Steven M. Bellovin
Orcid: 0000-0002-1231-0407Affiliations:
- Columbia University, New York City, USA
According to our database1,
Steven M. Bellovin
authored at least 159 papers
between 1986 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
J. Cybersecur., January, 2024
Recommendations for Government Development and Use of Advanced Automated Systems to Make Decisions about Individuals.
CoRR, 2024
2023
2022
Differential Privacy and Swapping: Examining De-Identification's Impact on Minority Representation and Privacy Preservation in the U.S. Census.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
2021
Proceedings of the MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June, 2021
2020
2019
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019
2018
2017
Limiting the undesired impact of cyber weapons: technical requirements and policy implications.
J. Cybersecur., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
2016
Computer, 2016
Proceedings of the New Codebreakers, 2016
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016
2015
Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015
"I Don't Have a Photograph, But You Can Have My Footprints" - Revealing the Demographics of Location Data.
Proceedings of the Ninth International Conference on Web and Social Media, 2015
2014
IEEE Secur. Priv., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
2013
IEEE Secur. Priv., 2013
2012
Proceedings of the Symposium On Usable Privacy and Security, 2012
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent.
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010
Proceedings of the Sixth International Conference on Mobile Ad-hoc and Sensor Networks, 2010
Proceedings of the Financial Cryptography and Data Security, 2010
Proceedings of the Computer Security, 2010
2009
IEEE Commun. Mag., 2009
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET.
Proceedings of the POLICY 2009, 2009
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009
Laissez-faire file sharing: access control designed for individuals at the endpoints.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009
Two-Person Control Administation: Preventing Administation Faults through Duplication.
Proceedings of the 23rd Large Installation System Administration Conference, 2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
2008
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008
IEEE Secur. Priv., 2008
Comput. Commun. Rev., 2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
Proceedings of the Privacy Enhancing Technologies, 2008
Proceedings of the Privacy Enhancing Technologies, 2008
Proceedings of the 2008 Workshop on New Security Paradigms, 2008
Proceedings of the Usability, Psychology, and Security, 2008
2007
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications.
Int. J. Netw. Secur., 2007
2006
Standards Maturity Variance Regarding the TCP MD5 Signature Option (RFC 2385) and the BGP-4 Specification.
RFC, January, 2006
IEEE Secur. Priv., 2006
Proceedings of the 2006 USENIX/ACCURATE Electronic Voting Technology Workshop, 2006
Privacy & Cryptography.
Proceedings of the 2006 USENIX Annual Technical Conference, 2006
Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography.
Proceedings of the 2006 USENIX Annual Technical Conference, 2006
Proceedings of the Network and Distributed System Security Symposium, 2006
2005
2004
ACM Trans. Inf. Syst. Secur., 2004
IACR Cryptol. ePrint Arch., 2004
Nuclear Weapons, Permissive Action Links, and the History of Public Key Cryptography.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
RFC, July, 2003
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003
2002
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002
Proceedings of the Network and Distributed System Security Symposium, 2002
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, 2002
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per Host.
Proceedings of the 10th USENIX Security Symposium, 2001
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, 2001
Security Risks Of Peer-To-Peer Networking.
Proceedings of the Network and Distributed System Security Symposium, 2001
2000
1999
IEEE Internet Comput., 1999
Proceedings of the Network and Distributed System Security Symposium, 1999
Proceedings of the Network and Distributed System Security Symposium, 1999
Proceedings of the 13th Conference on Systems Administration (LISA-99), 1999
1998
RFC, November, 1998
1997
The risks of key recovery, key escrow, and trusted third-party encryption.
World Wide Web J., 1997
Proceedings of the Network and Distributed System Security Symposium, 1997
Network and Internet Security.
Proceedings of the Computer Science and Engineering Handbook, 1997
1996
Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996, 1996
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996
1995
Proceedings of the 5th USENIX Security Symposium, 1995
Firewalls and internet security - repelling the wily hacker.
Addison-Wesley professional computing series, Addison-Wesley, ISBN: 978-0-201-63357-3, 1995
1994
IEEE Trans. Inf. Theory, 1994
1993
Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise.
Proceedings of the CCS '93, 1993
1992
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992
1990
1989
1986
PATHALIAS or The Care and Feeding of Relative Addresses.
Proceedings of the USENIX Summer Conference, Altanta, GA, USA, June 1986, 1986