Clay Shields - Publications

Affiliations: 
Purdue University, West Lafayette, IN, United States 
 Computer Science Georgetown University, Washington, DC 
Area:
network security
Website:
http://people.cs.georgetown.edu/~clay/

13 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2015 Bates A, Butler KRB, Sherr M, Shields C, Traynor P, Wallach D. Accountable wiretapping-or-I know they can hear you now Journal of Computer Security. 23: 167-195. DOI: 10.3233/Jcs-140515  0.407
2014 Liberatore M, Levine BN, Shields C, Lynn B. Efficient Tagging of Remote Peers during Child Pornography Investigations Ieee Transactions On Dependable and Secure Computing. 11: 425-439. DOI: 10.1109/Tdsc.2013.46  0.588
2011 Shields C, Frieder O, Maloof M. A system for the proactive, continuous, and efficient collection of digital forensic evidence Digital Investigation. 8. DOI: 10.1016/J.Diin.2011.05.002  0.431
2010 Liberatore M, Erdely R, Kerle T, Levine BN, Shields C. Forensic investigation of peer-to-peer file sharing networks Digital Investigation. 7. DOI: 10.1016/J.Diin.2010.05.012  0.597
2009 Cabuk S, Brodley CE, Shields C. IP covert channel detection Acm Transactions On Information and System Security. 12. DOI: 10.1145/1513601.1513604  0.319
2008 Wright MK, Adler M, Levine BN, Shields C. Passive-Logging Attacks Against Anonymous Communications Systems Acm Transactions On Information and System Security. 11: 3. DOI: 10.1145/1330332.1330335  0.581
2006 Levine B, Shields C. Editorial: Internet security Computer Communications. 29: 279. DOI: 10.1016/J.Comcom.2004.12.005  0.565
2005 Sanzgiri K, LaFlamme D, Dahill B, Levine BN, Shields C, Belding-Royer EM. Authenticated routing for ad hoc networks Ieee Journal On Selected Areas in Communications. 23: 598-609. DOI: 10.1109/Jsac.2004.842547  0.613
2004 Buchholz FP, Shields C. Providing process origin information to aid in computer forensic investigations Journal of Computer Security. 12: 753-776. DOI: 10.3233/Jcs-2004-12505  0.419
2004 Wright MK, Adler M, Levine BN, Shields C. The predecessor attack: An analysis of a threat to anonymous communications systems Acm Transactions On Information and System Security. 7: 489-522. DOI: 10.1145/1042031.1042032  0.616
2004 Carrier B, Shields C. The session token protocol for forensics and traceback Acm Transactions On Information and System Security (Tissec). 7: 333-362. DOI: 10.1145/1015040.1015041  0.513
2002 Levine BN, Shields C. Hordes: a multicast based protocol for anonymity Journal of Computer Security. 10: 213-240. DOI: 10.3233/Jcs-2002-10302  0.643
1998 Shields C, Garcia-Luna-Aceves JJ. HIP protocol for hierarchical multicast routing Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 257-266. DOI: 10.1016/S0140-3664(99)00190-5  0.554
Show low-probability matches.