1. Further Information on Miller's 1882 One-Time Pad Bellovin, Steven Michael 2016 Reports CryptographersData encryption (Computer science)CryptographyComputer science
4. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence Bellovin, Steven Michael 2014 Reports Computer science
6. Privacy Enhanced Access Control for Outsourced Data Sharing Raykova, Mariana Petrova; Bellovin, Steven Michael; Zhao, Hang 2011 Reports Computer scienceComputers--Access controlComputer securityElectronic data processing--Security measuresCloud computing
7. The Failure of Online Social Network Privacy Settings Madejski, Michelle; Johnson, Maritza Lupe; Bellovin, Steven Michael 2011 Reports Computer science
8. A Real World Identity Management System with Master Secret Revocation Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer science
9. Privacy-Preserving, Taxable Bank Accounts Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer scienceBanks and banking
10. Simple-VPN: Simple IPsec Configuration Srivatsan, Shreyas; Johnson, Maritza Lupe; Bellovin, Steven Michael 2010 Reports Computer science
11. Trade-offs in Private Search Pappas, Vasileios; Raykova, Mariana Petrova; Vo, Binh D.; Bellovin, Steven Michael; Malkin, Tal G. 2010 Reports Computer science
12. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
13. A Secure and Privacy-Preserving Targeted Ad-System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
14. Source Prefix Filtering in ROFL Zhao, Hang; Johnson, Maritza Lupe; Chau, Chi-Kin; Bellovin, Steven Michael 2009 Reports Computer science
15. The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET Cheng, Yuu-Heng; Alexander, D. Scott; Poylisher, Alex; Raykova, Mariana Petrova; Bellovin, Steven Michael 2009 Reports Computer science
16. A Better Approach than Carrier-Grade-NAT Maennel, Olaf; Bush, Randy; Cittadini, Luca; Bellovin, Steven Michael 2008 Reports Computer science
17. Newspeak: A Secure Approach for Designing Web Applications Dent, Kyle; Bellovin, Steven Michael 2008 Reports Computer science
18. ROFL: Routing as the Firewall Layer Zhao, Hang; Chau, Chi-Kin; Bellovin, Steven Michael 2008 Reports Computer science
19. OpenTor: Anonymity as a Commodity Service Androulaki, Elli; Raykova, Mariana Petrova; Stavrou, Angelos; Bellovin, Steven Michael 2007 Reports Computer science
20. Policy Algebras for Hybrid Firewalls Zhao, Hang; Bellovin, Steven Michael 2007 Reports Computer science
21. Privacy-Enhanced Searches Using Encrypted Bloom Filters Bellovin, Steven Michael; Cheswick, William R. 2007 Reports Computer science
22. Reputation Systems for Anonymous Networks Androulaki, Elli; Choi, Seung Geol; Bellovin, Steven Michael; Malkin, Tal G. 2007 Reports Computer science