1. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence Bellovin, Steven Michael 2014 Reports Computer science
2. Using Bloom Filters for Authenticated Yes/No Answers in the DNS Bellovin, Steven Michael 2001 Reports Computer science
3. Trade-offs in Private Search Pappas, Vasileios; Raykova, Mariana Petrova; Vo, Binh D.; Bellovin, Steven Michael; Malkin, Tal G. 2010 Reports Computer science
4. The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET Cheng, Yuu-Heng; Alexander, D. Scott; Poylisher, Alex; Raykova, Mariana Petrova; Bellovin, Steven Michael 2009 Reports Computer science
5. The Security Flag in the IPv4 Header Bellovin, Steven Michael 2003 Reports Computer scienceIntrusion detection systems (Computer security)Internet communicationInternet--Safety measures
6. The Failure of Online Social Network Privacy Settings Madejski, Michelle; Johnson, Maritza Lupe; Bellovin, Steven Michael 2011 Reports Computer science
8. TCP Filters Bellovin, Steven Michael; Buchsbaum, Adam L.; Muthukrishnan, S. 1999 Reports Computer science
9. TCP Compression Filter Bellovin, Steven Michael; Buchsbaum, Adam L.; Muthukrishnan, S. 1999 Reports Computer science
10. Standards Maturity Variance Regarding the TCP MD5 Signature Option (RFC 2385) and the BGP-4 Specification Bellovin, Steven Michael; Zinin, Alex 2006 Reports Computer science
11. Source Prefix Filtering in ROFL Zhao, Hang; Johnson, Maritza Lupe; Chau, Chi-Kin; Bellovin, Steven Michael 2009 Reports Computer science
12. Simple-VPN: Simple IPsec Configuration Srivatsan, Shreyas; Johnson, Maritza Lupe; Bellovin, Steven Michael 2010 Reports Computer science
13. Security Through Obscurity Considered Dangerous Bellovin, Steven Michael; Bush, Randy 2002 Reports Computer science
15. ROFL: Routing as the Firewall Layer Zhao, Hang; Chau, Chi-Kin; Bellovin, Steven Michael 2008 Reports Computer science
16. Results of the Security in ActiveX Workshop, Pittsburgh, Pennsylvania USA, August 22-23, 2000 Bellovin, Steven Michael; Cohen, Cory; Havrilla, Jeffrey; Hernan, Shawn; King, Brian; Lanza, Jeffrey; Pesante, Linda; Pethia, Rich; McAllister, Sean; Henault, German; Goodden, R. Tom; Peterson, A. Padgett; Finnegan, Sean; Katano, Ken; Smith, Richard M.; Lowenthal, Ralph A. 2000 Reports Computer science
17. Reputation Systems for Anonymous Networks Androulaki, Elli; Choi, Seung Geol; Bellovin, Steven Michael; Malkin, Tal G. 2007 Reports Computer science
18. Report of the IAB Security Architecture Workshop Bellovin, Steven Michael 1998 Reports Computer science
19. Privacy-Preserving, Taxable Bank Accounts Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer scienceBanks and banking
20. Privacy-Enhanced Searches Using Encrypted Bloom Filters Bellovin, Steven Michael; Cheswick, William R. 2007 Reports Computer science
21. Privacy Enhanced Access Control for Outsourced Data Sharing Raykova, Mariana Petrova; Bellovin, Steven Michael; Zhao, Hang 2011 Reports Computer scienceComputers--Access controlComputer securityElectronic data processing--Security measuresCloud computing
22. Policy Algebras for Hybrid Firewalls Zhao, Hang; Bellovin, Steven Michael 2007 Reports Computer science
23. OpenTor: Anonymity as a Commodity Service Androulaki, Elli; Raykova, Mariana Petrova; Stavrou, Angelos; Bellovin, Steven Michael 2007 Reports Computer science
24. On the Use of Stream Control Transmission Protocol (SCTP) with IPsec Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Stewart, Randall R. 2003 Reports Computer science
26. Newspeak: A Secure Approach for Designing Web Applications Dent, Kyle; Bellovin, Steven Michael 2008 Reports Computer science
27. Mysterious Checks from Mauborgne to Fabyan Bellovin, Steven Michael 2014 Reports Computer science
29. ICMP Traceback Messages Bellovin, Steven Michael; Leech, Marcus; Taylor, Tom 2003 Reports Computer science
30. Guidelines for Specifying the Use of IPsec Version 2 Bellovin, Steven Michael 2009 Reports Computer science
31. Guidelines for Cryptographic Key Management Bellovin, Steven Michael; Housley, Russell 2005 Reports Computer science
32. Further Information on Miller's 1882 One-Time Pad Bellovin, Steven Michael 2016 Reports CryptographersData encryption (Computer science)CryptographyComputer science
33. Frank Miller: Inventor of the One-Time Pad Bellovin, Steven Michael 2011 Reports Computer science
36. Client Certificate and Key Retrieval for IKE Bellovin, Steven Michael; Moskowitz, Robert G. 2000 Reports Computer science
37. A Secure and Privacy-Preserving Targeted Ad-System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
38. A "Reason" Field for ICMP "Administratively Prohibited" Messages Bellovin, Steven Michael 2001 Reports Computer science
39. A Real World Identity Management System with Master Secret Revocation Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer science
40. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
41. Access Control Prefix Router Advertisement Option for IPv6 Bellovin, Steven Michael 2003 Reports Computer science
42. A Better Approach than Carrier-Grade-NAT Maennel, Olaf; Bush, Randy; Cittadini, Luca; Bellovin, Steven Michael 2008 Reports Computer science