Simson L. Garfinkel
Orcid: 0000-0003-1294-2831Affiliations:
- U.S. Department of Homeland Security, Washington, DC, USA
- U.S. Census Bureau, Center for Disclosure Avoidance Research, Suitland, MD, USA
- National Institute of Standards and Technology, Gaithersberg, MD, USA
- Naval Postgraduate School, Washington, DC, USA
- Massachusetts Institute of Technology, CSAIL, Cambridge, MA, USA
According to our database1,
Simson L. Garfinkel
authored at least 104 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
1995
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
2
5
3
3
4
1
2
1
2
2
3
7
5
4
4
1
4
3
1
1
4
1
2
1
1
1
1
4
1
1
2
2
3
2
1
4
3
1
1
1
1
1
1
1
1
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on viaf.org
-
on orcid.org
-
on id.loc.gov
-
on github.com
-
on d-nb.info
-
on simson.net
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
2023
2022
2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
2020
Proceedings of the WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, 2020
2018
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
2017
Digit. Investig., 2017
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
IEEE Secur. Priv., 2016
Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, 2016
2015
Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb.
Digit. Investig., 2015
2014
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02343-9, 2014
IEEE Secur. Priv., 2014
Proceedings of the Advances in Digital Forensics X, 2014
2013
Book Review: iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices.
J. Digit. Forensics Secur. Law, 2013
Comput. Secur., 2013
2012
Lessons learned writing digital forensics tools and managing a 30TB digital evidence corpus.
Digit. Investig., 2012
2011
Digit. Investig., 2011
Extending digital repository architectures to support disk image preservation and access.
Proceedings of the 2011 Joint International Conference on Digital Libraries, 2011
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011
2010
IEEE Trans. Inf. Forensics Secur., 2010
Using purpose-built functions and block hashes to enable small block and sub-file forensics.
Digit. Investig., 2010
Proceedings of the 2010 Annual ACM SIGAda International Conference on Ada, 2010
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010
2009
Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools.
Int. J. Digit. Crime Forensics, 2009
Digit. Investig., 2009
Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow.
Digit. Investig., 2009
Invisible HCI-SEC: ways of re-architecting the operating system to increase usability and security.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009
Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009
2008
Proceedings of the Usability, Psychology, and Security, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Digit. Investig., 2007
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
2006
One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
Proceedings of the Provenance and Annotation of Data, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006
2005
Design principles and patterns for computer systems that are simultaneously secure and usable.
PhD thesis, 2005
IEEE Secur. Priv., 2005
Proceedings of the 1st Symposium on Usable Privacy and Security, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005
2004
Proceedings of the 18th Conference on Systems Administration (LISA 2004), 2004
2003
IEEE Secur. Priv., 2003
IEEE Secur. Priv., 2003
IEEE Security & Privacy: Data Forensics - Rememberance of Data Passed: A Study of Disk Sanitization Practices.
IEEE Distributed Syst. Online, 2003
Proceedings of the 2003 Annual National Conference on Digital Government Research, 2003
Practical Unix and internet security - securing Solaris, Mac OS X, Linux and FreeBSD: extensivley revised (3. ed.).
O'Reilly, ISBN: 978-0-596-00323-4, 2003
2002
O'Reilly, ISBN: 978-0-596-00235-0, 2002
2001
Database nation - the death of privacy in the 21th century.
O'Reilly, ISBN: 978-0-596-00105-6, 2001
2000
My net connection approaches light speed with cable, but that doesn't guarantee victory over DSL.
Proceedings of the Tenth Conference on Computers, 2000
1998
Stopping spam - stamping out unwanted email and news postings.
O'Reilly, ISBN: 978-1-56592-388-1, 1998
1997
Secure CGI/API programming.
World Wide Web J., 1997
Cryptography and the Web.
World Wide Web J., 1997
Web security and commerce - risks, technologies, and strategies.
O'Reilly, ISBN: 978-1-56592-269-3, 1997
1996
Practical UNIX and internet security (2. ed.).
O'Reilly, ISBN: 978-1-56592-148-1, 1996
1995
PGP - pretty good privacy: encryption for everyone (2. ed.).
O'Reilly, ISBN: 978-1-56592-098-9, 1995