Eric Cronin

According to our database1, Eric Cronin authored at least 17 papers between 2002 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Availability.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2009
Can they hear me now?: a security analysis of law enforcement wiretaps.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
On the (un)reliability of eavesdropping.
Int. J. Secur. Networks, 2008

Security Evaluation of ES&S Voting Machines and Election Management System.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Provenance-aware secure networks.
Proceedings of the 24th International Conference on Data Engineering Workshops, 2008

2007
Measurable Security through Isotropic Channels.
Proceedings of the Security Protocols, 2007

2006
Security Protocols with Isotropic Channels.
IACR Cryptol. ePrint Arch., 2006

Sensor Network Security: More Interesting Than You Think.
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006

On the Reliability of Network Eavesdropping Tools.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

2005
Denial of Service.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Availability.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Signaling Vulnerabilities in Wiretapping Systems.
IEEE Secur. Priv., 2005

Listen Too Closely and You May Be Confused.
Proceedings of the Security Protocols, 2005

2004
An Efficient Synchronization Mechanism for Mirrored Game Architectures.
Multim. Tools Appl., 2004

2003
Analysis of security vulnerabilities in the movie production and distribution process.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003

On the performance, feasibility, and use of forward-secure signatures.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
Constrained mirror placement on the Internet.
IEEE J. Sel. Areas Commun., 2002


  Loading...