What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Aviel D. Rubin
Google Scholar
42
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/wisec
SoK: Security in the Inaudible World.
David Inyangson
Aditya Gaur
Atheer Almogbil
Tushar M. Jois
Aviel D. Rubin
2024
journals/popets
SocIoTy: Practical Cryptography in Smart Home Contexts.
Tushar M. Jois
Gabrielle Beck
Sofia Belikovetsky
Joseph Carrigan
Alishah Chator
Logan Kostick
Maximilian Zinkus
Gabriel Kaptchuk
Aviel D. Rubin
2021
conf/ccs
Meteor: Cryptographically Secure Steganography for Realistic Distributions.
Gabriel Kaptchuk
Tushar M. Jois
Matthew Green
Aviel D. Rubin
2020
conf/sp
A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the Edge.
Jeffrey S. Chavis
Anna L. Buczak
Aaron Kunz
Aviel D. Rubin
Lanier A. Watkins
2020
conf/sp
Mission Assurance for Autonomous Undersea Vehicles.
Karl Siil
Aviel D. Rubin
Matthew Elder
Anton Dahbura
Matthew Green
Lanier A. Watkins
2017
conf/fc
Outsourcing Medical Dataset Analysis: A Possible Solution.
Gabriel Kaptchuk
Matthew Green
Aviel D. Rubin
2014
conf/fc
Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity.
Christina Garman
Matthew Green
Ian Miers
Aviel D. Rubin
2014
conf/sp
SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks.
Michael Rushanan
Aviel D. Rubin
Denis Foo Kune
Colleen M. Swanson
2014
conf/acsac
Taking two-factor to the next level: protecting online poker, banking, healthcare and other applications.
Aviel D. Rubin
2013
conf/sp
Zerocoin: Anonymous Distributed E-Cash from Bitcoin.
Ian Miers
Christina Garman
Matthew Green
Aviel D. Rubin
2012
conf/uss
Vis-à-vis Cryptography: Private and Trustworthy In-Person Certifications.
Ian Miers
Matthew Green
Christoph U. Lehmann
Aviel D. Rubin
2012
conf/ndss
Charm: A Framework for Rapidly Prototyping Cryptosystems.
Joseph A. Akinyele
Matthew Green
Aviel D. Rubin
2011
conf/ccs
Securing electronic medical records using attribute-based encryption on mobile devices.
Joseph A. Akinyele
Matthew W. Pagano
Matthew D. Green
Christoph U. Lehmann
Zachary N. J. Peterson
Aviel D. Rubin
2011
conf/uss
A Research Roadmap for Healthcare IT Security Inspired by the PCAST Health Information Technology Report.
Matthew D. Green
Aviel D. Rubin
2010
conf/fc
Designing for Audit: A Voting Machine with a Tiny TCB.
Ryan W. Gardner
Sujata Garera
Aviel D. Rubin
2009
journals/tifs
Detecting code alteration by creating a temporary memory bottleneck.
Ryan W. Gardner
Sujata Garera
Aviel D. Rubin
2009
journals/tifs
Guest editorial: special issue on electronic voting.
Ronald L. Rivest
David Chaum
Bart Preneel
Aviel D. Rubin
Donald G. Saari
Poorvi L. Vora
2009
conf/fc
Coercion Resistant End-to-end Voting.
Ryan W. Gardner
Sujata Garera
Aviel D. Rubin
2007
conf/ccs
An independent audit framework for software dependent voting systems.
Sujata Garera
Aviel D. Rubin
2007
conf/uss
On the Difficulty of Validating Voting Machine Software with Software.
Ryan W. Gardner
Sujata Garera
Aviel D. Rubin
2006
conf/acns
Efficient Memory Bound Puzzles Using Pattern Databases.
Sujata Doshi
Fabian Monrose
Aviel D. Rubin
2005
conf/uss
Security Analysis of a Cryptographically-Enabled RFID Device.
Steve Bono
Matthew Green
Adam Stubblefield
Ari Juels
Aviel D. Rubin
Michael Szydlo
2004
conf/sp
Analysis of an Electronic Voting System.
Tadayoshi Kohno
Adam Stubblefield
Aviel D. Rubin
Dan S. Wallach
2003
conf/ndss
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing.
Geoffrey Goodell
William Aiello
Timothy Griffin
John Ioannidis
Patrick D. McDaniel
Aviel D. Rubin
2002
conf/ndss
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
Adam Stubblefield
John Ioannidis
Aviel D. Rubin
2001
conf/fc
The Business of Electronic Voting.
Ed Gerck
C. Andrew Neff
Ronald L. Rivest
Aviel D. Rubin
Moti Yung
2001
conf/fc
Off-Line Generation of Limited-Use Credit Card Numbers.
Aviel D. Rubin
Rebecca N. Wright
2000
conf/uss
Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System.
Marc Waldman
Aviel D. Rubin
Lorrie Faith Cranor
2000
conf/fc
A Response to ''Can We Eliminate Certificate Revocation Lists?''.
Patrick D. McDaniel
Aviel D. Rubin
1999
conf/ccs
Using Smartcards to Secure a Personalized Gambling Device.
William Aiello
Aviel D. Rubin
Martin Strauss
1999
conf/uss
The Design and Analysis of Graphical Passwords.
Ian Jermyn
Alain J. Mayer
Fabian Monrose
Michael K. Reiter
Aviel D. Rubin
1999
conf/ndss
Secure Remote Access to an Internal Web Server.
Christian Gilmore
David P. Kormann
Aviel D. Rubin
1999
conf/ndss
Distributed Execution with Remote Audit.
Fabian Monrose
Peter Wyckoff
Aviel D. Rubin
1998
conf/sp
Secure Execution of Java Applets using a Remote Playground.
Dahlia Malkhi
Michael K. Reiter
Aviel D. Rubin
1997
conf/ccs
Authentication via Keystroke Dynamics.
Fabian Monrose
Aviel D. Rubin
1997
conf/acisp
Revocation of Unread E-mail in an Untrusted Network.
Aviel D. Rubin
Dan Boneh
Kevin Fu
1997
conf/ndss
Blocking Java Applets at the Firewall.
David M. Martin Jr.
Sivaramakrishnan Rajagopalan
Aviel D. Rubin
1996
conf/ndss
Preserving Integrity in Remote File Location and Retrieval.
Trent Jaeger
Aviel D. Rubin
1996
conf/eurocrypt
Session Key Distribution Using Smart Cards.
Victor Shoup
Aviel D. Rubin
1995
conf/uss
Independent One-Time Passwords.
Aviel D. Rubin
1995
conf/ndss
Trusted distribution of software over the Internet.
Aviel D. Rubin
1993
conf/uss
Long Running Jobs in an Authenticated Environment.
Aviel D. Rubin
Peter Honeyman
Coauthors
Aaron Kunz
(1)
Adam Stubblefield
(3)
Aditya Gaur
(1)
Alain J. Mayer
(1)
Alishah Chator
(1)
Anna L. Buczak
(1)
Anton Dahbura
(1)
Ari Juels
(1)
Atheer Almogbil
(1)
Aviel D. Rubin
(42)
Bart Preneel
(1)
C. Andrew Neff
(1)
Christian Gilmore
(1)
Christina Garman
(2)
Christoph U. Lehmann
(2)
Colleen M. Swanson
(1)
Dahlia Malkhi
(1)
Dan Boneh
(1)
Dan S. Wallach
(1)
David Chaum
(1)
David Inyangson
(1)
David M. Martin Jr.
(1)
David P. Kormann
(1)
Denis Foo Kune
(1)
Donald G. Saari
(1)
Ed Gerck
(1)
Fabian Monrose
(4)
Gabriel Kaptchuk
(3)
Gabrielle Beck
(1)
Geoffrey Goodell
(1)
Ian Jermyn
(1)
Ian Miers
(3)
Jeffrey S. Chavis
(1)
John Ioannidis
(2)
Joseph A. Akinyele
(2)
Joseph Carrigan
(1)
Karl Siil
(1)
Kevin Fu
(1)
Lanier A. Watkins
(2)
Logan Kostick
(1)
Lorrie Faith Cranor
(1)
Marc Waldman
(1)
Martin Strauss
(1)
Matthew D. Green
(2)
Matthew Elder
(1)
Matthew Green
(8)
Matthew W. Pagano
(1)
Maximilian Zinkus
(1)
Michael K. Reiter
(2)
Michael Rushanan
(1)
Michael Szydlo
(1)
Moti Yung
(1)
Patrick D. McDaniel
(2)
Peter Honeyman
(1)
Peter Wyckoff
(1)
Poorvi L. Vora
(1)
Rebecca N. Wright
(1)
Ronald L. Rivest
(2)
Ryan W. Gardner
(4)
Sivaramakrishnan Rajagopalan
(1)
Sofia Belikovetsky
(1)
Steve Bono
(1)
Sujata Doshi
(1)
Sujata Garera
(5)
Tadayoshi Kohno
(1)
Timothy Griffin
(1)
Trent Jaeger
(1)
Tushar M. Jois
(3)
Victor Shoup
(1)
William Aiello
(2)
Zachary N. J. Peterson
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to