What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Steven M. Bellovin
Google Scholar
36
publications in security and cryptology related venues
Year
Venue
Title
2022
conf/sp
Differential Privacy and Swapping: Examining De-Identification's Impact on Minority Representation and Privacy Preservation in the U.S. Census.
Miranda Christ
Sarah Radway
Steven M. Bellovin
2017
conf/uss
A Privacy Analysis of Cross-device Tracking.
Sebastian Zimmeck
Jie S. Li
Hyungtae Kim
Steven M. Bellovin
Tony Jebara
2017
conf/ndss
Automated Analysis of Privacy Requirements for Mobile Apps.
Sebastian Zimmeck
Ziqi Wang
Lieyong Zou
Roger Iyengar
Bin Liu
Florian Schaub
Shomir Wilson
Norman M. Sadeh
Steven M. Bellovin
Joel R. Reidenberg
2015
conf/sp
Malicious-Client Security in Blind Seer: A Scalable Private DBMS.
Ben A. Fisch
Binh Vo
Fernando Krell
Abishek Kumarasubramanian
Vladimir Kolesnikov
Tal Malkin
Steven M. Bellovin
2014
conf/uss
Privee: An Architecture for Automatically Analyzing Web Privacy Policies.
Sebastian Zimmeck
Steven M. Bellovin
2014
conf/sp
Blind Seer: A Scalable Private DBMS.
Vasilis Pappas
Fernando Krell
Binh Vo
Vladimir Kolesnikov
Tal Malkin
Seung Geol Choi
Wesley George
Angelos D. Keromytis
Steven M. Bellovin
2012
conf/fc
Privacy Enhanced Access Control for Outsourced Data Sharing.
Mariana Raykova
Hang Zhao
Steven M. Bellovin
2012
conf/soups
Facebook and privacy: it's complicated.
Maritza L. Johnson
Serge Egelman
Steven M. Bellovin
2011
conf/fc
Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent.
Maritza L. Johnson
Steven M. Bellovin
Angelos D. Keromytis
2011
conf/acsac
Private search in the real world.
Vasilis Pappas
Mariana Raykova
Binh Vo
Steven M. Bellovin
Tal Malkin
2010
conf/uss
Policy Management for E-Health Records.
Maritza L. Johnson
Steven M. Bellovin
2010
conf/fc
A Secure and Privacy-Preserving Targeted Ad-System.
Elli Androulaki
Steven M. Bellovin
2010
conf/esorics
Privacy-Preserving, Taxable Bank Accounts.
Elli Androulaki
Binh Vo
Steven M. Bellovin
2009
conf/ccs
Secure anonymous database search.
Mariana Raykova
Binh Vo
Steven M. Bellovin
Tal Malkin
2009
conf/nspw
Laissez-faire file sharing: access control designed for individuals at the endpoints.
Maritza L. Johnson
Steven M. Bellovin
Robert W. Reeder
Stuart E. Schechter
2008
conf/nspw
ROFL: routing as the firewall layer.
Hang Zhao
Chi-Kin Chau
Steven M. Bellovin
2006
conf/uss
Prerendered User Interfaces for Higher-Assurance Electronic Voting.
Ka-Ping Yee
David A. Wagner
Marti A. Hearst
Steven M. Bellovin
2006
conf/ndss
Deploying a New Hash Algorithm.
Steven M. Bellovin
Eric Rescorla
2004
conf/uss
Nuclear Weapons, Permissive Action Links, and the History of Public Key Cryptography.
Steven M. Bellovin
2004
conf/acsac
A Look Back at "Security Problems in the TCP/IP Protocol Suite".
Steven M. Bellovin
2002
conf/ccs
Efficient, DoS-resistant, secure key exchange for internet protocols.
William Aiello
Steven M. Bellovin
Matt Blaze
John Ioannidis
Omer Reingold
Ran Canetti
Angelos D. Keromytis
2002
conf/ndss
Implementing Pushback: Router-Based Defense Against DDoS Attacks.
John Ioannidis
Steven M. Bellovin
2002
conf/dsn
Intrusion Tolerant Systems Workshop.
Carl E. Landwehr
Steven M. Bellovin
2001
conf/uss
Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per Host.
Peter M. Gleitz
Steven M. Bellovin
2001
conf/ndss
Security Risks Of Peer-To-Peer Networking.
Steven M. Bellovin
2000
conf/ccs
Implementing a distributed firewall.
Sotiris Ioannidis
Angelos D. Keromytis
Steven M. Bellovin
Jonathan M. Smith
1999
conf/ndss
Transport-Friendly ESP.
Steven M. Bellovin
1999
conf/ndss
Why Do We Need More Research?
Steven M. Bellovin
1998
conf/crypto
Cryptography and the Internet.
Steven M. Bellovin
1997
conf/ndss
Probable Plaintext Cryptanalysis of the IP Security Protocols.
Steven M. Bellovin
1996
conf/uss
Problem Areas for the IP Security Protocols.
Steven M. Bellovin
1996
conf/ndss
A "bump in the stack" encryptor for MS-DOS systems.
David A. Wagner
Steven M. Bellovin
1995
conf/uss
Using the Domain Name System for System Break-ins.
Steven M. Bellovin
1995
conf/uss
Session-Layer Encryption.
Matt Blaze
Steven M. Bellovin
1993
conf/ccs
Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise.
Steven M. Bellovin
Michael Merritt
1992
conf/sp
Encrypted key exchange: password-based protocols secure against dictionary attacks.
Steven M. Bellovin
Michael Merritt
Coauthors
Abishek Kumarasubramanian
(1)
Angelos D. Keromytis
(4)
Ben A. Fisch
(1)
Bin Liu
(1)
Binh Vo
(5)
Carl E. Landwehr
(1)
Chi-Kin Chau
(1)
David A. Wagner
(2)
Elli Androulaki
(2)
Eric Rescorla
(1)
Fernando Krell
(2)
Florian Schaub
(1)
Hang Zhao
(2)
Hyungtae Kim
(1)
Jie S. Li
(1)
Joel R. Reidenberg
(1)
John Ioannidis
(2)
Jonathan M. Smith
(1)
Ka-Ping Yee
(1)
Lieyong Zou
(1)
Mariana Raykova
(3)
Maritza L. Johnson
(4)
Marti A. Hearst
(1)
Matt Blaze
(2)
Michael Merritt
(2)
Miranda Christ
(1)
Norman M. Sadeh
(1)
Omer Reingold
(1)
Peter M. Gleitz
(1)
Ran Canetti
(1)
Robert W. Reeder
(1)
Roger Iyengar
(1)
Sarah Radway
(1)
Sebastian Zimmeck
(3)
Serge Egelman
(1)
Seung Geol Choi
(1)
Shomir Wilson
(1)
Sotiris Ioannidis
(1)
Steven M. Bellovin
(36)
Stuart E. Schechter
(1)
Tal Malkin
(4)
Tony Jebara
(1)
Vasilis Pappas
(2)
Vladimir Kolesnikov
(2)
Wesley George
(1)
William Aiello
(1)
Ziqi Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to