1. A Better Approach than Carrier-Grade-NAT Maennel, Olaf; Bush, Randy; Cittadini, Luca; Bellovin, Steven Michael 2008 Reports Computer science
2. Access Control Prefix Router Advertisement Option for IPv6 Bellovin, Steven Michael 2003 Reports Computer science
3. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
4. A Real World Identity Management System with Master Secret Revocation Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer science
5. A "Reason" Field for ICMP "Administratively Prohibited" Messages Bellovin, Steven Michael 2001 Reports Computer science
6. A Secure and Privacy-Preserving Targeted Ad-System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
7. Client Certificate and Key Retrieval for IKE Bellovin, Steven Michael; Moskowitz, Robert G. 2000 Reports Computer science
10. Frank Miller: Inventor of the One-Time Pad Bellovin, Steven Michael 2011 Reports Computer science
11. Further Information on Miller's 1882 One-Time Pad Bellovin, Steven Michael 2016 Reports CryptographersData encryption (Computer science)CryptographyComputer science
12. Guidelines for Cryptographic Key Management Bellovin, Steven Michael; Housley, Russell 2005 Reports Computer science
13. Guidelines for Specifying the Use of IPsec Version 2 Bellovin, Steven Michael 2009 Reports Computer science
14. ICMP Traceback Messages Bellovin, Steven Michael; Leech, Marcus; Taylor, Tom 2003 Reports Computer science
16. Mysterious Checks from Mauborgne to Fabyan Bellovin, Steven Michael 2014 Reports Computer science
17. Newspeak: A Secure Approach for Designing Web Applications Dent, Kyle; Bellovin, Steven Michael 2008 Reports Computer science
19. On the Use of Stream Control Transmission Protocol (SCTP) with IPsec Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Stewart, Randall R. 2003 Reports Computer science
20. OpenTor: Anonymity as a Commodity Service Androulaki, Elli; Raykova, Mariana Petrova; Stavrou, Angelos; Bellovin, Steven Michael 2007 Reports Computer science
21. Policy Algebras for Hybrid Firewalls Zhao, Hang; Bellovin, Steven Michael 2007 Reports Computer science
22. Privacy Enhanced Access Control for Outsourced Data Sharing Raykova, Mariana Petrova; Bellovin, Steven Michael; Zhao, Hang 2011 Reports Computer scienceComputers--Access controlComputer securityElectronic data processing--Security measuresCloud computing
23. Privacy-Enhanced Searches Using Encrypted Bloom Filters Bellovin, Steven Michael; Cheswick, William R. 2007 Reports Computer science
24. Privacy-Preserving, Taxable Bank Accounts Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer scienceBanks and banking
25. Report of the IAB Security Architecture Workshop Bellovin, Steven Michael 1998 Reports Computer science
26. Reputation Systems for Anonymous Networks Androulaki, Elli; Choi, Seung Geol; Bellovin, Steven Michael; Malkin, Tal G. 2007 Reports Computer science
27. Results of the Security in ActiveX Workshop, Pittsburgh, Pennsylvania USA, August 22-23, 2000 Bellovin, Steven Michael; Cohen, Cory; Havrilla, Jeffrey; Hernan, Shawn; King, Brian; Lanza, Jeffrey; Pesante, Linda; Pethia, Rich; McAllister, Sean; Henault, German; Goodden, R. Tom; Peterson, A. Padgett; Finnegan, Sean; Katano, Ken; Smith, Richard M.; Lowenthal, Ralph A. 2000 Reports Computer science
28. ROFL: Routing as the Firewall Layer Zhao, Hang; Chau, Chi-Kin; Bellovin, Steven Michael 2008 Reports Computer science
30. Security Through Obscurity Considered Dangerous Bellovin, Steven Michael; Bush, Randy 2002 Reports Computer science
31. Simple-VPN: Simple IPsec Configuration Srivatsan, Shreyas; Johnson, Maritza Lupe; Bellovin, Steven Michael 2010 Reports Computer science
32. Source Prefix Filtering in ROFL Zhao, Hang; Johnson, Maritza Lupe; Chau, Chi-Kin; Bellovin, Steven Michael 2009 Reports Computer science
33. Standards Maturity Variance Regarding the TCP MD5 Signature Option (RFC 2385) and the BGP-4 Specification Bellovin, Steven Michael; Zinin, Alex 2006 Reports Computer science
34. TCP Compression Filter Bellovin, Steven Michael; Buchsbaum, Adam L.; Muthukrishnan, S. 1999 Reports Computer science
35. TCP Filters Bellovin, Steven Michael; Buchsbaum, Adam L.; Muthukrishnan, S. 1999 Reports Computer science
37. The Failure of Online Social Network Privacy Settings Madejski, Michelle; Johnson, Maritza Lupe; Bellovin, Steven Michael 2011 Reports Computer science
38. The Security Flag in the IPv4 Header Bellovin, Steven Michael 2003 Reports Computer scienceIntrusion detection systems (Computer security)Internet communicationInternet--Safety measures
39. The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET Cheng, Yuu-Heng; Alexander, D. Scott; Poylisher, Alex; Raykova, Mariana Petrova; Bellovin, Steven Michael 2009 Reports Computer science
40. Trade-offs in Private Search Pappas, Vasileios; Raykova, Mariana Petrova; Vo, Binh D.; Bellovin, Steven Michael; Malkin, Tal G. 2010 Reports Computer science
41. Using Bloom Filters for Authenticated Yes/No Answers in the DNS Bellovin, Steven Michael 2001 Reports Computer science
42. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence Bellovin, Steven Michael 2014 Reports Computer science