2. A Better Approach than Carrier-Grade-NAT Maennel, Olaf; Bush, Randy; Cittadini, Luca; Bellovin, Steven Michael 2008 Reports Computer science
3. A Better Key Schedule for DES-like Ciphers Blumenthal, Uri; Bellovin, Steven Michael 1996 Articles Computer science
4. A "Bump in the Stack" Encryptor for MS-DOS Systems Wagner, David A.; Bellovin, Steven Michael 1996 Articles Computer science
5. Access Control Prefix Router Advertisement Option for IPv6 Bellovin, Steven Michael 2003 Reports Computer science
6. A Clean-Slate Design for the Next-Generation Secure Internet Bellovin, Steven Michael; Clark, David D.; Perrig, Adrian; Song, Dawn 2006 Articles Computer science
7. A DNS Filter and Switch for Packet-filtering Gateways Cheswick, Bill; Bellovin, Steven Michael 1996 Articles Computer science
8. AES Key Agility Issues in High-Speed IPsec Implementations Whiting, Doug; Schneier, Bruce; Bellovin, Steven Michael 2000 Articles Computer science
9. A Look Back at "Security Problems in the TCP/IP Protocol Suite" Bellovin, Steven Michael 2004 Articles Computer science
10. An Algebra for Integration and Analysis of Ponder2 Policies Zhao, Hang; Lobo, Jorge; Bellovin, Steven Michael 2008 Articles Computer science
11. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Articles Computer science
12. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
13. An Attack on the Interlock Protocol When Used for Authentication Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science
14. APOD: Anonymous Physical Object Delivery Androulaki, Elli; Bellovin, Steven Michael 2009 Articles Computer science
15. A Programmable Plaintext Recognizer Wagner, David A.; Bellovin, Steven Michael 1994 Articles Computer science
16. A Real World Identity Management System with Master Secret Revocation Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer science
17. A "Reason" Field for ICMP "Administratively Prohibited" Messages Bellovin, Steven Michael 2001 Reports Computer science
18. A Secure and Privacy-Preserving Targeted Ad-System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
20. Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science
21. Building a Secure Web Browser Ioannidis, Sotiris; Bellovin, Steven Michael 2001 Articles Computer science
22. Client Certificate and Key Retrieval for IKE Bellovin, Steven Michael; Moskowitz, Robert G. 2000 Reports Computer science
24. Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent Johnson, Maritza Lupe; Bellovin, Steven Michael; Keromytis, Angelos D. 2011 Articles Computer science
25. Configuration Management and Security Bellovin, Steven Michael; Bush, Randy 2009 Articles Computer science
26. Controlling High Bandwidth Aggregates in the Network Mahajan, Ratul; Bellovin, Steven Michael; Floyd, Sally; Ioannidis, John; Paxson, Vern; Shenker, Scott 2002 Articles Computer science
27. Critical Infrastructures You Can Trust: Where Telecommunications Fits Schneider, Fred B.; Bellovin, Steven Michael; Inouye, Alan S. 1998 Articles Computer science
28. Cryptographic Modes of Operation for the Internet Bellovin, Steven Michael; Blaze, Matt 2001 Articles Computer science
30. Cybersecurity Research Needs Bellovin, Steven Michael 2003 Presentations (Communicative Events) Computer science
31. Cybersecurity through an Identity Management System Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2009 Articles Computer science
33. Deploying a New Hash Algorithm Bellovin, Steven Michael; Rescorla, Eric K. 2006 Articles Computer science
34. Design and Implementation of Virtual Private Services Ioannidis, Sotiris; Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Smith, Jonathan M. 2003 Articles Computer science
37. Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer 2002 Articles Computer science
38. Efficient, DoS-resistant, Secure Key Exchange for Internet Protocols Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Ioannidis, John; Canetti, Ran; Keromytis, Angelos D.; Reingold, Omer 2001 Articles Computer science
39. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks Bellovin, Steven Michael; Merritt, Michael 1992 Articles Computer scienceComputer securityData encryption (Computer science)Public key cryptography
41. Frank Miller: Inventor of the One-Time Pad Bellovin, Steven Michael 2011 Reports Computer science
42. Further Information on Miller's 1882 One-Time Pad Bellovin, Steven Michael 2016 Reports CryptographersData encryption (Computer science)CryptographyComputer science
43. Guidelines for Cryptographic Key Management Bellovin, Steven Michael; Housley, Russell 2005 Reports Computer science
44. Guidelines for Specifying the Use of IPsec Version 2 Bellovin, Steven Michael 2009 Reports Computer science
45. High Performance Firewalls in MANETs Zhao, Hang; Bellovin, Steven Michael 2011 Articles Computer science
46. ICMP Traceback Messages Bellovin, Steven Michael; Leech, Marcus; Taylor, Tom 2003 Reports Computer science
47. Identity and Security Bellovin, Steven Michael 2010 Articles Computer scienceComputer securityOperating systems (Computers)--Security measures
48. Implementing a Distributed Firewall Ioannidis, Sotiris; Keromytis, Angelos D.; Bellovin, Steven Michael; Smith, Jonathan M. 2000 Articles Computer scienceFirewalls (Computer security)IPSec (Computer network protocol)Computer networks--Security measuresOpenBSD (Electronic resource)
49. Implementing Pushback: Router-Based Defense Against DDoS Attacks Ioannidis, John; Bellovin, Steven Michael 2002 Articles Computer science
50. Just Fast Keying: Key Agreement in a Hostile Internet Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer 2004 Articles Computer science
52. Keys under doormats: mandating insecurity by requiring government access to all data and communications Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J. 2015 Articles Computer networks--Security measuresComputer securityInternet--Security measuresComputer science
53. Laissez-faire file sharing: Access control designed for individuals at the endpoints Johnson, Maritza Lupe; Bellovin, Steven Michael; Reeder, Robert W.; Schechter, Stuart E. 2009 Articles Computer scienceComputer file sharingComputers--Access control
54. Limitations of the Kerberos Authentication System Bellovin, Steven Michael; Merritt, Michael 1991 Articles Computer science
55. Moat: A Virtual Private Network Appliance and Services Platform Denker, John S.; Bellovin, Steven Michael; Daniel, Hugh; Mintz, Nancy L.; Killian, Tom; Plotnick, Mark A. 1999 Articles Computer science
56. Mysterious Checks from Mauborgne to Fabyan Bellovin, Steven Michael 2014 Reports Computer science
57. Newspeak: A Secure Approach for Designing Web Applications Dent, Kyle; Bellovin, Steven Michael 2008 Reports Computer science
59. On the Brittleness of Software and the Infeasibility of Security Metrics Bellovin, Steven Michael 2006 Articles Computer science
60. On the Use of Stream Control Transmission Protocol (SCTP) with IPsec Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Stewart, Randall R. 2003 Reports Computer science
61. OpenTor: Anonymity as a Commodity Service Androulaki, Elli; Raykova, Mariana Petrova; Stavrou, Angelos; Bellovin, Steven Michael 2007 Reports Computer science
63. PAR: Payment for Anonymous Routing Androulaki, Elli; Raykova, Mariana Petrova; Srivatsan, Shreyas; Stavrou, Angelos; Bellovin, Steven Michael 2008 Articles Computer science
64. PATHALIAS, or, The Care and Feeding of Relative Addresses Honeyman, Peter; Bellovin, Steven Michael 1986 Articles Computer science
65. Policy Algebras for Hybrid Firewalls Zhao, Hang; Bellovin, Steven Michael 2007 Reports Computer science
66. Policy Refinement of Network Services for MANETs Zhao, Hang; Lobo, Jorge; Roy, Arnab; Bellovin, Steven Michael 2011 Articles Computer science
67. Prerendered User Interfaces for Higher-Assurance Electronic Voting Yee, Ka-Ping; Wagner, David A.; Hearst, Marti; Bellovin, Steven Michael 2006 Articles Computer science
68. Privacy Enhanced Access Control for Outsourced Data Sharing Raykova, Mariana Petrova; Bellovin, Steven Michael; Zhao, Hang 2011 Reports Computer scienceComputers--Access controlComputer securityElectronic data processing--Security measuresCloud computing
69. Privacy-Enhanced Searches Using Encrypted Bloom Filters Bellovin, Steven Michael; Cheswick, William R. 2007 Reports Computer science
70. Privacy-Preserving, Taxable Bank Accounts Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer scienceBanks and banking
71. Probable Plaintext Cryptanalysis of the IP Security Protocols Bellovin, Steven Michael 1997 Articles Computer science
72. Problem Areas for the IP Security Protocols Bellovin, Steven Michael 1996 Articles Computer science
73. Pseudo-Network Drivers and Virtual Networks Bellovin, Steven Michael 1990 Articles Computer science
74. Report of the IAB Security Architecture Workshop Bellovin, Steven Michael 1998 Reports Computer science
75. Reputation Systems for Anonymous Networks Androulaki, Elli; Choi, Seung Geol; Bellovin, Steven Michael; Malkin, Tal G. 2008 Articles Computer science
76. Reputation Systems for Anonymous Networks Androulaki, Elli; Choi, Seung Geol; Bellovin, Steven Michael; Malkin, Tal G. 2007 Reports Computer science
77. Results of the Security in ActiveX Workshop, Pittsburgh, Pennsylvania USA, August 22-23, 2000 Bellovin, Steven Michael; Cohen, Cory; Havrilla, Jeffrey; Hernan, Shawn; King, Brian; Lanza, Jeffrey; Pesante, Linda; Pethia, Rich; McAllister, Sean; Henault, German; Goodden, R. Tom; Peterson, A. Padgett; Finnegan, Sean; Katano, Ken; Smith, Richard M.; Lowenthal, Ralph A. 2000 Reports Computer science
78. Risking Communications Security: Potential Hazards of the Protect America Act Bellovin, Steven Michael; Blaze, Matt; Diffie, Whitfield; Landau, Susan; Neumann, Peter G.; Rexford, Jennifer 2008 Articles Computer science
79. ROFL: Routing as the Firewall Layer Zhao, Hang; Chau, Chi-Kin; Bellovin, Steven Michael 2008 Reports Computer science
80. RUST: A Retargetable Usability Testbed for Website Authentication Technologies Johnson, Maritza Lupe; Atreya, Chaitanya; Aviv, Adam; Raykova, Mariana Petrova; Bellovin, Steven Michael; Kaiser, Gail E. 2008 Articles Computer science
81. Secure Anonymous Database Search Raykova, Mariana Petrova; Vo, Binh D.; Bellovin, Steven Michael; Malkin, Tal G. 2009 Articles Computer science
84. Security Assurance for Web Device APIs Johnson, Maritza Lupe; Bellovin, Steven Michael 2008 Articles Computer science
85. Security by Checklist Bellovin, Steven Michael 2008 Articles Computer scienceComputer securityComputers--Access controlUser interfaces (Computer systems)
87. Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP Bellovin, Steven Michael; Blaze, Matt; Brickell, Ernest; Brooks, Clinton; Cerf, Vinton; Diffie, Whitfield; Landau, Susan; Peterson, Jon; Treichler, John 2006 Articles Computer science
88. Security Through Obscurity Considered Dangerous Bellovin, Steven Michael; Bush, Randy 2002 Reports Computer science
91. Simple-VPN: Simple IPsec Configuration Srivatsan, Shreyas; Johnson, Maritza Lupe; Bellovin, Steven Michael 2010 Reports Computer science
92. Source Prefix Filtering in ROFL Zhao, Hang; Johnson, Maritza Lupe; Chau, Chi-Kin; Bellovin, Steven Michael 2009 Reports Computer science
93. Spamming, Phishing, Authentication, and Privacy Bellovin, Steven Michael 2004 Articles Computer science
94. Standards Maturity Variance Regarding the TCP MD5 Signature Option (RFC 2385) and the BGP-4 Specification Bellovin, Steven Michael; Zinin, Alex 2006 Reports Computer science
95. Sub-Operating Systems: A New Approach to Application Security Ioannidis, Sotiris; Bellovin, Steven Michael; Smith, Jonathan M. 2002 Articles Computer science
96. TCP Compression Filter Bellovin, Steven Michael; Buchsbaum, Adam L.; Muthukrishnan, S. 1999 Reports Computer science
97. TCP Filters Bellovin, Steven Michael; Buchsbaum, Adam L.; Muthukrishnan, S. 1999 Reports Computer science
99. The Failure of Online Social Network Privacy Settings Madejski, Michelle; Johnson, Maritza Lupe; Bellovin, Steven Michael 2011 Reports Computer science