Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Sean W. Smith
2010 – today
- 2012
[j29]Sean W. Smith: Security and Cognitive Bias: Exploring the Role of the Mind. IEEE Security & Privacy 10(5): 75-78 (2012)
[c57]Travis Goodspeed, Sergey Bratus, Ricky Melgares, Ryan Speers, Sean W. Smith: Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters. HICSS 2012: 2133-2140
[c56]Sean W. Smith: Cryptographic scalability challenges in the smart grid (extended abstract). ISGT 2012: 1-3- 2011
[j28]Sean W. Smith: Room at the Bottom: Authenticated Encryption on Slow Legacy Networks. IEEE Security & Privacy 9(4): 60-63 (2011)
[j27]Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sean W. Smith: Nymble: Blocking Misbehaving Users in Anonymizing Networks. IEEE Trans. Dependable Sec. Comput. 8(2): 256-269 (2011)
[c55]Jason Reeves, Ashwin Ramaswamy, Michael E. Locasto, Sergey Bratus, Sean W. Smith: Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems. Critical Infrastructure Protection 2011: 31-46
[c54]Rebecca Shapiro, Sergey Bratus, Edmond Rogers, Sean W. Smith: Identifying Vulnerabilities in SCADA Systems via Fuzz-Testing. Critical Infrastructure Protection 2011: 57-72
[r6]
[r5]Sean W. Smith: Dynamic Root of Trust. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 368-369
[r4]
[r3]Sean W. Smith: Secure Coprocessor. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1102-1103
[r2]
[r1]- 2010
[j26]Sara Sinclair, Sean W. Smith: What's Wrong with Access Control in the Real World? IEEE Security & Privacy 8(4): 74-77 (2010)
[j25]Sergey Bratus, James Oakley, Ashwin Ramaswamy, Sean W. Smith, Michael E. Locasto: Katana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader Toolchain. IJSSE 1(3): 1-17 (2010)
[j24]Massimiliano Pala, Sean W. Smith: Finding the PKI needles in the Internet haystack. Journal of Computer Security 18(3): 397-420 (2010)
[j23]Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith: BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs. ACM Trans. Inf. Syst. Secur. 13(4): 39 (2010)
[c53]Ashwin Ramaswamy, Sergey Bratus, Sean W. Smith, Michael E. Locasto: Katana: A Hot Patching Framework for ELF Executables. ARES 2010: 507-512
[c52]Massimiliano Pala, Sara Sinclair, Sean W. Smith: PorKI: Portable PKI Credentials via Proxy Certificates. EuroPKI 2010: 1-16
[c51]Gabriel A. Weaver, Scott A. Rea, Sean W. Smith: Computational techniques for increasing PKI policy comprehension by human analysts. IDtrust 2010: 51-62
[c50]Rouslan Solomakhin, Patrick P. Tsang, Sean W. Smith: High Security with Low Latency in Legacy SCADA Systems. Critical Infrastructure Protection 2010: 63-79
[c49]Sergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith: VM-based security overkill: a lament for applied systems security research. NSPW 2010: 51-60
[e2]Alessandro Acquisti, Sean W. Smith, Ahmad-Reza Sadeghi (Eds.): Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings. Lecture Notes in Computer Science 6101, Springer 2010, ISBN 978-3-642-13868-3
2000 – 2009
- 2009
[j22]Massimiliano Pala, Shreyas Cholia, Scott A. Rea, Sean W. Smith: Interoperable PKI Data Distribution in Computational Grids. IJGHPC 1(2): 56-73 (2009)
[c48]Gabriel A. Weaver, Scott A. Rea, Sean W. Smith: A Computational Framework for Certificate Policy Operations. EuroPKI 2009: 17-33
[c47]
[c46]Stephanie Trudeau, Sara Sinclair, Sean W. Smith: The effects of introspection on creating privacy policy. WPES 2009: 1-10- 2008
[b2]Sean W. Smith, John Marchesini: The Craft of System Security. Addison-Wesley 2008, ISBN 978-0-321-43483-8
[j21]Sergey Bratus, Chris Masone, Sean W. Smith: Why Do Street-Smart People Do Stupid Things Online? IEEE Security & Privacy 6(3): 71-74 (2008)
[j20]Samuel T. King, Sean W. Smith: Virtualization and Security: Back to the Future. IEEE Security & Privacy 6(5): 15 (2008)
[c45]
[c44]Massimiliano Pala, Shreyas Cholia, Scott A. Rea, Sean W. Smith: Extending PKI Interoperability in Computational Grids. CCGRID 2008: 645-650
[c43]Sergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith: Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security. VMSec 2008: 49-58
[c42]Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith: PEREA: towards practical TTP-free revocation in anonymous authentication. ACM Conference on Computer and Communications Security 2008: 333-344
[c41]
[c40]Patrick P. Tsang, Sean W. Smith: Secure Cryptographic Precomputation with Insecure Memory. ISPEC 2008: 146-160
[c39]Patrick P. Tsang, Sean W. Smith: Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers. ISPEC 2008: 188-202
[c38]Patrick P. Tsang, Sean W. Smith: YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems. SEC 2008: 445-459
[c37]Sergey Bratus, Nihal D'Cunha, Evan Sparks, Sean W. Smith: TOCTOU, Traps, and Trusted Computing. TRUST 2008: 14-32
[c36]Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith: TwoKind authentication: protecting private information in untrustworthy environments. WPES 2008: 39-44
[p1]Sara Sinclair, Sean W. Smith: Preventative Directions For Insider Threat Mitigation Via Access Control. Insider Attack and Cyber Security 2008: 165-194
[e1]Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair (Eds.): Insider Attack and Cyber Security - Beyond the Hacker. Advances in Information Security 39, Springer 2008, ISBN 978-0-387-77321-6- 2007
[c35]Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W. Smith: Pastures: Towards Usable Security Policy Engineering. ARES 2007: 1052-1059
[c34]Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith: Blacklistable anonymous credentials: blocking misbehaving users without ttps. ACM Conference on Computer and Communications Security 2007: 72-81
[c33]
[c32]Chris Masone, Kwang-Hyun Baek, Sean W. Smith: WSKE: Web Server Key Enabled Cookies. Financial Cryptography 2007: 294-306
[c31]Sara Sinclair, Sean W. Smith, Stephanie Trudeau, M. Eric Johnson, Anthony Portera: Information Risk in Financial Institutions: Field Study and Research Roadmap. FinanceCom 2007: 165-180
[c30]
[c29]Apu Kapadia, Patrick P. Tsang, Sean W. Smith: Attribute-Based Publishing with Hidden Credentials and Hidden Policies. NDSS 2007
[c28]Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, Sean W. Smith: Nymble: Anonymous IP-Address Blocking. Privacy Enhancing Technologies 2007: 113-133
[c27]Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith: TwoKind authentication: usable authenticators for untrustworthy environments. SOUPS 2007: 169-170- 2006
[j19]Gabriel Vanrenen, Sean W. Smith, John Marchesini: Distributing security-mediated PKI. Int. J. Inf. Sec. 5(1): 3-17 (2006)
[c26]Meiyuan Zhao, Sean W. Smith: Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI. EuroPKI 2006: 16-30- 2005
[b1]Sean W. Smith: Trusted Computing Platforms - Design and Applications. Springer 2005, ISBN 978-0-387-23916-3, pp. I-XX, 1-239
[j18]John Marchesini, Sean W. Smith, Meiyuan Zhao: Keyjacking: the surprising insecurity of client-side SSL. Computers & Security 24(2): 109-123 (2005)
[j17]Alexander Iliev, Sean W. Smith: Protecting Client Privacy with Trusted Computing at the Server. IEEE Security & Privacy 3(2): 20-28 (2005)
[j16]Sean W. Smith: Turing is from Mars, Shannon is from Venus: Computer Science and Computer Engineering. IEEE Security & Privacy 3(2): 66-69 (2005)
[j15]Sara Sinclair, Sean W. Smith: The TIPPI Point: Toward Trustworthy Interfaces. IEEE Security & Privacy 3(4): 68-71 (2005)
[j14]
[j13]Meiyuan Zhao, Sean W. Smith, David M. Nicol: The performance impact of BGP security. IEEE Network 19(6): 42-48 (2005)
[j12]Zishuang (Eileen) Ye, Sean W. Smith, Denise Anthony: Trusted paths for browsers. ACM Trans. Inf. Syst. Secur. 8(2): 153-186 (2005)
[c25]Sara Sinclair, Sean W. Smith: PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness. ACSAC 2005: 419-430
[c24]Meiyuan Zhao, Sean W. Smith, David M. Nicol: Aggregated path authentication for efficient BGP security. ACM Conference on Computer and Communications Security 2005: 128-138
[c23]John Marchesini, Sean W. Smith: Modeling Public Key Infrastructures in the Real World. EuroPKI 2005: 118-134
[c22]Mark Franklin, Kevin Mitcham, Sean W. Smith, Joshua Stabiner, Omen Wild: CA-in-a-Box. EuroPKI 2005: 180-190
[c21]James E. Dobson, Jeffrey B. Woodward, Susan A. Schwarz, John Marchesini, Hany Farid, Sean W. Smith: The Dartmouth Green Grid. International Conference on Computational Science (2) 2005: 99-106
[c20]- 2004
[j11]
[j10]Sean W. Smith, Eugene H. Spafford: Grand Challenges in Information Security: Process and Output. IEEE Security & Privacy 2(1): 69-71 (2004)
[j9]Sean W. Smith: Outbound authentication for programmable secure coprocessors. Int. J. Inf. Sec. 3(1): 28-41 (2004)
[j8]David M. Nicol, Sean W. Smith, Meiyuan Zhao: Evaluation of efficient security for BGP route announcements using parallel simulation. Simulation Modelling Practice and Theory 12(3-4): 187-216 (2004)
[c19]John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian: Open-Source Applications of TCPA Hardware. ACSAC 2004: 294-303
[c18]
[c17]
[c16]Paul Seligman, Sean W. Smith: Detecting Unauthorized Use in Online Journal Archives: A Case Study. ICWI 2004: 209-217
[c15]Sidharth Nazareth, Sean W. Smith: Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth. ICWI 2004: 218-226
[c14]Alexander Iliev, Sean W. Smith: Private Information Storage with Logarithm-Space Secure Hardware. International Information Security Workshops 2004: 199-214
[c13]Anna Shubina, Sean W. Smith: Design and Prototype of a Coercion-Resistant, Verifiable Electronic Voting System. PST 2004: 29-39- 2003
[j7]
[j6]Sean W. Smith: Humans in the Loop: Human-Computer Interaction and Security. IEEE Security & Privacy 1(3): 75-79 (2003)
[j5]Sean W. Smith, Jothy Rosenberg, Adam Golodner: A Funny Thing Happened on the Way to the Marketplace. IEEE Security & Privacy 1(6): 74-78 (2003)
[j4]Anna Shubina, Sean W. Smith: Using caching for browsing anonymity. SIGecom Exchanges 4(2): 11-20 (2003)- 2002
[c12]K. Kain, Sean W. Smith, R. Asokan: Digital signatures and electronic documents: a cautionary tale. Communications and Multimedia Security 2002: 293-308
[c11]
[c10]Alexander Iliev, Sean W. Smith: Prototyping an Armored Data Vault: Rights Management on Big Brother's Computer. Privacy Enhancing Technologies 2002: 144-159
[c9]Zishuang (Eileen) Ye, Sean W. Smith: Trusted Paths for Browsers. USENIX Security Symposium 2002: 263-279- 2001
[j3]Joan G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, Leendert van Doorn, Sean W. Smith, Steve Weingart: Building the IBM 4758 Secure Coprocessor. IEEE Computer 34(10): 57-66 (2001)
[j2]Sean W. Smith, David Safford: Practical server privacy with secure coprocessors. IBM Systems Journal 40(3): 683-695 (2001)
[c8]Shan Jiang, Sean W. Smith, Kazuhiro Minami: Securing Web Servers against Insider Attack . ACSAC 2001: 265-276
[c7]Suresh Chari, Parviz Kermani, Sean W. Smith, Leandros Tassiulas: Security Issues in M-Commerce: A Usage-Based Taxonomy. E-Commerce Agents 2001: 264-282
[c6]Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar: SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. IPDPS 2001: 170
[c5]Mark Lindemann, Sean W. Smith: Improving DES Coprocessor Throughput for Short Operations. USENIX Security Symposium 2001
1990 – 1999
- 1999
[j1]Sean W. Smith, Steve Weingart: Building a high-performance, programmable secure coprocessor. Computer Networks 31(8): 831-860 (1999)- 1998
[c4]Sean W. Smith, Elaine R. Palmer, Steve Weingart: Using a High-Performance, Programmable Secure Coprocessor. Financial Cryptography 1998: 73-89- 1996
[c3]Sean W. Smith, David B. Johnson: Minimizing Timestamp Size for Completely Asynchronous Optimistic Recovery with Minimal Rollback. SRDS 1996: 66-75- 1995
[c2]Sean W. Smith, David B. Johnson, J. D. Tygar: Completely Asynchronous Optimistic Recovery with Minimal Rollbacks. FTCS 1995: 361-370- 1991
[c1]Merrick L. Furst, Jeffrey C. Jackson, Sean W. Smith: Improved Learning of AC0 Functions. COLT 1991: 317-325
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:13 CEST by the dblp team



