


Остановите войну!
for scientists:


default search action
Sean W. Smith
Person information

- affiliation: Dartmouth College, Hanover, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [c98]Sameed Ali, Sean W. Smith:
A Secure Parser Generation Framework for IoT Protocols on Microcontrollers. SP Workshops 2022: 124-135 - [c97]Vijay H. Kothari, Prashant Anantharaman, Sean W. Smith, Briland Hitaj
, Prashanth Mundkur, Natarajan Shankar, Letitia W. Li, Iavor Diatchki, William Harris:
Capturing the iccMAX calculatorElement: A Case Study on Format Design. SP Workshops 2022: 176-197 - 2021
- [j40]Sameed Ali, Prashant Anantharaman, Zephyr Lucas, Sean W. Smith
:
What We Have Here Is Failure to Validate: Summer of LangSec. IEEE Secur. Priv. 19(3): 17-23 (2021) - [c96]Prashant Anantharaman, Anmol Chachra, Shikhar Sinha, Michael C. Millian, Bogdan Copos, Sean W. Smith, Michael E. Locasto:
A Communications Validity Detector for SCADA Networks. Critical Infrastructure Protection 2021: 155-183 - [c95]Zephyr S. Lucas, Joanna Y. Liu, Prashant Anantharaman, Sean W. Smith:
Research Report: Parsing PEGs with Length Fields in Software and Hardware. SP Workshops 2021: 128-133 - 2020
- [j39]Sean W. Smith
:
Securing the Internet of Things: An Ongoing Challenge. Computer 53(6): 62-66 (2020) - [c94]Ira Ray Jenkins, Sean W. Smith:
Distributed IoT Attestation via Blockchain. CCGRID 2020: 798-801 - [c93]Niveta Ramkumar, Vijay H. Kothari, Caitlin Mills, Ross Koppel, Jim Blythe, Sean W. Smith, Andrew L. Kun:
Eyes on URLs: Relating Visual Behavior to Safety Decisions. ETRA 2020: 19:1-19:10 - [c92]Ira Ray Jenkins, Prashant Anantharaman, Rebecca Shapiro, J. Peter Brady, Sergey Bratus, Sean W. Smith:
Ghostbusting: mitigating spectre with intraprocess memory isolation. HotSoS 2020: 10:1-10:11 - [c91]Sameed Ali, Prashant Anantharaman, Sean W. Smith:
Armor Within: Defending Against Vulnerabilities in Third-Party Libraries. SP Workshops 2020: 291-299 - [c90]Prashanth Mundkur, Linda Briesemeister, Natarajan Shankar, Prashant Anantharaman, Sameed Ali, Zephyr Lucas, Sean W. Smith:
Research Report: The Parsley Data Format Definition Language. SP Workshops 2020: 300-307
2010 – 2019
- 2019
- [j38]Paul C. van Oorschot
, Sean W. Smith:
The Internet of Things: Security Challenges. IEEE Secur. Priv. 17(5): 7-9 (2019) - [c89]Michael C. Millian, Prashant Anantharaman, Sergey Bratus, Sean W. Smith, Michael E. Locasto:
Converting an Electric Power Utility Network to Defend Against Crafted Inputs. Critical Infrastructure Protection 2019: 73-85 - [c88]J. Peter Brady, Sergey Bratus, Sean W. Smith:
Dynamic Repair of Mission-Critical Applications with Runtime Snap-Ins. Critical Infrastructure Protection 2019: 235-252 - [c87]Prashant Anantharaman, Kartik Palani, Sean W. Smith:
Scalable Identity and Key Management for Publish-Subscribe Protocols in the Internet-of-Things. IOT 2019: 12:1-12:7 - [c86]Prashant Anantharaman, Vijay H. Kothari, J. Peter Brady, Ira Ray Jenkins, Sameed Ali, Michael C. Millian, Ross Koppel, Jim Blythe, Sergey Bratus, Sean W. Smith:
Mismorphism: The Heart of the Weird Machine. Security Protocols Workshop 2019: 113-124 - [c85]Vijay H. Kothari, Prashant Anantharaman, Ira Ray Jenkins, Michael C. Millian, J. Peter Brady, Sameed Ali, Sergey Bratus, Jim Blythe, Ross Koppel, Sean W. Smith:
Human-Computability Boundaries. Security Protocols Workshop 2019: 157-166 - 2018
- [c84]Ira Ray Jenkins, Sergey Bratus, Sean W. Smith, Maxwell Koo:
Reinventing the privilege drop: how principled preservation of programmer intent would prevent security bugs. HotSoS 2018: 3:1-3:9 - [c83]Prashant Anantharaman, J. Peter Brady
, Patrick Flathers, Vijay H. Kothari, Michael C. Millian, Jason Reeves, Nathan Reitinger, William G. Nisen, Sean W. Smith:
Going Dark: A Retrospective on the North American Blackout of 2038. NSPW 2018: 52-63 - [c82]Prashant Anantharaman, Kartik Palani, Rafael Brantley, Galen Brown, Sergey Bratus, Sean W. Smith:
PhasorSec: Protocol Security Filters for Wide Area Measurement Systems. SmartGridComm 2018: 1-6 - 2017
- [c81]Peter C. Johnson, Sergey Bratus, Sean W. Smith:
Protecting Against Malicious Bits On the Wire: Automatically Generating a USB Protocol Parser for a Production Kernel. ACSAC 2017: 528-541 - [c80]Christopher Novak, Jim Blythe, Ross Koppel, Vijay H. Kothari, Sean W. Smith:
Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques. SOUPS 2017 - 2016
- [c79]Bruno Korbar, Jim Blythe, Ross Koppel, Vijay H. Kothari, Sean W. Smith:
Validating an Agent-Based Model of Human Password Behavior. AAAI Workshop: Artificial Intelligence for Cyber Security 2016 - [c78]Sergey Bratus, J. Adam Crain, Sven M. Hallberg
, Daniel P. Hirsch, Meredith L. Patterson, Maxwell Koo, Sean W. Smith:
Implementing a vertically hardened DNP3 control stack for power applications. ICSS 2016: 45-53 - [c77]Prashant Anantharaman, Kartik Palani, David M. Nicol, Sean W. Smith:
I Am Joe's Fridge: Scalable Identity in the Internet of Things. iThings/GreenCom/CPSCom/SmartData 2016: 129-135 - [c76]Kartik Palani, Emily Holt, Sean W. Smith:
Invisible and forgotten: Zero-day blooms in the IoT. PerCom Workshops 2016: 1-6 - [c75]Ross Koppel, Jim Blythe, Vijay H. Kothari, Sean W. Smith:
Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users. WSF@SOUPS 2016 - 2015
- [j37]Sean W. Smith, John S. Erickson
:
Never Mind Pearl Harbor-What about a Cyber Love Canal? IEEE Secur. Priv. 13(2): 94-98 (2015) - [c74]Sean W. Smith, Ross Koppel, Jim Blythe, Vijay H. Kothari:
Mismorphism: a Semiotic Model of Computer Security Circumvention. HAISA 2015: 172-182 - [c73]Vijay H. Kothari, Jim Blythe, Sean W. Smith, Ross Koppel
:
Measuring the security impacts of password policies using cognitive behavioral agent-based modeling. HotSoS 2015: 13:1-13:9 - [c72]Sean W. Smith, Ross Koppel
, Jim Blythe, Vijay H. Kothari:
Mismorphism: a semiotic model of computer security circumvention (poster abstract). HotSoS 2015: 25:1-25:2 - [c71]Ross Koppel
, Sean W. Smith, Jim Blythe, Vijay H. Kothari:
Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient? ITCH 2015: 215-220 - [c70]Jason Reeves, Sean W. Smith:
Solving the Grid Defender's Dilemma: Tamper Protection for Distributed Cyber-Physical Systems. SECRYPT 2015: 309-316 - 2014
- [j36]Sean W. Smith, Ross Koppel
:
Healthcare information technology's relativity problems: a typology of how patients' physical reality, clinicians' mental models, and healthcare information technology differ. J. Am. Medical Informatics Assoc. 21(1): 117-131 (2014) - 2013
- [j35]Jim Blythe, Ross Koppel
, Sean W. Smith:
Circumvention of Security: Good Users Do Bad Things. IEEE Secur. Priv. 11(5): 80-83 (2013) - [j34]Denise L. Anthony, Andrew T. Campbell, Thomas Candon, Andrew Gettinger, David Kotz
, Lisa A. Marsch
, Andres Molina-Markham, Karen Page, Sean W. Smith, Carl A. Gunter, M. Eric Johnson:
Securing Information Technology in Healthcare. IEEE Secur. Priv. 11(6): 25-33 (2013) - [j33]Joseph Cooley, Sean W. Smith:
Privacy-preserving screen capture: Towards closing the loop for health IT usability. J. Biomed. Informatics 46(4): 721-733 (2013) - [c69]Samuel Tan, Rebecca Shapiro, Sean W. Smith:
Electronic Prescription for Controlled Substances: A Cybersecurity Perspective. HealthTech 2013 - [c68]Julian Bangert, Sergey Bratus, Rebecca Shapiro, Sean W. Smith:
The Page-Fault Weird Machine: Lessons in Instruction-less Computation. WOOT 2013 - [c67]Rebecca Shapiro, Sergey Bratus, Sean W. Smith:
"Weird Machines" in ELF: A Spotlight on the Underappreciated Metadata. WOOT 2013 - 2012
- [j32]Sean W. Smith:
Security and Cognitive Bias: Exploring the Role of the Mind. IEEE Secur. Priv. 10(5): 75-78 (2012) - [j31]Jason Reeves, Ashwin Ramaswamy, Michael E. Locasto, Sergey Bratus, Sean W. Smith:
Intrusion detection for resource-constrained embedded control systems in the power grid. Int. J. Crit. Infrastructure Prot. 5(2): 74-83 (2012) - [c66]Travis Goodspeed, Sergey Bratus, Ricky Melgares, Ryan Speers, Sean W. Smith:
Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters. HICSS 2012: 2133-2140 - [c65]Sean W. Smith:
Cryptographic scalability challenges in the smart grid (extended abstract). ISGT 2012: 1-3 - [c64]Gabriel A. Weaver, Sean W. Smith:
XUTools: Unix Commands for Processing Next-Generation Structured Text. LISA 2012: 83-99 - [c63]Yifei Wang, Sean W. Smith, Andrew Gettinger:
Access Control Hygiene and the Empathy Gap in Medical IT. HealthSec 2012 - 2011
- [j30]Sean W. Smith:
Room at the Bottom: Authenticated Encryption on Slow Legacy Networks. IEEE Secur. Priv. 9(4): 60-63 (2011) - [j29]Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sean W. Smith:
Nymble: Blocking Misbehaving Users in Anonymizing Networks. IEEE Trans. Dependable Secur. Comput. 8(2): 256-269 (2011) - [c62]Jason Reeves, Ashwin Ramaswamy, Michael E. Locasto, Sergey Bratus, Sean W. Smith:
Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems. Critical Infrastructure Protection 2011: 31-46 - [c61]Rebecca Shapiro, Sergey Bratus, Edmond Rogers, Sean W. Smith:
Identifying Vulnerabilities in SCADA Systems via Fuzz-Testing. Critical Infrastructure Protection 2011: 57-72 - [c60]Gabriel A. Weaver, Nicholas J. Foti, Sergey Bratus, Daniel N. Rockmore, Sean W. Smith:
Using Hierarchical Change Mining to Manage Network Security Policy Evolution. Hot-ICE 2011 - [r6]Sean W. Smith:
Attestation. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 50-51 - [r5]Sean W. Smith:
Dynamic Root of Trust. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 368-369 - [r4]Sean W. Smith:
Logic Bomb. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 734 - [r3]Sean W. Smith:
Secure Coprocessor. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1102-1103 - [r2]Sean W. Smith:
Tamper Evidence. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1277-1278 - [r1]Sean W. Smith:
Zeroization. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1401 - 2010
- [j28]Sara Sinclair, Sean W. Smith:
What's Wrong with Access Control in the Real World? IEEE Secur. Priv. 8(4): 74-77 (2010) - [j27]Sergey Bratus, James Oakley, Ashwin Ramaswamy, Sean W. Smith, Michael E. Locasto:
Katana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader Toolchain. Int. J. Secur. Softw. Eng. 1(3): 1-17 (2010) - [j26]Massimiliano Pala, Sean W. Smith:
Finding the PKI needles in the Internet haystack. J. Comput. Secur. 18(3): 397-420 (2010) - [j25]Patrick P. Tsang, Man Ho Au
, Apu Kapadia, Sean W. Smith:
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs. ACM Trans. Inf. Syst. Secur. 13(4): 39:1-39:33 (2010) - [c59]Ashwin Ramaswamy, Sergey Bratus, Sean W. Smith, Michael E. Locasto:
Katana: A Hot Patching Framework for ELF Executables. ARES 2010: 507-512 - [c58]Alexander Iliev, Sean W. Smith:
Small, stupid, and scalable: secure computing with faerieplay. STC@CCS 2010: 41-52 - [c57]Katelin A. Bailey, Sean W. Smith:
Trusted virtual containers on demand. STC@CCS 2010: 63-72 - [c56]Anna Shubina, Sergey Bratus, Wyllys Ingersol, Sean W. Smith:
The diversity of TPMs and its effects on development: a case study of integrating the TPM into OpenSolaris. STC@CCS 2010: 85-90 - [c55]Massimiliano Pala, Sara Sinclair, Sean W. Smith:
PorKI: Portable PKI Credentials via Proxy Certificates. EuroPKI 2010: 1-16 - [c54]Gabriel A. Weaver, Scott A. Rea, Sean W. Smith:
Computational techniques for increasing PKI policy comprehension by human analysts. IDtrust 2010: 51-62 - [c53]Rouslan Solomakhin, Patrick P. Tsang, Sean W. Smith:
High Security with Low Latency in Legacy SCADA Systems. Critical Infrastructure Protection 2010: 63-79 - [c52]Sergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith:
VM-based security overkill: a lament for applied systems security research. NSPW 2010: 51-60 - [c51]Joseph Cooley, Sean W. Smith:
Dr. Jekyll or Mr. Hyde: Information Security in the Ecosystem of Healthcare. HealthSec 2010 - [e2]Alessandro Acquisti, Sean W. Smith, Ahmad-Reza Sadeghi:
Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings. Lecture Notes in Computer Science 6101, Springer 2010, ISBN 978-3-642-13868-3 [contents]
2000 – 2009
- 2009
- [j24]Massimiliano Pala, Shreyas Cholia
, Scott A. Rea, Sean W. Smith:
Interoperable PKI Data Distribution in Computational Grids. Int. J. Grid High Perform. Comput. 1(2): 56-73 (2009) - [c50]Sergey Bratus, Peter C. Johnson, Ashwin Ramaswamy, Sean W. Smith, Michael E. Locasto:
The cake is a lie: privilege rings as a policy resource. VMSec@CCS 2009: 33-38 - [c49]Gabriel A. Weaver, Scott A. Rea, Sean W. Smith:
A Computational Framework for Certificate Policy Operations. EuroPKI 2009: 17-33 - [c48]Chris Masone, Sean W. Smith:
ABUSE: PKI for Real-World Email Trust. EuroPKI 2009: 146-162 - [c47]Stephanie Trudeau, Sara Sinclair, Sean W. Smith:
The effects of introspection on creating privacy policy. WPES 2009: 1-10 - 2008
- [b2]Sean W. Smith, John Marchesini:
The Craft of System Security. Addison-Wesley 2008, ISBN 978-0-321-43483-8 - [j23]Sergey Bratus, Chris Masone, Sean W. Smith:
Why Do Street-Smart People Do Stupid Things Online? IEEE Secur. Priv. 6(3): 71-74 (2008) - [j22]Samuel T. King, Sean W. Smith:
Virtualization and Security: Back to the Future. IEEE Secur. Priv. 6(5): 15 (2008) - [c46]Patrick P. Tsang, Sean W. Smith:
PPAA: Peer-to-Peer Anonymous Authentication. ACNS 2008: 55-74 - [c45]Massimiliano Pala, Shreyas Cholia
, Scott A. Rea, Sean W. Smith:
Extending PKI Interoperability in Computational Grids. CCGRID 2008: 645-650 - [c44]Sergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith:
Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security. VMSec 2008: 49-58 - [c43]Patrick P. Tsang, Man Ho Au
, Apu Kapadia, Sean W. Smith:
PEREA: towards practical TTP-free revocation in anonymous authentication. CCS 2008: 333-344 - [c42]Massimiliano Pala, Sean W. Smith:
PEACHES and Peers. EuroPKI 2008: 223-238 - [c41]Patrick P. Tsang, Sean W. Smith:
Secure Cryptographic Precomputation with Insecure Memory. ISPEC 2008: 146-160 - [c40]Patrick P. Tsang, Sean W. Smith:
Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers. ISPEC 2008: 188-202 - [c39]Patrick P. Tsang, Sean W. Smith:
YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems. SEC 2008: 445-459 - [c38]Sergey Bratus, Nihal D'Cunha, Evan R. Sparks, Sean W. Smith:
TOCTOU, Traps, and Trusted Computing. TRUST 2008: 14-32 - [c37]Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith:
TwoKind authentication: protecting private information in untrustworthy environments. WPES 2008: 39-44 - [p1]Sara Sinclair, Sean W. Smith:
Preventative Directions For Insider Threat Mitigation Via Access Control. Insider Attack and Cyber Security 2008: 165-194 - [e1]Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair:
Insider Attack and Cyber Security - Beyond the Hacker. Advances in Information Security 39, Springer 2008, ISBN 978-0-387-77321-6 [contents] - 2007
- [j21]Christopher Masone, Sean W. Smith:
Towards usefully secure email. IEEE Technol. Soc. Mag. 26(1): 25-34 (2007) - [c36]Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W. Smith:
Pastures: Towards Usable Security Policy Engineering. ARES 2007: 1052-1059 - [c35]Patrick P. Tsang, Man Ho Au
, Apu Kapadia, Sean W. Smith:
Blacklistable anonymous credentials: blocking misbehaving users without ttps. CCS 2007: 72-81 - [c34]Massimiliano Pala, Sean W. Smith:
AutoPKI: A PKI Resources Discovery System. EuroPKI 2007: 154-169 - [c33]Chris Masone, Kwang-Hyun Baek, Sean W. Smith:
WSKE: Web Server Key Enabled Cookies. Financial Cryptography 2007: 294-306 - [c32]Sara Sinclair, Sean W. Smith, Stephanie Trudeau, M. Eric Johnson, Anthony Portera:
Information Risk in Financial Institutions: Field Study and Research Roadmap. FinanceCom 2007: 165-180 - [c31]Patrick P. Tsang, Sherman S. M. Chow
, Sean W. Smith:
Batch Pairing Delegation. IWSEC 2007: 74-90 - [c30]Apu Kapadia, Patrick P. Tsang, Sean W. Smith:
Attribute-Based Publishing with Hidden Credentials and Hidden Policies. NDSS 2007 - [c29]Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, Sean W. Smith:
Nymble: Anonymous IP-Address Blocking. Privacy Enhancing Technologies 2007: 113-133 - [c28]Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith:
TwoKind authentication: usable authenticators for untrustworthy environments. SOUPS 2007: 169-170 - 2006
- [j20]Gabriel Vanrenen, Sean W. Smith, John Marchesini:
Distributing security-mediated PKI. Int. J. Inf. Sec. 5(1): 3-17 (2006) - [c27]Meiyuan Zhao, Sean W. Smith:
Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI. EuroPKI 2006: 16-30 - 2005
- [b1]Sean W. Smith:
Trusted Computing Platforms - Design and Applications. Springer 2005, ISBN 978-0-387-23916-3, pp. I-XX, 1-239 - [j19]John Marchesini, Sean W. Smith, Meiyuan Zhao:
Keyjacking: the surprising insecurity of client-side SSL. Comput. Secur. 24(2): 109-123 (2005) - [j18]Alexander Iliev, Sean W. Smith:
Protecting Client Privacy with Trusted Computing at the Server. IEEE Secur. Priv. 3(2): 20-28 (2005) - [j17]Sean W. Smith:
Turing is from Mars, Shannon is from Venus: Computer Science and Computer Engineering. IEEE Secur. Priv. 3(2): 66-69 (2005) - [j16]Sara Sinclair, Sean W. Smith:
The TIPPI Point: Toward Trustworthy Interfaces. IEEE Secur. Priv. 3(4): 68-71 (2005) - [j15]Sean W. Smith:
Pretending that Systems Are Secure. IEEE Secur. Priv. 3(6): 73-76 (2005) - [j14]Meiyuan Zhao, Sean W. Smith, David M. Nicol:
The performance impact of BGP security. IEEE Netw. 19(6): 42-48 (2005) - [j13]Zishuang (Eileen) Ye, Sean W. Smith, Denise L. Anthony
:
Trusted paths for browsers. ACM Trans. Inf. Syst. Secur. 8(2): 153-186 (2005) - [c26]Sara Sinclair, Sean W. Smith:
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness. ACSAC 2005: 419-430 - [c25]Meiyuan Zhao, Sean W. Smith, David M. Nicol:
Aggregated path authentication for efficient BGP security. CCS 2005: 128-138 - [c24]John Marchesini, Sean W. Smith:
Modeling Public Key Infrastructures in the Real World. EuroPKI 2005: 118-134 - [c23]Mark Franklin, Kevin Mitcham, Sean W. Smith, Joshua Stabiner, Omen Wild:
CA-in-a-Box. EuroPKI 2005: 180-190 - [c22]James E. Dobson
, Jeffrey B. Woodward, Susan A. Schwarz, John Marchesini, Hany Farid, Sean W. Smith:
The Dartmouth Green Grid. International Conference on Computational Science (2) 2005: 99-106 - [c21]John Marchesini, Sean W. Smith:
SHEMP: Secure Hardware Enhanced MyProxy. PST 2005 - 2004
- [j12]Sean W. Smith:
Magic Boxes and Boots: Security in Hardware. Computer 37(10): 106-109 (2004) - [j11]Sean W. Smith, Eugene H. Spafford
:
Grand Challenges in Information Security: Process and Output. IEEE Secur. Priv. 2(1): 69-71 (2004) - [j10]Sean W. Smith:
Outbound authentication for programmable secure coprocessors. Int. J. Inf. Sec. 3(1): 28-41 (2004) - [j9]David M. Nicol, Sean W. Smith, Meiyuan Zhao:
Evaluation of efficient security for BGP route announcements using parallel simulation. Simul. Model. Pract. Theory 12(3-4): 187-216 (2004) - [c20]John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian:
Open-Source Applications of TCPA Hardware. ACSAC 2004: 294-303 - [c19]Yasir Ali, Sean W. Smith:
Flexible and Scalable Public Key Security for SSH. EuroPKI 2004: 43-56 - [c18]Gabriel Vanrenen, Sean W. Smith:
Distributing Security-Mediated PKI. EuroPKI 2004: 218-231 - [c17]