متابعة
Steven Bellovin
Steven Bellovin
Professor of Computer Science, Columbia University
بريد إلكتروني تم التحقق منه على cs.columbia.edu
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Encrypted key exchange: Password-based protocols secure against dictionary attacks.
SM Bellovin, M Merritt
S&P, 72-84, 1992
22931992
Security problems in the TCP/IP protocol suite
SM Bellovin
ACM SIGCOMM Computer Communication Review 19 (2), 32-48, 1989
11691989
Controlling high bandwidth aggregates in the network
R Mahajan, SM Bellovin, S Floyd, J Ioannidis, V Paxson, S Shenker
ACM SIGCOMM Computer Communication Review 32 (3), 62-73, 2002
11222002
Implementing a distributed firewall
S Ioannidis, AD Keromytis, SM Bellovin, JM Smith
Proceedings of the 7th ACM conference on Computer and communications …, 2000
10262000
Implementing pushback: Router-based defense against ddos attacks.
J Ioannidis, SM Bellovin
NDSS 2, 2002
8972002
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
SM Bellovin, M Merritt
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
6981993
Limitations of the Kerberos authentication system
SM Bellovin, M Merritt
ACM SIGCOMM Computer Communication Review 20 (5), 119-132, 1990
6401990
Distributed firewalls
SM Bellovin
login 24 (5), 37-47, 1999
5461999
Network firewalls
SM Bellovin, WR Cheswick
IEEE communications magazine 32 (9), 50-57, 1994
3671994
A technique for counting NATted hosts
SM Bellovin
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, 267-272, 2002
3532002
Facebook and privacy: it's complicated
M Johnson, S Egelman, SM Bellovin
Proceedings of the eighth symposium on usable privacy and security, 1-15, 2012
3182012
Keys under doormats
H Abelson, R Anderson, SM Bellovin, J Benaloh, M Blaze, WW Diffie, ...
Communications of the ACM 58 (10), 24-26, 2015
3112015
Problem Areas for the IP Security Protocols.
SM Bellovin
USENIX Security Symposium, 205-214, 1996
2991996
A study of privacy settings errors in an online social network
M Madejski, M Johnson, SM Bellovin
2012 IEEE international conference on pervasive computing and communications …, 2012
2812012
Automated Analysis of Privacy Requirements for Mobile Apps.
S Zimmeck, Z Wang, L Zou, R Iyengar, B Liu, F Schaub, S Wilson, ...
NDSS 2, 1.4-2.3, 2017
2792017
Cryptographic protocol for secure communications
SM Bellovin, M Merritt
US Patent 5,241,599, 1993
2411993
The failure of online social network privacy settings
M Madejski, M Johnson, SM Bellovin
Columbia University Computer Science Technical Reports, 2011
2392011
The risks of key recovery, key escrow, and trusted third-party encryption
H Abelson, R Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, ...
O'Reilly & Associates, Inc, 1997
2321997
Using the Domain Name System for System Break-ins.
SM Bellovin
USENIX Security Symposium, 1995
2281995
Privee: An architecture for automatically analyzing web privacy policies
S Zimmeck, SM Bellovin
23rd USENIX Security Symposium (USENIX Security 14), 1-16, 2014
2202014
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20