Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Steven M. Bellovin
Steve Bellovin
2010 – today
- 2013
[j40]Steven M. Bellovin, Matt Blaze, Sandy Clark, Susan Landau: Going Bright: Wiretapping without Weakening Communications Infrastructure. IEEE Security & Privacy 11(1): 62-72 (2013)
[j39]- 2012
[j38]
[j37]Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin, Salvatore J. Stolfo: Usable, Secure, Private Search. IEEE Security & Privacy 10(5): 53-60 (2012)
[j36]Steven M. Bellovin: The Major Cyberincident Investigations Board. IEEE Security & Privacy 10(6): 96 (2012)
[j35]Carl E. Landwehr, Dan Boneh, John C. Mitchell, Steven M. Bellovin, Susan Landau, Michael E. Lesk: Privacy and Cybersecurity: The Next 100 Years. Proceedings of the IEEE 100(Centennial-Issue): 1659-1673 (2012)
[c45]Mariana Raykova, Hang Zhao, Steven M. Bellovin: Privacy Enhanced Access Control for Outsourced Data Sharing. Financial Cryptography 2012: 223-238
[c44]Michelle Madejski, Maritza L. Johnson, Steven M. Bellovin: A study of privacy settings errors in an online social network. PerCom Workshops 2012: 340-345
[c43]Maritza L. Johnson, Serge Egelman, Steven M. Bellovin: Facebook and privacy: it's complicated. SOUPS 2012: 9- 2011
[j34]Steven M. Bellovin, S. O. Bradner, Whitfield Diffie, Susan Landau, Jennifer Rexford: As simple as possible - but not more so. Commun. ACM 54(8): 30-33 (2011)
[j33]
[j32]Salvatore J. Stolfo, Steven M. Bellovin, David Evans: Measuring Security. IEEE Security & Privacy 9(3): 60-65 (2011)
[j31]
[j30]
[c42]Vasilis Pappas, Mariana Raykova, Binh Vo, Steven M. Bellovin, Tal Malkin: Private search in the real world. ACSAC 2011: 83-92
[c41]Maritza L. Johnson, Steven M. Bellovin, Angelos D. Keromytis: Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent. Financial Cryptography Workshops 2011: 131-137
[c40]Hang Zhao, Jorge Lobo, Arnab Roy, Steven M. Bellovin: Policy refinement of network services for MANETs. Integrated Network Management 2011: 113-120
[r1]- 2010
[j29]
[j28]
[c39]Elli Androulaki, Binh Vo, Steven M. Bellovin: Privacy-Preserving, Taxable Bank Accounts. ESORICS 2010: 37-54
[c38]Elli Androulaki, Steven M. Bellovin: A Secure and Privacy-Preserving Targeted Ad-System. Financial Cryptography Workshops 2010: 123-135
[c37]
2000 – 2009
- 2009
[j27]
[j26]Steven M. Bellovin, Daniel G. Conway: Security as a Systems Property. IEEE Security & Privacy 7(5): 88 (2009)
[j25]Steven M. Bellovin, Randy Bush: Configuration management and security. IEEE Journal on Selected Areas in Communications 27(3): 268-274 (2009)
[c36]Mariana Raykova, Binh Vo, Steven M. Bellovin, Tal Malkin: Secure anonymous database search. CCSW 2009: 115-126
[c35]Shaya Potter, Steven M. Bellovin, Jason Nieh: Two-Person Control Administation: Preventing Administation Faults through Duplication. LISA 2009: 15-27
[c34]Maritza L. Johnson, Steven M. Bellovin, Robert W. Reeder, Stuart E. Schechter: Laissez-faire file sharing: access control designed for individuals at the endpoints. NSPW 2009: 1-10
[c33]Elli Androulaki, Steven M. Bellovin: APOD: Anonymous Physical Object Delivery. Privacy Enhancing Technologies 2009: 202-215
[c32]Yuu-Heng Cheng, Mariana Raykova, Alexander Poylisher, Scott Alexander, Martin Eiger, Steven M. Bellovin: The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET. POLICY 2009: 174-177
[c31]- 2008
[j24]
[j23]Tim Strayer, Mark Allman, Grenville J. Armitage, Steve Bellovin, Shudong Jin, Andrew W. Moore: IMRG workshop on application classification and identification report. Computer Communication Review 38(3): 87-90 (2008)
[j22]Steven M. Bellovin, Terry V. Benzel, Bob Blakley, Dorothy E. Denning, Whitfield Diffie, Jeremy Epstein, Paulo Veríssimo: Information Assurance Technology Forecast 2008. IEEE Security & Privacy 6(1): 16-23 (2008)
[j21]Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Peter G. Neumann, Jennifer Rexford: Risking Communications Security: Potential Hazards of the Protect America Act. IEEE Security & Privacy 6(1): 24-33 (2008)
[j20]
[j19]
[c30]Maritza L. Johnson, Chaitanya Atreya, Adam J. Aviv, Steven M. Bellovin, Gail E. Kaiser: RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies. UPSEC 2008
[c29]
[c28]Elli Androulaki, Seung Geol Choi, Steven M. Bellovin, Tal Malkin: Reputation Systems for Anonymous Networks. Privacy Enhancing Technologies 2008: 202-218
[c27]Elli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, Steven M. Bellovin: PAR: Payment for Anonymous Routing. Privacy Enhancing Technologies 2008: 219-236
[c26]Hang Zhao, Jorge Lobo, Steven M. Bellovin: An Algebra for Integration and Analysis of Ponder2 Policies. POLICY 2008: 74-77
[p2]Steven M. Bellovin: The Insider Attack Problem Nature and Scope. Insider Attack and Cyber Security 2008: 1-4
[e2]Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung (Eds.): Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings. Lecture Notes in Computer Science 5037, 2008, ISBN 978-3-540-68913-3
[e1]Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair (Eds.): Insider Attack and Cyber Security - Beyond the Hacker. Advances in Information Security 39, Springer 2008, ISBN 978-0-387-77321-6- 2007
[j18]Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Jennifer Rexford, Peter G. Neumann: Internal surveillance, external risks. Commun. ACM 50(12): 128 (2007)
[j17]
[j16]
[j15]Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Kostas G. Anagnostakis, Jonathan M. Smith: Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications. I. J. Network Security 4(1): 69-80 (2007)- 2006
[j14]
[j13]
[j12]Steven M. Bellovin: On the Brittleness of Software and the Infeasibility of Security Metrics. IEEE Security & Privacy 4(4): 96-96 (2006)
[c25]
[c24]Steven M. Bellovin: Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography. USENIX Annual Technical Conference, General Track 2006
[c23]- 2005
[j11]Steven M. Bellovin, Matt Blaze, Susan Landau: The real national-security needs for VoIP. Commun. ACM 48(11): 120 (2005)
[j10]Steven M. Bellovin: Security and Privacy: Enemies or Allies? IEEE Security & Privacy 3(3): 92 (2005)- 2004
[j9]
[j8]William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Just fast keying: Key agreement in a hostile internet. ACM Trans. Inf. Syst. Secur. 7(2): 242-273 (2004)
[c22]Steven M. Bellovin: A Look Back at "Security Problems in the TCP/IP Protocol Suite". ACSAC 2004: 229-249
[c21]Steven M. Bellovin: Nuclear Weapons, Permissive Action Links, and the History of Public Key Cryptography. USENIX Security Symposium 2004
[i1]Steven M. Bellovin, William R. Cheswick: Privacy-Enhanced Searches Using Encrypted Bloom Filters. IACR Cryptology ePrint Archive 2004: 22 (2004)- 2003
[c20]Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Design and Implementation of Virtual Private Services. WETICE 2003: 269-274- 2002
[j7]Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker: Aggregate congestion control. Computer Communication Review 32(1): 69 (2002)
[j6]Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker: Controlling high bandwidth aggregates in the network. Computer Communication Review 32(3): 62-73 (2002)
[c19]William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis: Efficient, DoS-resistant, secure key exchange for internet protocols. ACM Conference on Computer and Communications Security 2002: 48-58
[c18]
[c17]Steven M. Bellovin: A technique for counting natted hosts. Internet Measurement Workshop 2002: 267-272
[c16]John Ioannidis, Steven M. Bellovin: Implementing Pushback: Router-Based Defense Against DDoS Attacks. NDSS 2002
[c15]Sotiris Ioannidis, Steven M. Bellovin, Jonathan M. Smith: Sub-operating systems: a new approach to application security. ACM SIGOPS European Workshop 2002: 108-115- 2001
[j5]
[c14]
[c13]William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. Security Protocols Workshop 2001: 27-39
[c12]Sotiris Ioannidis, Steven M. Bellovin: Building a Secure Web Browser. USENIX Annual Technical Conference, FREENIX Track 2001: 127-134
[c11]Peter M. Gleitz, Steven M. Bellovin: Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per Host. USENIX Security Symposium 2001- 2000
[j4]
[c10]Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith: Implementing a distributed firewall. ACM Conference on Computer and Communications Security 2000: 190-199
1990 – 1999
- 1999
[j3]
[j2]Fred B. Schneider, Steven M. Bellovin, Alan S. Inouye: Building Trustworthy Systems: Lessons from the PTN and Internet. IEEE Internet Computing 3(6): 64-72 (1999)
[c9]John S. Denker, Steven M. Bellovin, Hugh Daniel, Nancy L. Mintz, Tom Killian, Mark Plotnick: Moat: a Virtual Private Network Appliance and Services Platform. LISA 1999: 251-260
[c8]
[c7]- 1998
[c6]- 1997
[c5]
[p1]Steven M. Bellovin: Network and Internet Security. The Computer Science and Engineering Handbook 1997: 1949-1961- 1996
[c4]David A. Wagner, Steven M. Bellovin: A "bump in the stack" encryptor for MS-DOS systems. NDSS 1996: 155-161- 1994
[j1]Steven M. Bellovin, Michael Merritt: An attack on the Interlock Protocol when used for authentication. IEEE Transactions on Information Theory 40(1): 273-275 (1994)- 1993
[c3]Steven M. Bellovin, Michael Merritt: Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise. ACM Conference on Computer and Communications Security 1993: 244-250- 1991
[c2]Steven M. Bellovin, Michael Merritt: Limitations of the Kerberos Authentication System. USENIX Winter 1991: 253-268
1980 – 1989
- 1986
[c1]Peter Honeyman, Steven M. Bellovin: PATHALIAS or The Care and Feeding of Relative Addresses. USENIX Summer 1986: 126-141
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:06 CEST by the dblp team



