyd and
                  John Ioannidis and
                  Vern Paxson and
                  Scott Shenker},
  title        = {Aggregate congestion control},
  journal      = {Comput. Commun. Rev.},
  volume       = {32},
  number       = {1},
  pages        = {69},
  year         = {2002},
  url          = {https://doi.org/10.1145/510726.510743},
  doi          = {10.1145/510726.510743},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/MahajanBFIPS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/MahajanBFIPS02a,
  author       = {Ratul Mahajan and
                  Steven M. Bellovin and
                  Sally Floyd and
                  John Ioannidis and
                  Vern Paxson and
                  Scott Shenker},
  title        = {Controlling high bandwidth aggregates in the network},
  journal      = {Comput. Commun. Rev.},
  volume       = {32},
  number       = {3},
  pages        = {62--73},
  year         = {2002},
  url          = {https://doi.org/10.1145/571697.571724},
  doi          = {10.1145/571697.571724},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/MahajanBFIPS02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AielloBBIRCK02,
  author       = {William Aiello and
                  Steven M. Bellovin and
                  Matt Blaze and
                  John Ioannidis and
                  Omer Reingold and
                  Ran Canetti and
                  Angelos D. Keromytis},
  editor       = {Vijayalakshmi Atluri},
  title        = {Efficient, DoS-resistant, secure key exchange for internet protocols},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {48--58},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586118},
  doi          = {10.1145/586110.586118},
  timestamp    = {Tue, 10 Nov 2020 20:00:47 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AielloBBIRCK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LandwehrB02,
  author       = {Carl E. Landwehr and
                  Steven M. Bellovin},
  title        = {Intrusion Tolerant Systems Workshop},
  booktitle    = {2002 International Conference on Dependable Systems and Networks {(DSN}
                  2002), 23-26 June 2002, Bethesda, MD, USA, Proceedings},
  pages        = {785--786},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.ieeecomputersociety.org/10.1109/DSN.2002.10015},
  doi          = {10.1109/DSN.2002.10015},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LandwehrB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/Bellovin02,
  author       = {Steven M. Bellovin},
  title        = {A technique for counting natted hosts},
  booktitle    = {Proceedings of the 2nd {ACM} {SIGCOMM} Internet Measurement Workshop,
                  {IMW} 2002, Marseille, France, November 6-8, 2002},
  pages        = {267--272},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/637201.637243},
  doi          = {10.1145/637201.637243},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/Bellovin02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/IoannidisB02,
  author       = {John Ioannidis and
                  Steven M. Bellovin},
  title        = {Implementing Pushback: Router-Based Defense Against DDoS Attacks},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2002, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2002},
  url          = {https://www.ndss-symposium.org/ndss2002/implementing-pushback-router-based-defense-against-ddos-attacks/},
  timestamp    = {Mon, 01 Feb 2021 08:42:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/IoannidisB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigopsE/IoannidisBS02,
  author       = {Sotiris Ioannidis and
                  Steven M. Bellovin and
                  Jonathan M. Smith},
  editor       = {Gilles Muller and
                  Eric Jul},
  title        = {Sub-operating systems: a new approach to application security},
  booktitle    = {Proceedings of the 10th {ACM} {SIGOPS} European Workshop, Saint-Emilion,
                  France, July 1, 2002},
  pages        = {108--115},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/1133373.1133394},
  doi          = {10.1145/1133373.1133394},
  timestamp    = {Thu, 07 Nov 2019 10:24:25 +0100},
  biburl       = {https://dblp.org/rec/conf/sigopsE/IoannidisBS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Bellovin01,
  author       = {Steven M. Bellovin},
  title        = {Computer security - an end state?},
  journal      = {Commun. {ACM}},
  volume       = {44},
  number       = {3},
  pages        = {131--132},
  year         = {2001},
  url          = {https://doi.org/10.1145/365181.365241},
  doi          = {10.1145/365181.365241},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/Bellovin01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Bellovin01,
  author       = {Steven M. Bellovin},
  title        = {Security Risks Of Peer-To-Peer Networking},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2001, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2001},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Bellovin01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AielloBBCIKR01,
  author       = {William Aiello and
                  Steven M. Bellovin and
                  Matt Blaze and
                  Ran Canetti and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Omer Reingold},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {27--39},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_5},
  doi          = {10.1007/3-540-45807-7\_5},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AielloBBCIKR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/IoannidisB01,
  author       = {Sotiris Ioannidis and
                  Steven M. Bellovin},
  editor       = {Clem Cole},
  title        = {Building a Secure Web Browser},
  booktitle    = {Proceedings of the {FREENIX} Track: 2001 {USENIX} Annual Technical
                  Conference, June 25-30, 2001, Boston, Massachusetts, {USA}},
  pages        = {127--134},
  publisher    = {{USENIX}},
  year         = {2001},
  url          = {http://www.usenix.org/publications/library/proceedings/usenix01/freenix01/ioannidis.html},
  timestamp    = {Tue, 16 Jul 2024 09:12:32 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/IoannidisB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GleitzB01,
  author       = {Peter M. Gleitz and
                  Steven M. Bellovin},
  editor       = {Dan S. Wallach},
  title        = {Transient Addressing for Related Processes: Improved Firewalling by
                  Using {IPV6} and Multiple Addresses per Host},
  booktitle    = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington,
                  D.C., {USA}},
  publisher    = {{USENIX}},
  year         = {2001},
  url          = {http://www.usenix.org/publications/library/proceedings/sec01/gleitz.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GleitzB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BlazeB00,
  author       = {Matt Blaze and
                  Steven M. Bellovin},
  title        = {Tapping on my network door},
  journal      = {Commun. {ACM}},
  volume       = {43},
  number       = {10},
  pages        = {136},
  year         = {2000},
  url          = {https://doi.org/10.1145/352183.352213},
  doi          = {10.1145/352183.352213},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/BlazeB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/IoannidisKBS00,
  author       = {Sotiris Ioannidis and
                  Angelos D. Keromytis and
                  Steven M. Bellovin and
                  Jonathan M. Smith},
  editor       = {Dimitris Gritzalis and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Implementing a distributed firewall},
  booktitle    = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and
                  Communications Security, Athens, Greece, November 1-4, 2000},
  pages        = {190--199},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/352600.353052},
  doi          = {10.1145/352600.353052},
  timestamp    = {Tue, 10 Nov 2020 20:00:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/IoannidisKBS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2000,
  editor       = {Steven M. Bellovin and
                  Greg Rose},
  title        = {9th {USENIX} Security Symposium, Denver, Colorado, USA, August 14-17,
                  2000},
  publisher    = {{USENIX} Association},
  year         = {2000},
  url          = {https://www.usenix.org/conference/9thusenixsecuritysymposium},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/SchneiderB99,
  author       = {Fred B. Schneider and
                  Steven M. Bellovin},
  title        = {Evolving Telephone Networks},
  journal      = {Commun. {ACM}},
  volume       = {42},
  number       = {1},
  pages        = {160},
  year         = {1999},
  url          = {https://doi.org/10.1145/291469.291485},
  doi          = {10.1145/291469.291485},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/SchneiderB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/SchneiderBI99,
  author       = {Fred B. Schneider and
                  Steven M. Bellovin and
                  Alan S. Inouye},
  title        = {Building Trustworthy Systems: Lessons from the {PTN} and Internet},
  journal      = {{IEEE} Internet Comput.},
  volume       = {3},
  number       = {6},
  pages        = {64--72},
  year         = {1999},
  url          = {https://doi.org/10.1109/4236.807013},
  doi          = {10.1109/4236.807013},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/SchneiderBI99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/DenkerBDMKP99,
  author       = {John S. Denker and
                  Steven M. Bellovin and
                  Hugh Daniel and
                  Nancy L. Mintz and
                  Tom Killian and
                  Mark Plotnick},
  editor       = {David W. Parter},
  title        = {Moat: a Virtual Private Network Appliance and Services Platform},
  booktitle    = {Proceedings of the 13th Conference on Systems Administration (LISA-99),
                  Seattle, WA, USA, November 7-12, 1999},
  pages        = {251--260},
  publisher    = {{USENIX}},
  year         = {1999},
  url          = {http://www.usenix.org/publications/library/proceedings/lisa99/denker.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/DenkerBDMKP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Bellovin99,
  author       = {Steven M. Bellovin},
  title        = {Why Do We Need More Research?},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 1999, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {1999},
  url          = {https://www.ndss-symposium.org/ndss1999/why-do-we-need-more-research/},
  timestamp    = {Mon, 01 Feb 2021 08:42:19 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Bellovin99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Bellovin99a,
  author       = {Steven M. Bellovin},
  title        = {Transport-Friendly {ESP}},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 1999, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {1999},
  url          = {https://www.ndss-symposium.org/ndss1999/transport-friendly-esp/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Bellovin99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Bellovin98,
  author       = {Steven M. Bellovin},
  editor       = {Hugo Krawczyk},
  title        = {Cryptography and the Internet},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {46--55},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055719},
  doi          = {10.1007/BFB0055719},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Bellovin98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2316,
  author       = {Steven M. Bellovin},
  title        = {Report of the {IAB} Security Architecture Workshop},
  journal      = {{RFC}},
  volume       = {2316},
  pages        = {1--9},
  year         = {1998},
  url          = {https://doi.org/10.17487/RFC2316},
  doi          = {10.17487/RFC2316},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc2316.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2458,
  author       = {Hui{-}Lan Lu and
                  Murali Krishnaswamy and
                  Lawrence Conroy and
                  Steven M. Bellovin and
                  Fred M. Burg and
                  Antonio DeSimone and
                  Kamlesh T. Tewani and
                  Paul Davidson and
                  Henning Schulzrinne and
                  Kumar Vishwanathan},
  title        = {Toward the PSTN/Internet Inter-Networking-Pre-PINT Implementations},
  journal      = {{RFC}},
  volume       = {2458},
  pages        = {1--60},
  year         = {1998},
  url          = {https://doi.org/10.17487/RFC2458},
  doi          = {10.17487/RFC2458},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc2458.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Bellovin97,
  author       = {Steven M. Bellovin},
  title        = {Network and Internet Security},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {6},
  number       = {3},
  pages        = {20--34},
  year         = {1997},
  url          = {https://doi.org/10.1080/10658989709342539},
  doi          = {10.1080/10658989709342539},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Bellovin97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wwwj/AbelsonABBBDGNR97,
  author       = {Hal Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Whitfield Diffie and
                  John Gilmore and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier},
  title        = {The risks of key recovery, key escrow, and trusted third-party encryption},
  journal      = {World Wide Web J.},
  volume       = {2},
  pages        = {241--257},
  year         = {1997},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wwwj/AbelsonABBBDGNR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Bellovin97,
  author       = {Steven M. Bellovin},
  title        = {Probable Plaintext Cryptanalysis of the {IP} Security Protocols},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 1997, San Diego, California, {USA}},
  pages        = {52--59},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/NDSS.1997.579220},
  doi          = {10.1109/NDSS.1997.579220},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Bellovin97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/crc/tucker97/Bellovin97,
  author       = {Steven M. Bellovin},
  editor       = {Allen B. Tucker},
  title        = {Network and Internet Security},
  booktitle    = {The Computer Science and Engineering Handbook},
  pages        = {1949--1961},
  publisher    = {{CRC} Press},
  year         = {1997},
  timestamp    = {Sun, 09 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/crc/tucker97/Bellovin97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WagnerB96,
  author       = {David A. Wagner and
                  Steven M. Bellovin},
  editor       = {James T. Ellis and
                  B. Clifford Neuman and
                  David M. Balenson},
  title        = {A "bump in the stack" encryptor for {MS-DOS} systems},
  booktitle    = {1996 Symposium on Network and Distributed System Security, {(S)NDSS}
                  '96, San Diego, CA, USA, February 22-23, 1996},
  pages        = {155--161},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/NDSS.1996.492422},
  doi          = {10.1109/NDSS.1996.492422},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WagnerB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Bellovin96,
  author       = {Steven M. Bellovin},
  title        = {Problem Areas for the {IP} Security Protocols},
  booktitle    = {Proceedings of the 6th {USENIX} Security Symposium, San Jose, CA,
                  USA, July 22-25, 1996},
  publisher    = {{USENIX} Association},
  year         = {1996},
  url          = {https://www.usenix.org/conference/6th-usenix-security-symposium/problem-areas-ip-security-protocols},
  timestamp    = {Mon, 01 Feb 2021 08:43:15 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Bellovin96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc1948,
  author       = {Steven M. Bellovin},
  title        = {Defending Against Sequence Number Attacks},
  journal      = {{RFC}},
  volume       = {1948},
  pages        = {1--6},
  year         = {1996},
  url          = {https://doi.org/10.17487/RFC1948},
  doi          = {10.17487/RFC1948},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc1948.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0076963,
  author       = {William R. Cheswick and
                  Steven M. Bellovin},
  title        = {Firewalls and internet security - repelling the wily hacker},
  series       = {Addison-Wesley professional computing series},
  publisher    = {Addison-Wesley},
  year         = {1995},
  isbn         = {978-0-201-63357-3},
  timestamp    = {Fri, 19 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0076963.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Bellovin95,
  author       = {Steven M. Bellovin},
  editor       = {Frederick M. Avolio and
                  Steven M. Bellovin},
  title        = {Using the Domain Name System for System Break-ins},
  booktitle    = {Proceedings of the 5th {USENIX} Security Symposium, Salt Lake City,
                  Utah, USA, June 5-7, 1995},
  publisher    = {{USENIX} Association},
  year         = {1995},
  url          = {https://www.usenix.org/legacy/publications/library/proceedings/security95/bellovin.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Bellovin95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BlazeB95,
  author       = {Matt Blaze and
                  Steven M. Bellovin},
  editor       = {Frederick M. Avolio and
                  Steven M. Bellovin},
  title        = {Session-Layer Encryption},
  booktitle    = {Proceedings of the 5th {USENIX} Security Symposium, Salt Lake City,
                  Utah, USA, June 5-7, 1995},
  publisher    = {{USENIX} Association},
  year         = {1995},
  url          = {https://www.usenix.org/legacy/publications/library/proceedings/security95/blaze.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BlazeB95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/1995,
  editor       = {Frederick M. Avolio and
                  Steven M. Bellovin},
  title        = {Proceedings of the 5th {USENIX} Security Symposium, Salt Lake City,
                  Utah, USA, June 5-7, 1995},
  publisher    = {{USENIX} Association},
  year         = {1995},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/1995.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/BellovinC94,
  author       = {Steven M. Bellovin and
                  William R. Cheswick},
  title        = {Network firewalls},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {32},
  number       = {9},
  pages        = {50--57},
  year         = {1994},
  url          = {https://doi.org/10.1109/35.312843},
  doi          = {10.1109/35.312843},
  timestamp    = {Wed, 05 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/BellovinC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BellovinM94,
  author       = {Steven M. Bellovin and
                  Michael Merritt},
  title        = {An attack on the Interlock Protocol when used for authentication},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {40},
  number       = {1},
  pages        = {273--275},
  year         = {1994},
  url          = {https://doi.org/10.1109/18.272497},
  doi          = {10.1109/18.272497},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BellovinM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc1579,
  author       = {Steven M. Bellovin},
  title        = {Firewall-Friendly {FTP}},
  journal      = {{RFC}},
  volume       = {1579},
  pages        = {1--4},
  year         = {1994},
  url          = {https://doi.org/10.17487/RFC1579},
  doi          = {10.17487/RFC1579},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc1579.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc1675,
  author       = {Steven M. Bellovin},
  title        = {Security Concerns for IPng},
  journal      = {{RFC}},
  volume       = {1675},
  pages        = {1--4},
  year         = {1994},
  url          = {https://doi.org/10.17487/RFC1675},
  doi          = {10.17487/RFC1675},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc1675.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc1681,
  author       = {Steven M. Bellovin},
  title        = {On Many Addresses per Host},
  journal      = {{RFC}},
  volume       = {1681},
  pages        = {1--5},
  year         = {1994},
  url          = {https://doi.org/10.17487/RFC1681},
  doi          = {10.17487/RFC1681},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc1681.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/Bellovin93,
  author       = {Steven M. Bellovin},
  title        = {Packets found on an internet},
  journal      = {Comput. Commun. Rev.},
  volume       = {23},
  number       = {3},
  pages        = {26--31},
  year         = {1993},
  url          = {https://doi.org/10.1145/174194.174199},
  doi          = {10.1145/174194.174199},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/Bellovin93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BellovinM93,
  author       = {Steven M. Bellovin and
                  Michael Merritt},
  editor       = {Dorothy E. Denning and
                  Raymond Pyle and
                  Ravi Ganesan and
                  Ravi S. Sandhu and
                  Victoria Ashby},
  title        = {Augmented Encrypted Key Exchange: {A} Password-Based Protocol Secure
                  against Dictionary Attacks and Password File Compromise},
  booktitle    = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
                  Communications Security, Fairfax, Virginia, USA, November 3-5, 1993},
  pages        = {244--250},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/168588.168618},
  doi          = {10.1145/168588.168618},
  timestamp    = {Tue, 10 Nov 2020 20:00:40 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BellovinM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BellovinM92,
  author       = {Steven M. Bellovin and
                  Michael Merritt},
  title        = {Encrypted key exchange: password-based protocols secure against dictionary
                  attacks},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {72--84},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213269},
  doi          = {10.1109/RISP.1992.213269},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BellovinM92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/Bellovin92,
  author       = {Steven M. Bellovin},
  title        = {There Be Dragons},
  booktitle    = {{USENIX} Summer 1992 Technical Conference, San Antonio, TX, USA, June
                  8-12, 1992},
  publisher    = {{USENIX} Association},
  year         = {1992},
  url          = {https://www.usenix.org/conference/usenix-summer-1992-technical-conference/there-be-dragons},
  timestamp    = {Mon, 01 Feb 2021 08:43:51 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/Bellovin92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/BellovinM91,
  author       = {Steven M. Bellovin and
                  Michael Merritt},
  title        = {Limitations of the Kerberos Authentication System},
  booktitle    = {Proceedings of the Usenix Winter 1991 Conference, Dallas, TX, USA,
                  January 1991},
  pages        = {253--268},
  publisher    = {{USENIX} Association},
  year         = {1991},
  timestamp    = {Thu, 15 May 2014 18:36:23 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/BellovinM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/BellovinM90,
  author       = {Steven M. Bellovin and
                  Michael Merritt},
  title        = {Limitations of the Kerberos authentication system},
  journal      = {Comput. Commun. Rev.},
  volume       = {20},
  number       = {5},
  pages        = {119--132},
  year         = {1990},
  url          = {https://doi.org/10.1145/381906.381946},
  doi          = {10.1145/381906.381946},
  timestamp    = {Wed, 21 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/BellovinM90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/Bellovin89,
  author       = {Steven M. Bellovin},
  title        = {Security problems in the {TCP/IP} protocol suite},
  journal      = {Comput. Commun. Rev.},
  volume       = {19},
  number       = {2},
  pages        = {32--48},
  year         = {1989},
  url          = {https://doi.org/10.1145/378444.378449},
  doi          = {10.1145/378444.378449},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/Bellovin89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/HoneymanB86,
  author       = {Peter Honeyman and
                  Steven M. Bellovin},
  title        = {{PATHALIAS} or The Care and Feeding of Relative Addresses},
  booktitle    = {Proceedings of the {USENIX} Summer Conference, Altanta, GA, USA, June
                  1986},
  pages        = {126--141},
  publisher    = {{USENIX} Association},
  year         = {1986},
  timestamp    = {Thu, 15 May 2014 18:36:23 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/HoneymanB86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}