Aviel D. Rubin
According to our database1,
Aviel D. Rubin
authored at least 96 papers
between 1977 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on avirubin.com
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., January, 2024
2023
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023
2022
Trusted Virtualization-Based Programmable Logic Controller Resilience Using a Backfit Approach.
Proceedings of the Critical Infrastructure Protection XVI, 2022
Proceedings of the IEEE International Conference on Assured Autonomy, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2021
Proceedings of the 55th Annual Conference on Information Sciences and Systems, 2021
2020
Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020
A Black Box Approach to Inferring, Characterizing, and Breaking Native Device Tracking Autonomy.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Proceedings of the 23rd IEEE International Conference on Computational Science and Engineering, 2020
Connected Home Automated Security Monitor (CHASM): Protecting IoT Through Application of Machine Learning.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020
Privacy Violating Opensource Intelligence Threat Evaluation Framework: A Security Assessment Framework For Critical Infrastructure Owners.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020
2018
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018
2017
Proceedings of the Financial Cryptography and Data Security, 2017
2016
Proceedings of the Security and Trust Management - 12th International Workshop, 2016
Proceedings of the 7th ACM International Conference on Bioinformatics, 2016
2015
2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Taking two-factor to the next level: protecting online poker, banking, healthcare and other applications.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Enforcing Minimum Necessary Access in Healthcare Through Integrated Audit and Access Control.
Proceedings of the ACM Conference on Bioinformatics, 2013
2012
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012
2011
IACR Cryptol. ePrint Arch., 2011
A Research Roadmap for Healthcare IT Security Inspired by the PCAST Health Information Technology Report.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011
Securing electronic medical records using attribute-based encryption on mobile devices.
Proceedings of the SPSM'11, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
IEEE Trans. Inf. Forensics Secur., 2009
Proceedings of the Financial Cryptography and Data Security, 2009
2008
2007
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
Proceedings of the FAST '05 Conference on File and Storage Technologies, 2005
2004
ACM Trans. Internet Techn., 2004
ACM Trans. Inf. Syst. Secur., 2004
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
2003
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing.
Proceedings of the Network and Distributed System Security Symposium, 2003
2002
Proceedings of the Network and Distributed System Security Symposium, 2002
Securing Wireless and Mobile Networks - Is It Possible?
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002
2001
Security for E-Voting in Public Elections.
Proceedings of the 15th Conference on Systems Administration (LISA 2001), 2001
Proceedings of the Financial Cryptography, 2001
2000
Future Gener. Comput. Syst., 2000
Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System.
Proceedings of the 9th USENIX Security Symposium, 2000
Proceedings of the Financial Cryptography, 2000
1999
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999
Proceedings of the Network and Distributed System Security Symposium, 1999
Proceedings of the Network and Distributed System Security Symposium, 1999
Proceedings of the CCS '99, 1999
1998
Proceedings of the Security and Privacy, 1998
1997
Proceedings of the Network and Distributed System Security Symposium, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996
Proceedings of the Advances in Cryptology, 1996
1995
Secure Distribution of Electronic Documents in a Hostile Environment.
Comput. Commun., 1995
Proceedings of the 1995 Symposium on Network and Distributed System Security, 1995
1994
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994
1993
Long Running Jobs in an Authenticated Environment.
Proceedings of the 4th USENIX Security Symposium, Santa Clara, CA, USA, October 4-6, 1993, 1993
1977
From Conversations to Stories: An Analysis of Differences Between Oral and Written Language Comprehension.
Proceedings of the 5th International Joint Conference on Artificial Intelligence. Cambridge, 1977