Len Sassaman

Affiliations:
  • Katholieke Universiteit Leuven, Belgium


According to our database1, Len Sassaman authored at least 12 papers between 2002 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2013
Security Applications of Formal Language Theory.
IEEE Syst. J., 2013

2012
A Patch for Postel's Robustness Principle.
IEEE Secur. Priv., 2012

2011
The Halting Problems of Network Stack Insecurity.
login Usenix Mag., 2011

Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation.
login Usenix Mag., 2011

2010
Ethical Guidelines for Computer Security Researchers: "Be Reasonable".
Proceedings of the Financial Cryptography and Data Security, 2010

PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2008
How to Bypass Two Anonymity Revocation Schemes.
Proceedings of the Privacy Enhancing Technologies, 2008

Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model.
Proceedings of the Usability, Psychology, and Security, 2008

2005
The pynchon gate: a secure method of pseudonymous mail retrieval.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

2004
Comparison Between Two Practical Mix Designs.
Proceedings of the Computer Security, 2004

2003
Heartbeat traffic to counter (n-1) attacks: red-green-black mixes.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

2002
The Promise of Privacy.
Proceedings of the 16th Conference on Systems Administration (LISA 2002), 2002


  Loading...