1. Keys under doormats: mandating insecurity by requiring government access to all data and communications Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J. 2015 Articles Computer networks--Security measuresComputer securityInternet--Security measuresComputer science
2. Usable Secure Private Search Raykova, Mariana Petrova; Cui, Ang; Vo, Binh D.; Liu, Bin; Malkin, Tal G.; Bellovin, Steven Michael; Stolfo, Salvatore 2012 Articles Computer science
3. Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent Johnson, Maritza Lupe; Bellovin, Steven Michael; Keromytis, Angelos D. 2011 Articles Computer science
4. High Performance Firewalls in MANETs Zhao, Hang; Bellovin, Steven Michael 2011 Articles Computer science
5. Policy Refinement of Network Services for MANETs Zhao, Hang; Lobo, Jorge; Roy, Arnab; Bellovin, Steven Michael 2011 Articles Computer science
6. Identity and Security Bellovin, Steven Michael 2010 Articles Computer scienceComputer securityOperating systems (Computers)--Security measures
7. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Articles Computer science
8. APOD: Anonymous Physical Object Delivery Androulaki, Elli; Bellovin, Steven Michael 2009 Articles Computer science
9. Configuration Management and Security Bellovin, Steven Michael; Bush, Randy 2009 Articles Computer science
10. Cybersecurity through an Identity Management System Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2009 Articles Computer science
11. Laissez-faire file sharing: Access control designed for individuals at the endpoints Johnson, Maritza Lupe; Bellovin, Steven Michael; Reeder, Robert W.; Schechter, Stuart E. 2009 Articles Computer scienceComputer file sharingComputers--Access control
12. Secure Anonymous Database Search Raykova, Mariana Petrova; Vo, Binh D.; Bellovin, Steven Michael; Malkin, Tal G. 2009 Articles Computer science
15. Two-Person Control Administration: Preventing Administration Faults through Duplication Potter, Shaya; Bellovin, Steven Michael; Nieh, Jason 2009 Articles Computer science
16. An Algebra for Integration and Analysis of Ponder2 Policies Zhao, Hang; Lobo, Jorge; Bellovin, Steven Michael 2008 Articles Computer science
17. PAR: Payment for Anonymous Routing Androulaki, Elli; Raykova, Mariana Petrova; Srivatsan, Shreyas; Stavrou, Angelos; Bellovin, Steven Michael 2008 Articles Computer science
18. Reputation Systems for Anonymous Networks Androulaki, Elli; Choi, Seung Geol; Bellovin, Steven Michael; Malkin, Tal G. 2008 Articles Computer science
19. Risking Communications Security: Potential Hazards of the Protect America Act Bellovin, Steven Michael; Blaze, Matt; Diffie, Whitfield; Landau, Susan; Neumann, Peter G.; Rexford, Jennifer 2008 Articles Computer science
20. RUST: A Retargetable Usability Testbed for Website Authentication Technologies Johnson, Maritza Lupe; Atreya, Chaitanya; Aviv, Adam; Raykova, Mariana Petrova; Bellovin, Steven Michael; Kaiser, Gail E. 2008 Articles Computer science
21. Security Assurance for Web Device APIs Johnson, Maritza Lupe; Bellovin, Steven Michael 2008 Articles Computer science
22. Security by Checklist Bellovin, Steven Michael 2008 Articles Computer scienceComputer securityComputers--Access controlUser interfaces (Computer systems)
26. Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications Ioannidis, Sotiris; Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2007 Articles Computer science
27. A Clean-Slate Design for the Next-Generation Secure Internet Bellovin, Steven Michael; Clark, David D.; Perrig, Adrian; Song, Dawn 2006 Articles Computer science
28. Deploying a New Hash Algorithm Bellovin, Steven Michael; Rescorla, Eric K. 2006 Articles Computer science
29. On the Brittleness of Software and the Infeasibility of Security Metrics Bellovin, Steven Michael 2006 Articles Computer science
30. Prerendered User Interfaces for Higher-Assurance Electronic Voting Yee, Ka-Ping; Wagner, David A.; Hearst, Marti; Bellovin, Steven Michael 2006 Articles Computer science
31. Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP Bellovin, Steven Michael; Blaze, Matt; Brickell, Ernest; Brooks, Clinton; Cerf, Vinton; Diffie, Whitfield; Landau, Susan; Peterson, Jon; Treichler, John 2006 Articles Computer science
33. Worm propagation strategies in an IPv6 Internet Bellovin, Steven Michael; Cheswick, Bill; Keromytis, Angelos D. 2006 Articles Computer science
35. A Look Back at "Security Problems in the TCP/IP Protocol Suite" Bellovin, Steven Michael 2004 Articles Computer science
36. Just Fast Keying: Key Agreement in a Hostile Internet Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer 2004 Articles Computer science
37. Spamming, Phishing, Authentication, and Privacy Bellovin, Steven Michael 2004 Articles Computer science
38. Design and Implementation of Virtual Private Services Ioannidis, Sotiris; Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Smith, Jonathan M. 2003 Articles Computer science
39. Using Link Cuts to Attack Internet Routing Bellovin, Steven Michael; Gansner, Emden R. 2003 Articles Computer science
41. Controlling High Bandwidth Aggregates in the Network Mahajan, Ratul; Bellovin, Steven Michael; Floyd, Sally; Ioannidis, John; Paxson, Vern; Shenker, Scott 2002 Articles Computer science
42. Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer 2002 Articles Computer science
43. Implementing Pushback: Router-Based Defense Against DDoS Attacks Ioannidis, John; Bellovin, Steven Michael 2002 Articles Computer science
44. Sub-Operating Systems: A New Approach to Application Security Ioannidis, Sotiris; Bellovin, Steven Michael; Smith, Jonathan M. 2002 Articles Computer science
45. Building a Secure Web Browser Ioannidis, Sotiris; Bellovin, Steven Michael 2001 Articles Computer science
47. Cryptographic Modes of Operation for the Internet Bellovin, Steven Michael; Blaze, Matt 2001 Articles Computer science
48. Efficient, DoS-resistant, Secure Key Exchange for Internet Protocols Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Ioannidis, John; Canetti, Ran; Keromytis, Angelos D.; Reingold, Omer 2001 Articles Computer science
49. Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per Host Gleitz, Peter M.; Bellovin, Steven Michael 2001 Articles Computer science
50. AES Key Agility Issues in High-Speed IPsec Implementations Whiting, Doug; Schneier, Bruce; Bellovin, Steven Michael 2000 Articles Computer science