21. OpenTor: Anonymity as a Commodity Service Androulaki, Elli; Raykova, Mariana Petrova; Stavrou, Angelos; Bellovin, Steven Michael 2007 Reports Computer science
22. Policy Algebras for Hybrid Firewalls Zhao, Hang; Bellovin, Steven Michael 2007 Reports Computer science
23. Privacy-Enhanced Searches Using Encrypted Bloom Filters Bellovin, Steven Michael; Cheswick, William R. 2007 Reports Computer science
24. Reputation Systems for Anonymous Networks Androulaki, Elli; Choi, Seung Geol; Bellovin, Steven Michael; Malkin, Tal G. 2007 Reports Computer science
25. Standards Maturity Variance Regarding the TCP MD5 Signature Option (RFC 2385) and the BGP-4 Specification Bellovin, Steven Michael; Zinin, Alex 2006 Reports Computer science
26. Guidelines for Cryptographic Key Management Bellovin, Steven Michael; Housley, Russell 2005 Reports Computer science
27. Access Control Prefix Router Advertisement Option for IPv6 Bellovin, Steven Michael 2003 Reports Computer science
28. ICMP Traceback Messages Bellovin, Steven Michael; Leech, Marcus; Taylor, Tom 2003 Reports Computer science
29. On the Use of Stream Control Transmission Protocol (SCTP) with IPsec Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Stewart, Randall R. 2003 Reports Computer science
30. The Security Flag in the IPv4 Header Bellovin, Steven Michael 2003 Reports Computer scienceIntrusion detection systems (Computer security)Internet communicationInternet--Safety measures