default search action
Aviel D. Rubin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Tushar M. Jois, Gabrielle Beck, Sofia Belikovetsky, Joseph Carrigan, Alishah Chator, Logan Kostick, Maximilian Zinkus, Gabriel Kaptchuk, Aviel D. Rubin:
SocIoTy: Practical Cryptography in Smart Home Contexts. Proc. Priv. Enhancing Technol. 2024(1): 447-464 (2024) - 2023
- [c62]Valeti Manoj, Shao Wenda, Niu Sihan, Christopher A. Rouff, Lanier A. Watkins, Aviel Rubin:
Explainable Autonomic Cybersecurity For Industrial Control Systems. CCWC 2023: 900-9006 - 2022
- [c61]Hedin Beattie, Lanier A. Watkins, William H. Robinson, Aviel D. Rubin, Shari Watkins:
Measuring and Mitigating Bias in AI-Chatbots. ICAA 2022: 117-123 - [c60]James Cervini, Daniel Muller, Alexander Beall, Joseph Maurio, Aviel Rubin, Lanier A. Watkins:
Trusted Virtualization-Based Programmable Logic Controller Resilience Using a Backfit Approach. Critical Infrastructure Protection 2022: 103-117 - [i7]Random Gwinn, Mark A. Matties, Aviel D. Rubin:
Configuration and Collection Factors for Side-Channel Disassembly. CoRR abs/2204.04766 (2022) - 2021
- [c59]Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel D. Rubin:
Meteor: Cryptographically Secure Steganography for Realistic Distributions. CCS 2021: 1529-1548 - [c58]Lanier A. Watkins, Denzel Hamilton, Kevin T. Kornegay, Aviel Rubin:
Triaging Autonomous Drone Faults By Simultaneously Assuring Autonomy and Security. CISS 2021: 1-6 - [c57]Karl Siil, Aviel Rubin, Matthew Elder, Anton Dahbura, Matthew Green, Lanier A. Watkins:
Cost-Effective Mission Assurance Engineering Through Simulation. IoTaIS 2021: 67-72 - [c56]James Schaffter, Aviel Rubin, Lanier A. Watkins:
A Containerization-Based Backfit Approach for Industrial Control System Resiliency. SP (Workshops) 2021: 246-252 - [i6]Random Gwinn, Mark A. Matties, Aviel D. Rubin:
Wavelet Selection and Employment for Side-Channel Disassembly. CoRR abs/2107.11870 (2021) - [i5]Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel D. Rubin:
Meteor: Cryptographically Secure Steganography for Realistic Distributions. IACR Cryptol. ePrint Arch. 2021: 686 (2021) - 2020
- [c55]Adrian Cartagena, Gerald Rimmer, Thomas van Dalsen, Lanier A. Watkins, William H. Robinson, Aviel D. Rubin:
Privacy Violating Opensource Intelligence Threat Evaluation Framework: A Security Assessment Framework For Critical Infrastructure Owners. CCWC 2020: 494-499 - [c54]Jeffrey S. Chavis, Anna L. Buczak, Aviel D. Rubin, Lanier A. Watkins:
Connected Home Automated Security Monitor (CHASM): Protecting IoT Through Application of Machine Learning. CCWC 2020: 684-690 - [c53]Lanier A. Watkins, James Ballard, Kevin Hamilton, Jay Chow, Aviel D. Rubin, William H. Robinson, Cleon Davis:
Bio-Inspired, Host-based Firewall. CSE 2020: 86-91 - [c52]Karl Siil, Aviel D. Rubin, Matthew Elder, Anton Dahbura, Matthew Green, Lanier A. Watkins:
Mission Assurance for Autonomous Undersea Vehicles. SP (Workshops) 2020: 244-249 - [c51]Jeffrey S. Chavis, Anna L. Buczak, Aaron Kunz, Aviel D. Rubin, Lanier A. Watkins:
A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the Edge. SP (Workshops) 2020: 256-261 - [c50]Lanier A. Watkins, Yue Yu, Sifan Li, William H. Robinson, Aviel D. Rubin:
Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks. UEMCON 2020: 292-297 - [c49]Lanier A. Watkins, Kevin D. Fairbanks, Chengyu Li, Mengdi Yang, William H. Robinson, Aviel D. Rubin:
A Black Box Approach to Inferring, Characterizing, and Breaking Native Device Tracking Autonomy. UEMCON 2020: 303-308
2010 – 2019
- 2018
- [c48]Paul D. Martin, David Russell, Aviel D. Rubin, Stephen Checkoway, Malek Ben Salem:
Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems. IoTDI 2018: 105-116 - 2017
- [c47]Gabriel Kaptchuk, Matthew Green, Aviel D. Rubin:
Outsourcing Medical Dataset Analysis: A Possible Solution. Financial Cryptography 2017: 98-123 - 2016
- [c46]Paul D. Martin, Michael Rushanan, Thomas Tantillo, Christoph U. Lehmann, Aviel D. Rubin:
Applications of Secure Location Sensing in Healthcare. BCB 2016: 58-67 - [c45]Michael Rushanan, David Russell, Aviel D. Rubin:
MalloryWorker: Stealthy Computation and Covert Channels Using Web Workers. STM 2016: 196-211 - 2015
- [j30]David Kotz, Kevin Fu, Carl A. Gunter, Aviel D. Rubin:
Security for mobile and cloud frontiers in healthcare. Commun. ACM 58(8): 21-23 (2015) - 2014
- [c44]Aviel D. Rubin:
Taking two-factor to the next level: protecting online poker, banking, healthcare and other applications. ACSAC 2014: 1-5 - [c43]Christina Garman, Matthew Green, Ian Miers, Aviel D. Rubin:
Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity. Financial Cryptography Workshops 2014: 140-155 - [c42]Michael Rushanan, Aviel D. Rubin, Denis Foo Kune, Colleen M. Swanson:
SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks. IEEE Symposium on Security and Privacy 2014: 524-539 - 2013
- [j29]Joseph A. Akinyele, Christina Garman, Ian Miers, Matthew W. Pagano, Michael Rushanan, Matthew Green, Aviel D. Rubin:
Charm: a framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3(2): 111-128 (2013) - [c41]Paul D. Martin, Aviel D. Rubin, Rafae Bhatti:
Enforcing Minimum Necessary Access in Healthcare Through Integrated Audit and Access Control. BCB 2013: 946 - [c40]Ian Miers, Christina Garman, Matthew Green, Aviel D. Rubin:
Zerocoin: Anonymous Distributed E-Cash from Bitcoin. IEEE Symposium on Security and Privacy 2013: 397-411 - 2012
- [c39]Joseph A. Akinyele, Matthew Green, Aviel D. Rubin:
Charm: A Framework for Rapidly Prototyping Cryptosystems. NDSS 2012 - [c38]Ian Miers, Matthew Green, Christoph U. Lehmann, Aviel D. Rubin:
Vis-à-vis Cryptography: Private and Trustworthy In-Person Certifications. HealthSec 2012 - 2011
- [c37]Joseph A. Akinyele, Matthew W. Pagano, Matthew D. Green, Christoph U. Lehmann, Zachary N. J. Peterson, Aviel D. Rubin:
Securing electronic medical records using attribute-based encryption on mobile devices. SPSM@CCS 2011: 75-86 - [c36]Matthew D. Green, Aviel D. Rubin:
A Research Roadmap for Healthcare IT Security Inspired by the PCAST Health Information Technology Report. HealthSec 2011 - [i4]Joseph A. Akinyele, Matthew Green, Aviel D. Rubin:
Charm: A framework for Rapidly Prototyping Cryptosystems. IACR Cryptol. ePrint Arch. 2011: 617 (2011) - 2010
- [c35]Ryan W. Gardner, Sujata Garera, Aviel D. Rubin:
Designing for Audit: A Voting Machine with a Tiny TCB. Financial Cryptography 2010: 312-319 - [e3]Kevin Fu, Tadayoshi Kohno, Aviel D. Rubin:
1st USENIX Workshop on Health Security and Privacy, HealthSec'10, Washington, D.C., USA, August 10, 2010. USENIX Association 2010 [contents] - [i3]Joseph A. Akinyele, Christoph U. Lehmann, Matthew Green, Matthew W. Pagano, Zachary N. J. Peterson, Aviel D. Rubin:
Self-Protecting Electronic Medical Records Using Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2010: 565 (2010)
2000 – 2009
- 2009
- [j28]Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin:
Anonymity in Wireless Broadcast Networks. Int. J. Netw. Secur. 8(1): 37-51 (2009) - [j27]Ronald L. Rivest, David Chaum, Bart Preneel, Aviel D. Rubin, Donald G. Saari, Poorvi L. Vora:
Guest editorial: special issue on electronic voting. IEEE Trans. Inf. Forensics Secur. 4(4): 593-596 (2009) - [j26]Ryan W. Gardner, Sujata Garera, Aviel D. Rubin:
Detecting code alteration by creating a temporary memory bottleneck. IEEE Trans. Inf. Forensics Secur. 4(4): 638-650 (2009) - [c34]Ryan W. Gardner, Sujata Garera, Aviel D. Rubin:
Coercion Resistant End-to-end Voting. Financial Cryptography 2009: 344-361 - 2008
- [j25]Aviel D. Rubin, David R. Jefferson:
New Research Results for Electronic Voting. IEEE Secur. Priv. 6(3): 12-13 (2008) - 2007
- [c33]Sujata Garera, Aviel D. Rubin:
An independent audit framework for software dependent voting systems. CCS 2007: 256-265 - [c32]Ryan W. Gardner, Sujata Garera, Aviel D. Rubin:
On the Difficulty of Validating Voting Machine Software with Software. EVT 2007 - 2006
- [j24]Stephen Bono, Aviel D. Rubin, Adam Stubblefield, Matthew Green:
Security through legality. Commun. ACM 49(6): 41-43 (2006) - [c31]Sujata Doshi, Fabian Monrose, Aviel D. Rubin:
Efficient Memory Bound Puzzles Using Pattern Databases. ACNS 2006: 98-113 - [c30]Sophie Y. Qiu, Patrick D. McDaniel, Fabian Monrose, Aviel D. Rubin:
Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing. ISCC 2006: 489-496 - [e2]Giovanni Di Crescenzo, Aviel D. Rubin:
Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4107, Springer 2006, ISBN 3-540-46255-4 [contents] - 2005
- [j23]Patrick D. McDaniel, Aviel D. Rubin:
Web security. Comput. Networks 48(5): 697-699 (2005) - [j22]Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach:
Managing the Performance Impact of Web Security. Electron. Commer. Res. 5(1): 99-116 (2005) - [c29]Zachary N. J. Peterson, Randal C. Burns, Joseph Herring, Adam Stubblefield, Aviel D. Rubin:
Secure Deletion for a Versioning File System. FAST 2005 - [c28]Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Aviel D. Rubin, Michael Szydlo:
Security Analysis of a Cryptographically-Enabled RFID Device. USENIX Security Symposium 2005 - 2004
- [j21]David R. Jefferson, Aviel D. Rubin, Barbara Simons, David A. Wagner:
Analyzing internet voting security. Commun. ACM 47(10): 59-64 (2004) - [j20]Poorvi L. Vora, Ben Adida, Ren Bucholz, David Chaum, David L. Dill, David R. Jefferson, Douglas W. Jones, William Lattin, Aviel D. Rubin, Michael Ian Shamos, Moti Yung:
Evaluation of voting systems. Commun. ACM 47(11): 144 (2004) - [j19]Simon S. Y. Shim, Li Gong, Aviel D. Rubin, Linley Gwennap:
Guest Editors' Introduction: Securing the High-Speed Internet. Computer 37(6): 33-35 (2004) - [j18]David L. Dill, Aviel D. Rubin:
Guest Editors' Introduction: E-Voting Security. IEEE Secur. Priv. 2(1): 22-23 (2004) - [j17]Adam Stubblefield, John Ioannidis, Aviel D. Rubin:
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). ACM Trans. Inf. Syst. Secur. 7(2): 319-332 (2004) - [j16]Simon D. Byers, Aviel D. Rubin, David P. Kormann:
Defending against an Internet-based attack on the physical world. ACM Trans. Internet Techn. 4(3): 239-254 (2004) - [c27]Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach:
Analysis of an Electronic Voting System. S&P 2004: 27- - 2003
- [j15]Aviel D. Rubin:
Introduction. Commun. ACM 46(5): 28-30 (2003) - [c26]Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick D. McDaniel, Aviel D. Rubin:
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. NDSS 2003 - [c25]Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin:
WAR: Wireless Anonymous Routing. Security Protocols Workshop 2003: 218-232 - 2002
- [j14]Aviel D. Rubin:
Security considerations for remote electronic voting. Commun. ACM 45(12): 39-44 (2002) - [c24]Will Ivancic, David A. Wagner, Aviel D. Rubin, E. Paul Ratazzi, James P. G. Sterbenz:
Securing Wireless and Mobile Networks - Is It Possible? INFOCOM 2002 - [c23]Adam Stubblefield, John Ioannidis, Aviel D. Rubin:
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. NDSS 2002 - [c22]Simon D. Byers, Aviel D. Rubin, David P. Kormann:
Defending against an Internet-based attack on the physical world. WPES 2002: 11-18 - 2001
- [j13]Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor:
The architecture of robust publishing systems. ACM Trans. Internet Techn. 1(2): 199-230 (2001) - [c21]Aviel D. Rubin, Rebecca N. Wright:
Off-Line Generation of Limited-Use Credit Card Numbers. Financial Cryptography 2001: 187-200 - [c20]Ed Gerck, C. Andrew Neff, Ronald L. Rivest, Aviel D. Rubin, Moti Yung:
The Business of Electronic Voting. Financial Cryptography 2001: 234-259 - [c19]Aviel D. Rubin:
Security for E-Voting in Public Elections. LISA 2001 - [i2]Aviel D. Rubin:
Security Considerations for Remote Electronic Voting over the Internet. CoRR cs.CR/0108017 (2001) - 2000
- [j12]David P. Kormann, Aviel D. Rubin:
Risks of the Passport single signon protocol. Comput. Networks 33(1-6): 51-58 (2000) - [j11]Fabian Monrose, Aviel D. Rubin:
Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4): 351-359 (2000) - [c18]Patrick D. McDaniel, Aviel D. Rubin:
A Response to ''Can We Eliminate Certificate Revocation Lists?''. Financial Cryptography 2000: 245-258 - [c17]Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor:
Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System. USENIX Security Symposium 2000
1990 – 1999
- 1999
- [j10]Michael K. Reiter, Aviel D. Rubin:
Anonymous Web Transactions with Crowds. Commun. ACM 42(2): 32-38 (1999) - [j9]Christian Gilmore, David P. Kormann, Aviel D. Rubin:
Secure remote access to an Internet Web server. IEEE Netw. 13(6): 31-37 (1999) - [c16]William Aiello, Aviel D. Rubin, Martin Strauss:
Using Smartcards to Secure a Personalized Gambling Device. CCS 1999: 128-137 - [c15]Christian Gilmore, David P. Kormann, Aviel D. Rubin:
Secure Remote Access to an Internal Web Server. NDSS 1999 - [c14]Fabian Monrose, Peter Wyckoff, Aviel D. Rubin:
Distributed Execution with Remote Audit. NDSS 1999 - [c13]Ian Jermyn, Alain J. Mayer, Fabian Monrose, Michael K. Reiter, Aviel D. Rubin:
The Design and Analysis of Graphical Passwords. USENIX Security Symposium 1999 - 1998
- [j8]Aviel D. Rubin, Daniel E. Geer Jr.:
A Survey of Web Security. Computer 31(9): 34-41 (1998) - [j7]Aviel D. Rubin, Daniel E. Geer Jr.:
Mobile Code Security. IEEE Internet Comput. 2(6): 30-34 (1998) - [j6]Michael K. Reiter, Aviel D. Rubin:
Crowds: Anonymity for Web Transactions. ACM Trans. Inf. Syst. Secur. 1(1): 66-92 (1998) - [c12]Dahlia Malkhi, Michael K. Reiter, Aviel D. Rubin:
Secure Execution of Java Applets using a Remote Playground. S&P 1998: 40-51 - [e1]Aviel D. Rubin:
Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, USA, January 26-29, 1998. USENIX Association 1998 [contents] - 1997
- [j5]Aviel D. Rubin:
An Experience Teaching a Graduate Course in Cryptography. Cryptologia 21(2): 97-109 (1997) - [j4]Aviel D. Rubin:
Extending NCP for Protocols Using Public Keys. Mob. Networks Appl. 2(3): 227-241 (1997) - [c11]Aviel D. Rubin, Dan Boneh, Kevin Fu:
Revocation of Unread E-mail in an Untrusted Network. ACISP 1997: 62-75 - [c10]Fabian Monrose, Aviel D. Rubin:
Authentication via Keystroke Dynamics. CCS 1997: 48-56 - [c9]David M. Martin Jr., Sivaramakrishnan Rajagopalan, Aviel D. Rubin:
Blocking Java Applets at the Firewall. NDSS 1997: 16-26 - 1996
- [j3]Aviel D. Rubin:
Independent One-Time Passwords. Comput. Syst. 9(1): 15-27 (1996) - [j2]Aviel D. Rubin:
Response: Independent One-Time Passwords. Comput. Syst. 9(3): 257 (1996) - [c8]Victor Shoup, Aviel D. Rubin:
Session Key Distribution Using Smart Cards. EUROCRYPT 1996: 321-331 - [c7]Trent Jaeger, Aviel D. Rubin:
Preserving Integrity in Remote File Location and Retrieval. NDSS 1996: 53-63 - 1995
- [j1]Aviel D. Rubin:
Secure Distribution of Electronic Documents in a Hostile Environment. Comput. Commun. 18(6): 429-434 (1995) - [c6]Aviel D. Rubin:
Extending NCP for protocols using public keys. ICCCN 1995: 94 - [c5]Aviel D. Rubin:
Trusted distribution of software over the Internet. NDSS 1995: 47-53 - [c4]Aviel D. Rubin:
Independent One-Time Passwords. USENIX Security Symposium 1995 - [i1]Aviel D. Rubin:
Location-Independent Data/Software Integrity Protocol. RFC 1805: 1-6 (1995) - 1994
- [b1]Aviel D. Rubin:
Nonmonotonic cryptographic protocols. University of Michigan, USA, 1994 - [c3]Aviel D. Rubin, Peter Honeyman:
Nonmonotonic Cryptographic Protocols. CSFW 1994: 100-116 - 1993
- [c2]Aviel D. Rubin, Peter Honeyman:
Long Running Jobs in an Authenticated Environment. USENIX Security Symposium 1993
1970 – 1979
- 1977
- [c1]Aviel D. Rubin, Bertram C. Bruce:
From Conversations to Stories: An Analysis of Differences Between Oral and Written Language Comprehension. IJCAI 1977: 141
Coauthor Index
aka: Matthew D. Green
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint