Sean W. Smith
Orcid: 0000-0001-5995-574XAffiliations:
- Dartmouth College, Hanover, USA
According to our database1,
Sean W. Smith
authored at least 150 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
The HTTP Garden: Discovering Parsing Vulnerabilities in HTTP/1.1 Implementations by Differential Fuzzing of Request Streams.
CoRR, 2024
Proceedings of the IEEE Security and Privacy, 2024
Weird Machines in Package Managers: A Case Study of Input Language Complexity and Emergent Execution in Software Systems.
Proceedings of the IEEE Security and Privacy, 2024
2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
Proceedings of the Critical Infrastructure Protection XV, 2021
2020
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020
Proceedings of the ETRA '20: 2020 Symposium on Eye Tracking Research and Applications, 2020
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020
2019
Proceedings of the Security Protocols XXVII, 2019
Scalable Identity and Key Management for Publish-Subscribe Protocols in the Internet-of-Things.
Proceedings of the 9th International Conference on the Internet of Things, 2019
Proceedings of the Critical Infrastructure Protection XIII, 2019
Proceedings of the Critical Infrastructure Protection XIII, 2019
2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the New Security Paradigms Workshop, 2018
Reinventing the privilege drop: how principled preservation of programmer intent would prevent security bugs.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018
2017
Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Protecting Against Malicious Bits On the Wire: Automatically Generating a USB Protocol Parser for a Production Kernel.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users.
Proceedings of the Workshop on Security Fatigue, 2016
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 2016
Proceedings of the Artificial Intelligence for Cyber Security, 2016
2015
Solving the Grid Defender's Dilemma: Tamper Protection for Distributed Cyber-Physical Systems.
Proceedings of the SECRYPT 2015, 2015
Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient?
Proceedings of the Driving Quality in Informatics: Fulfilling the Promise, 2015
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015
Measuring the security impacts of password policies using cognitive behavioral agent-based modeling.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015
2014
Healthcare information technology's relativity problems: a typology of how patients' physical reality, clinicians' mental models, and healthcare information technology differ.
J. Am. Medical Informatics Assoc., 2014
2013
J. Biomed. Informatics, 2013
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013
2012
Intrusion detection for resource-constrained embedded control systems in the power grid.
Int. J. Crit. Infrastructure Prot., 2012
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012
Proceedings of the Strategies, 2012
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IEEE Trans. Dependable Secur. Comput., 2011
IEEE Secur. Priv., 2011
Proceedings of the USENIX Workshop on Hot Topics in Management of Internet, 2011
Proceedings of the Critical Infrastructure Protection V, 2011
Proceedings of the Critical Infrastructure Protection V, 2011
2010
ACM Trans. Inf. Syst. Secur., 2010
Int. J. Secur. Softw. Eng., 2010
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
Proceedings of the Critical Infrastructure Protection IV, 2010
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010
Proceedings of the Public Key Infrastructures, Services and Applications, 2010
The diversity of TPMs and its effects on development: a case study of integrating the TPM into OpenSolaris.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010
Proceedings of the ARES 2010, 2010
2009
Int. J. Grid High Perform. Comput., 2009
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009
Proceedings of the Public Key Infrastructures, Services and Applications, 2009
Proceedings of the Public Key Infrastructures, Services and Applications, 2009
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009
2008
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008
TwoKind authentication: protecting private information in untrustworthy environments.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008
Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the Advances in Information and Computer Security, 2007
Proceedings of the Enterprise Applications and Services in the Finance Industry, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the Public Key Infrastructure, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the Public Key Infrastructure, 2006
2005
Turing is from Mars, Shannon is from Venus: Computer Science and Computer Engineering.
IEEE Secur. Priv., 2005
IEEE Secur. Priv., 2005
Proceedings of the Third Annual Conference on Privacy, 2005
Proceedings of the Public Key Infrastructure, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
Springer, ISBN: 978-0-387-23916-3, 2005
2004
Evaluation of efficient security for BGP route announcements using parallel simulation.
Simul. Model. Pract. Theory, 2004
Int. J. Inf. Sec., 2004
IEEE Secur. Priv., 2004
Proceedings of the Second Annual Conference on Privacy, 2004
Proceedings of the Information Security Management, Education and Privacy, 2004
Detecting Unauthorized Use in Online Journal Archives: A Case Study.
Proceedings of the IADIS International Conference WWW/Internet 2004, 2004
Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth.
Proceedings of the IADIS International Conference WWW/Internet 2004, 2004
Proceedings of the Public Key Infrastructure, 2004
Proceedings of the Public Key Infrastructure, 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
2002
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002
Proceedings of the Advanced Communications and Multimedia Security, 2002
2001
SIGecom Exch., 2001
Proceedings of the 10th USENIX Security Symposium, 2001
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001
Proceedings of the E-Commerce Agents, 2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
1999
1998
Trusting Trusted Hardware: Towards a Formal Model for Programmable Secure Coprocessors.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998
Proceedings of the Financial Cryptography, 1998
1996
Minimizing Timestamp Size for Completely Asynchronous Optimistic Recovery with Minimal Rollback.
Proceedings of the 15th Symposium on Reliable Distributed Systems, 1996
1995
Proceedings of the Digest of Papers: FTCS-25, 1995
1991
Proceedings of the Fourth Annual Workshop on Computational Learning Theory, 1991