Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Debra L. Cook
2000 – 2009
- 2009
[j3]Debra L. Cook, Moti Yung, Angelos D. Keromytis: Elastic block ciphers: method, security and instantiations. Int. J. Inf. Sec. 8(3): 211-231 (2009)
[j2]Debra L. Cook, Vijay K. Gurbani, Michael Daniluk: Phishwish: a simple and stateless phishing filter. Security and Communication Networks 2(1): 29-43 (2009)- 2008
[c10]Debra L. Cook, Moti Yung, Angelos D. Keromytis: Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. ACISP 2008: 187-202
[c9]Debra L. Cook, Moti Yung, Angelos D. Keromytis: Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. Inscrypt 2008: 157-180
[c8]Debra L. Cook, Vijay K. Gurbani, Michael Daniluk: Phishwish: A Stateless Phishing Filter Using Minimal Rules. Financial Cryptography 2008: 182-186
[i3]Debra L. Cook, Moti Yung, Angelos D. Keromytis: Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. IACR Cryptology ePrint Archive 2008: 496 (2008)- 2007
[c7]Debra L. Cook, Angelos D. Keromytis, Moti Yung: Elastic block ciphers: the basic design. ASIACCS 2007: 350-352
[c6]Vijay K. Gurbani, Debra L. Cook, Lawrence E. Menten, Thomas B. Reddington: A Case Study on Constructing a Security Event Management System. IMF 2007: 83-102
[c5]Debra L. Cook, Moti Yung, Angelos D. Keromytis: The Security of Elastic Block Ciphers Against Key-Recovery Attacks. ISC 2007: 89-103- 2006
[b1]Debra L. Cook, Angelos D. Keromytis: CryptoGraphics - Exploiting Graphics Cards for Security. Advances in Information Security 20, Springer 2006, ISBN 978-0-387-29015-7, pp. 1-139- 2005
[j1]Angelos Stavrou, Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: WebSOS: an overlay-based system for protecting web servers from denial of service attacks. Computer Networks 48(5): 781-807 (2005)
[c4]Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck: CryptoGraphics: Secret Key Cryptography Using Graphics Cards. CT-RSA 2005: 334-350
[c3]Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis: Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. ICICS 2005: 363-375
[c2]Debra L. Cook, Angelos D. Keromytis: Conversion and Proxy Functions for Symmetric Key Ciphers. ITCC (1) 2005: 662-667- 2004
[i2]Debra L. Cook, Moti Yung, Angelos D. Keromytis: Elastic Block Ciphers. IACR Cryptology ePrint Archive 2004: 128 (2004)
[i1]Debra L. Cook, Moti Yung, Angelos D. Keromytis: Elastic AES. IACR Cryptology ePrint Archive 2004: 141 (2004)- 2003
[c1]William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: Using graphic turing tests to counter automated DDoS attacks against web servers. ACM Conference on Computer and Communications Security 2003: 8-19
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:04 CEST by the dblp team



