Steven M. Bellovin - Publications

Affiliations: 
Computer Science Columbia University, New York, NY 
Area:
Security, Networks, Privacy, Public Policy

31 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2016 Bellovin SM, Landau S, Lin HS. Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications Journal of Cybersecurity. 3: 59-68. DOI: 10.2139/Ssrn.2809463  0.356
2016 Bellovin SM, Blaze M, Landau S. Insecure Surveillance: Technical Issues with Remote Computer Searches Computer. 49: 14-24. DOI: 10.1109/Mc.2016.68  0.394
2015 Abelson H, Anderson R, Bellovin SM, Benaloh J, Blaze M, Diffie W, Gilmore J, Green M, Landau S, Neumann PG, Rivest RL, Schiller JI, Schneier B, Specter MA, Weitzner DJ. Inside risks: Keys under doormats Communications of the Acm. 58: 24-26. DOI: 10.1145/2814825  0.371
2015 Abelson H, Anderson R, Bellovin SM, Benaloh J, Blaze M, Diffie W, Gilmore J, Green M, Landau S, Neumann PG, Rivest RL, Schiller JI, Schneier B, Specter MA, Weitzner DJ. Keys under doormats: mandating insecurity by requiring government access to all data and communications Journal of Cybersecurity. 1: 69-79. DOI: 10.1093/Cybsec/Tyv009  0.438
2013 Bellovin SM, Blaze M, Clark S, Landau S. Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet Northwestern Journal of Technology and Intellectual Property. 12: 1. DOI: 10.2139/Ssrn.2312107  0.404
2013 Bellovin SM, Blaze M, Clark S, Landau S. Going bright: Wiretapping without weakening communications infrastructure Ieee Security and Privacy. 11: 62-72. DOI: 10.1109/MSP.2012.138  0.31
2012 Madejski M, Johnson M, Bellovin SM. A study of privacy settings errors in an online social network 2012 Ieee International Conference On Pervasive Computing and Communications Workshops, Percom Workshops 2012. 340-345. DOI: 10.1109/PerComW.2012.6197507  0.306
2012 Raykova M, Cui A, Vo B, Liu B, Malkin T, Bellovin SM, Stolfo SJ. Usable, secure, private search Ieee Security and Privacy. 10: 53-60. DOI: 10.1109/MSP.2011.155  0.313
2010 Androulaki E, Vo B, Bellovin S. Privacy-preserving, taxable bank accounts Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6345: 37-54. DOI: 10.1007/978-3-642-15497-3_3  0.69
2010 Androulaki E, Bellovin SM. A secure and privacy-preserving targeted ad-system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6054: 123-135. DOI: 10.1007/978-3-642-14992-4_12  0.673
2009 Johnson ML, Bellovin SM, Reeder RW, Schechter SE. Laissez-faire file sharing: Access control designed for individuals at the endpoints Proceedings New Security Paradigms Workshop. 1-9. DOI: 10.1145/1719030.1719032  0.311
2009 Raykova M, Vo B, Bellovin SM, Malkin T. Secure anonymous database search Proceedings of the Acm Conference On Computer and Communications Security. 115-126. DOI: 10.1145/1655008.1655025  0.328
2009 Alexander S, Cheng YH, Coan B, Ghetie A, Kaul V, Siegell B, Bellovin S, Maxemchuk NF, Schulzrinne H, Schwab S, Stavrou A, Smith JM. The dynamic community of interest and its realization in ZODIAC Ieee Communications Magazine. 47: 40-47. DOI: 10.1109/Mcom.2009.5273807  0.328
2009 Bellovin S, Bush R. Configuration management and security Ieee Journal On Selected Areas in Communications. 27: 268-274. DOI: 10.1109/Jsac.2009.090403  0.356
2009 Androulaki E, Bellovin S. An anonymous credit card system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5695: 42-51. DOI: 10.1007/978-3-642-03748-1_5  0.692
2009 Androulaki E, Bellovin S. APOD: Anonymous physical object delivery Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5672: 202-215. DOI: 10.1007/978-3-642-03168-7_12  0.655
2008 Bellovin S. Security by checklist Ieee Security and Privacy. 6: 88. DOI: 10.1109/MSP.2008.43  0.319
2008 Bellovin SM. The puzzle of privacy Ieee Security and Privacy. 6: 88. DOI: 10.1109/MSP.2008.129  0.31
2008 Androulaki E, Raykova M, Srivatsan S, Stavrou A, Bellovin SM. PAR: Payment for Anonymous Routing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5134: 219-236. DOI: 10.1007/978-3-540-70630-4_14  0.638
2008 Androulaki E, Choi SG, Bellovin SM, Malkin T. Reputation systems for anonymous networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5134: 202-218. DOI: 10.1007/978-3-540-70630-4_13  0.68
2007 Ioannidis S, Bellovin SM, Ioannidis J, Keromytis AD, Anagnostakis K, Smith JM. Virtual private services: Coordinated policy enforcement for distributed applications International Journal of Network Security. 4: 69-80. DOI: 10.6633/Ijns.200701.4(1).08  0.337
2005 Bellovin SM, Blaze M, Landau S. The real national-security needs for VolP Communications of the Acm. 48: 120. DOI: 10.1145/1096000.1096030  0.414
2004 Aiello W, Bellovin SM, Blaze M, Canetti R, Ioannidis J, Keromytis AD, Reingold O. Just fast keying: Key agreement in a hostile internet Acm Transactions On Information and System Security. 7: 242-273. DOI: 10.1145/996943.996946  0.395
2004 Bellovin SM. Spamming, phishing, authentication, and privacy Communications of the Acm. 47: 144. DOI: 10.1145/1035134.1035159  0.352
1999 Schneider FB, Bellovin SM, Inouye AS. Building trustworthy systems: Lessons from the PTN and Internet Ieee Internet Computing. 3: 64-72. DOI: 10.1109/4236.807013  0.359
1998 Bellovin SM. Cryptography and the internet Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1462: 46-55. DOI: 10.1007/BFb0055719  0.31
1997 Abelson H, Anderson R, Bellovin SM, Benalob J, Blaze M, Diffie W, Gilmore J, Neumann PG, Rivest RL, Schiller JI, Schneier B. The risks of key recovery, key escrow, and trusted third-party encryption World Wide Web. 2: 241-257. DOI: 10.7916/D8Gm8F2W  0.356
1996 Bellovin SM. Security and uses of the internet Serials Librarian. 28: 105-113. DOI: 10.1300/J123V28N01_11  0.407
1994 Bellovin SM, Cheswick WR. Network Firewalls Ieee Communications Magazine. 32: 50-57. DOI: 10.1109/35.312843  0.395
1993 Bellovin SM, Merritt M. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise 1st Acm Conference On Computer and Communications Security. 244-250.  0.337
1992 Bellovin SM, Merritt M. Encrypted key exchange: Password-based protocols secure against dictionary attacks Proceedings of the Symposium On Security and Privacy. 72-84.  0.34
Show low-probability matches.