1. Worm propagation strategies in an IPv6 Internet Bellovin, Steven Michael; Cheswick, Bill; Keromytis, Angelos D. 2006 Articles Computer science
3. Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications Ioannidis, Sotiris; Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2007 Articles Computer science
4. Using the Domain Name System for System Break-ins Bellovin, Steven Michael 1995 Articles Computer science
5. Using Link Cuts to Attack Internet Routing Bellovin, Steven Michael; Gansner, Emden R. 2003 Articles Computer science
6. Usable Secure Private Search Raykova, Mariana Petrova; Cui, Ang; Vo, Binh D.; Liu, Bin; Malkin, Tal G.; Bellovin, Steven Michael; Stolfo, Salvatore 2012 Articles Computer science
8. Two-Person Control Administration: Preventing Administration Faults through Duplication Potter, Shaya; Bellovin, Steven Michael; Nieh, Jason 2009 Articles Computer science
9. Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per Host Gleitz, Peter M.; Bellovin, Steven Michael 2001 Articles Computer science
11. The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce 1997 Articles Computer science
15. Sub-Operating Systems: A New Approach to Application Security Ioannidis, Sotiris; Bellovin, Steven Michael; Smith, Jonathan M. 2002 Articles Computer science
16. Spamming, Phishing, Authentication, and Privacy Bellovin, Steven Michael 2004 Articles Computer science
19. Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP Bellovin, Steven Michael; Blaze, Matt; Brickell, Ernest; Brooks, Clinton; Cerf, Vinton; Diffie, Whitfield; Landau, Susan; Peterson, Jon; Treichler, John 2006 Articles Computer science
20. Security by Checklist Bellovin, Steven Michael 2008 Articles Computer scienceComputer securityComputers--Access controlUser interfaces (Computer systems)
21. Security Assurance for Web Device APIs Johnson, Maritza Lupe; Bellovin, Steven Michael 2008 Articles Computer science
24. Secure Anonymous Database Search Raykova, Mariana Petrova; Vo, Binh D.; Bellovin, Steven Michael; Malkin, Tal G. 2009 Articles Computer science
25. RUST: A Retargetable Usability Testbed for Website Authentication Technologies Johnson, Maritza Lupe; Atreya, Chaitanya; Aviv, Adam; Raykova, Mariana Petrova; Bellovin, Steven Michael; Kaiser, Gail E. 2008 Articles Computer science
26. Risking Communications Security: Potential Hazards of the Protect America Act Bellovin, Steven Michael; Blaze, Matt; Diffie, Whitfield; Landau, Susan; Neumann, Peter G.; Rexford, Jennifer 2008 Articles Computer science
27. Reputation Systems for Anonymous Networks Androulaki, Elli; Choi, Seung Geol; Bellovin, Steven Michael; Malkin, Tal G. 2008 Articles Computer science
28. Pseudo-Network Drivers and Virtual Networks Bellovin, Steven Michael 1990 Articles Computer science
29. Problem Areas for the IP Security Protocols Bellovin, Steven Michael 1996 Articles Computer science
30. Probable Plaintext Cryptanalysis of the IP Security Protocols Bellovin, Steven Michael 1997 Articles Computer science
31. Prerendered User Interfaces for Higher-Assurance Electronic Voting Yee, Ka-Ping; Wagner, David A.; Hearst, Marti; Bellovin, Steven Michael 2006 Articles Computer science
32. Policy Refinement of Network Services for MANETs Zhao, Hang; Lobo, Jorge; Roy, Arnab; Bellovin, Steven Michael 2011 Articles Computer science
33. PATHALIAS, or, The Care and Feeding of Relative Addresses Honeyman, Peter; Bellovin, Steven Michael 1986 Articles Computer science
34. PAR: Payment for Anonymous Routing Androulaki, Elli; Raykova, Mariana Petrova; Srivatsan, Shreyas; Stavrou, Angelos; Bellovin, Steven Michael 2008 Articles Computer science
36. On the Brittleness of Software and the Infeasibility of Security Metrics Bellovin, Steven Michael 2006 Articles Computer science
37. Moat: A Virtual Private Network Appliance and Services Platform Denker, John S.; Bellovin, Steven Michael; Daniel, Hugh; Mintz, Nancy L.; Killian, Tom; Plotnick, Mark A. 1999 Articles Computer science
38. Limitations of the Kerberos Authentication System Bellovin, Steven Michael; Merritt, Michael 1991 Articles Computer science
39. Laissez-faire file sharing: Access control designed for individuals at the endpoints Johnson, Maritza Lupe; Bellovin, Steven Michael; Reeder, Robert W.; Schechter, Stuart E. 2009 Articles Computer scienceComputer file sharingComputers--Access control
40. Keys under doormats: mandating insecurity by requiring government access to all data and communications Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J. 2015 Articles Computer networks--Security measuresComputer securityInternet--Security measuresComputer science
41. Just Fast Keying: Key Agreement in a Hostile Internet Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer 2004 Articles Computer science
42. Implementing Pushback: Router-Based Defense Against DDoS Attacks Ioannidis, John; Bellovin, Steven Michael 2002 Articles Computer science
43. Implementing a Distributed Firewall Ioannidis, Sotiris; Keromytis, Angelos D.; Bellovin, Steven Michael; Smith, Jonathan M. 2000 Articles Computer scienceFirewalls (Computer security)IPSec (Computer network protocol)Computer networks--Security measuresOpenBSD (Electronic resource)
44. Identity and Security Bellovin, Steven Michael 2010 Articles Computer scienceComputer securityOperating systems (Computers)--Security measures
45. High Performance Firewalls in MANETs Zhao, Hang; Bellovin, Steven Michael 2011 Articles Computer science
46. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks Bellovin, Steven Michael; Merritt, Michael 1992 Articles Computer scienceComputer securityData encryption (Computer science)Public key cryptography
47. Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer 2002 Articles Computer science
48. Efficient, DoS-resistant, Secure Key Exchange for Internet Protocols Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Ioannidis, John; Canetti, Ran; Keromytis, Angelos D.; Reingold, Omer 2001 Articles Computer science