Year |
Citation |
Score |
2016 |
Bellovin SM, Landau S, Lin HS. Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications Journal of Cybersecurity. 3: 59-68. DOI: 10.2139/Ssrn.2809463 |
0.356 |
|
2016 |
Bellovin SM, Blaze M, Landau S. Insecure Surveillance: Technical Issues with Remote Computer Searches Computer. 49: 14-24. DOI: 10.1109/Mc.2016.68 |
0.394 |
|
2015 |
Abelson H, Anderson R, Bellovin SM, Benaloh J, Blaze M, Diffie W, Gilmore J, Green M, Landau S, Neumann PG, Rivest RL, Schiller JI, Schneier B, Specter MA, Weitzner DJ. Inside risks: Keys under doormats Communications of the Acm. 58: 24-26. DOI: 10.1145/2814825 |
0.371 |
|
2015 |
Abelson H, Anderson R, Bellovin SM, Benaloh J, Blaze M, Diffie W, Gilmore J, Green M, Landau S, Neumann PG, Rivest RL, Schiller JI, Schneier B, Specter MA, Weitzner DJ. Keys under doormats: mandating insecurity by requiring government access to all data and communications Journal of Cybersecurity. 1: 69-79. DOI: 10.1093/Cybsec/Tyv009 |
0.438 |
|
2013 |
Bellovin SM, Blaze M, Clark S, Landau S. Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet Northwestern Journal of Technology and Intellectual Property. 12: 1. DOI: 10.2139/Ssrn.2312107 |
0.404 |
|
2013 |
Bellovin SM, Blaze M, Clark S, Landau S. Going bright: Wiretapping without weakening communications infrastructure Ieee Security and Privacy. 11: 62-72. DOI: 10.1109/MSP.2012.138 |
0.31 |
|
2012 |
Madejski M, Johnson M, Bellovin SM. A study of privacy settings errors in an online social network 2012 Ieee International Conference On Pervasive Computing and Communications Workshops, Percom Workshops 2012. 340-345. DOI: 10.1109/PerComW.2012.6197507 |
0.306 |
|
2012 |
Raykova M, Cui A, Vo B, Liu B, Malkin T, Bellovin SM, Stolfo SJ. Usable, secure, private search Ieee Security and Privacy. 10: 53-60. DOI: 10.1109/MSP.2011.155 |
0.313 |
|
2010 |
Androulaki E, Vo B, Bellovin S. Privacy-preserving, taxable bank accounts Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6345: 37-54. DOI: 10.1007/978-3-642-15497-3_3 |
0.69 |
|
2010 |
Androulaki E, Bellovin SM. A secure and privacy-preserving targeted ad-system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6054: 123-135. DOI: 10.1007/978-3-642-14992-4_12 |
0.673 |
|
2009 |
Johnson ML, Bellovin SM, Reeder RW, Schechter SE. Laissez-faire file sharing: Access control designed for individuals at the endpoints Proceedings New Security Paradigms Workshop. 1-9. DOI: 10.1145/1719030.1719032 |
0.311 |
|
2009 |
Raykova M, Vo B, Bellovin SM, Malkin T. Secure anonymous database search Proceedings of the Acm Conference On Computer and Communications Security. 115-126. DOI: 10.1145/1655008.1655025 |
0.328 |
|
2009 |
Alexander S, Cheng YH, Coan B, Ghetie A, Kaul V, Siegell B, Bellovin S, Maxemchuk NF, Schulzrinne H, Schwab S, Stavrou A, Smith JM. The dynamic community of interest and its realization in ZODIAC Ieee Communications Magazine. 47: 40-47. DOI: 10.1109/Mcom.2009.5273807 |
0.328 |
|
2009 |
Bellovin S, Bush R. Configuration management and security Ieee Journal On Selected Areas in Communications. 27: 268-274. DOI: 10.1109/Jsac.2009.090403 |
0.356 |
|
2009 |
Androulaki E, Bellovin S. An anonymous credit card system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5695: 42-51. DOI: 10.1007/978-3-642-03748-1_5 |
0.692 |
|
2009 |
Androulaki E, Bellovin S. APOD: Anonymous physical object delivery Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5672: 202-215. DOI: 10.1007/978-3-642-03168-7_12 |
0.655 |
|
2008 |
Bellovin S. Security by checklist Ieee Security and Privacy. 6: 88. DOI: 10.1109/MSP.2008.43 |
0.319 |
|
2008 |
Bellovin SM. The puzzle of privacy Ieee Security and Privacy. 6: 88. DOI: 10.1109/MSP.2008.129 |
0.31 |
|
2008 |
Androulaki E, Raykova M, Srivatsan S, Stavrou A, Bellovin SM. PAR: Payment for Anonymous Routing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5134: 219-236. DOI: 10.1007/978-3-540-70630-4_14 |
0.638 |
|
2008 |
Androulaki E, Choi SG, Bellovin SM, Malkin T. Reputation systems for anonymous networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5134: 202-218. DOI: 10.1007/978-3-540-70630-4_13 |
0.68 |
|
2007 |
Ioannidis S, Bellovin SM, Ioannidis J, Keromytis AD, Anagnostakis K, Smith JM. Virtual private services: Coordinated policy enforcement for distributed applications International Journal of Network Security. 4: 69-80. DOI: 10.6633/Ijns.200701.4(1).08 |
0.337 |
|
2005 |
Bellovin SM, Blaze M, Landau S. The real national-security needs for VolP Communications of the Acm. 48: 120. DOI: 10.1145/1096000.1096030 |
0.414 |
|
2004 |
Aiello W, Bellovin SM, Blaze M, Canetti R, Ioannidis J, Keromytis AD, Reingold O. Just fast keying: Key agreement in a hostile internet Acm Transactions On Information and System Security. 7: 242-273. DOI: 10.1145/996943.996946 |
0.395 |
|
2004 |
Bellovin SM. Spamming, phishing, authentication, and privacy Communications of the Acm. 47: 144. DOI: 10.1145/1035134.1035159 |
0.352 |
|
1999 |
Schneider FB, Bellovin SM, Inouye AS. Building trustworthy systems: Lessons from the PTN and Internet Ieee Internet Computing. 3: 64-72. DOI: 10.1109/4236.807013 |
0.359 |
|
1998 |
Bellovin SM. Cryptography and the internet Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1462: 46-55. DOI: 10.1007/BFb0055719 |
0.31 |
|
1997 |
Abelson H, Anderson R, Bellovin SM, Benalob J, Blaze M, Diffie W, Gilmore J, Neumann PG, Rivest RL, Schiller JI, Schneier B. The risks of key recovery, key escrow, and trusted third-party encryption World Wide Web. 2: 241-257. DOI: 10.7916/D8Gm8F2W |
0.356 |
|
1996 |
Bellovin SM. Security and uses of the internet Serials Librarian. 28: 105-113. DOI: 10.1300/J123V28N01_11 |
0.407 |
|
1994 |
Bellovin SM, Cheswick WR. Network Firewalls Ieee Communications Magazine. 32: 50-57. DOI: 10.1109/35.312843 |
0.395 |
|
1993 |
Bellovin SM, Merritt M. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise 1st Acm Conference On Computer and Communications Security. 244-250. |
0.337 |
|
1992 |
Bellovin SM, Merritt M. Encrypted key exchange: Password-based protocols secure against dictionary attacks Proceedings of the Symposium On Security and Privacy. 72-84. |
0.34 |
|
Show low-probability matches. |