Skip to main content
Columbia University Libraries
Academic Commons
search for
Search
About
Explore
Log In
Upload
Your Research
Academic Commons
Toggle facets
Refine your search
Author
Bellovin, Steven Michael
[remove]
44
Androulaki, Elli
6
Zhao, Hang
5
Raykova, Mariana Petrova
4
Chau, Chi-Kin
3
more
Author
»
Academic Unit
Computer Science
44
Subject
Computer science
44
Banks and banking
1
Cloud computing
1
Computer security
1
Computers--Access control
1
more
Subject
»
Type
Reports
[remove]
44
Date Published
Date Published range begin
–
Date Published range end
Current results range from
1994
to
2016
View distribution
Series
Columbia University Computer Science Technical Reports
24
Language
English
44
Search Constraints
Start Over
You searched for:
Author
Bellovin, Steven Michael
Remove constraint Author: Bellovin, Steven Michael
Type
Reports
Remove constraint Type: Reports
1
-
44
of
44
Sort by Published Latest
Best Match
Published Latest
Published Earliest
Title A-Z
Title Z-A
Number of results to display per page
100 per page
10
per page
20
per page
50
per page
100
per page
Search Results
1.
Further Information on Miller's 1882 One-Time Pad
Bellovin, Steven Michael
2016
Reports
Cryptographers
Data encryption (Computer science)
Cryptography
Computer science
2.
Mysterious Checks from Mauborgne to Fabyan
Bellovin, Steven Michael
2014
Reports
Computer science
3.
The Economics of Cyberwar
Bellovin, Steven Michael
2014
Reports
Computer science
4.
Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence
Bellovin, Steven Michael
2014
Reports
Computer science
5.
Frank Miller: Inventor of the One-Time Pad
Bellovin, Steven Michael
2011
Reports
Computer science
6.
Privacy Enhanced Access Control for Outsourced Data Sharing
Raykova, Mariana Petrova; Bellovin, Steven Michael; Zhao, Hang
2011
Reports
Computer science
Computers--Access control
Computer security
Electronic data processing--Security measures
Cloud computing
7.
The Failure of Online Social Network Privacy Settings
Madejski, Michelle; Johnson, Maritza Lupe; Bellovin, Steven Michael
2011
Reports
Computer science
8.
A Real World Identity Management System with Master Secret Revocation
Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael
2010
Reports
Computer science
9.
Privacy-Preserving, Taxable Bank Accounts
Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael
2010
Reports
Computer science
Banks and banking
10.
Simple-VPN: Simple IPsec Configuration
Srivatsan, Shreyas; Johnson, Maritza Lupe; Bellovin, Steven Michael
2010
Reports
Computer science
11.
Trade-offs in Private Search
Pappas, Vasileios; Raykova, Mariana Petrova; Vo, Binh D.; Bellovin, Steven Michael; Malkin, Tal G.
2010
Reports
Computer science
12.
An Anonymous Credit Card System
Androulaki, Elli; Bellovin, Steven Michael
2009
Reports
Computer science
13.
A Secure and Privacy-Preserving Targeted Ad-System
Androulaki, Elli; Bellovin, Steven Michael
2009
Reports
Computer science
14.
Guidelines for Specifying the Use of IPsec Version 2
Bellovin, Steven Michael
2009
Reports
Computer science
15.
Source Prefix Filtering in ROFL
Zhao, Hang; Johnson, Maritza Lupe; Chau, Chi-Kin; Bellovin, Steven Michael
2009
Reports
Computer science
16.
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET
Cheng, Yuu-Heng; Alexander, D. Scott; Poylisher, Alex; Raykova, Mariana Petrova; Bellovin, Steven Michael
2009
Reports
Computer science
17.
A Better Approach than Carrier-Grade-NAT
Maennel, Olaf; Bush, Randy; Cittadini, Luca; Bellovin, Steven Michael
2008
Reports
Computer science
18.
Newspeak: A Secure Approach for Designing Web Applications
Dent, Kyle; Bellovin, Steven Michael
2008
Reports
Computer science
19.
ROFL: Routing as the Firewall Layer
Zhao, Hang; Chau, Chi-Kin; Bellovin, Steven Michael
2008
Reports
Computer science
20.
ROFL: Routing as the Firewall Layer
Zhao, Hang; Chau, Chi-Kin; Bellovin, Steven Michael
2008
Reports
Computer science
21.
Key Change Strategies for TCP-MD5
Bellovin, Steven Michael
2007
Reports
Computer science
22.
OpenTor: Anonymity as a Commodity Service
Androulaki, Elli; Raykova, Mariana Petrova; Stavrou, Angelos; Bellovin, Steven Michael
2007
Reports
Computer science
23.
Policy Algebras for Hybrid Firewalls
Zhao, Hang; Bellovin, Steven Michael
2007
Reports
Computer science
24.
Privacy-Enhanced Searches Using Encrypted Bloom Filters
Bellovin, Steven Michael; Cheswick, William R.
2007
Reports
Computer science
25.
Reputation Systems for Anonymous Networks
Androulaki, Elli; Choi, Seung Geol; Bellovin, Steven Michael; Malkin, Tal G.
2007
Reports
Computer science
26.
Standards Maturity Variance Regarding the TCP MD5 Signature Option (RFC 2385) and the BGP-4 Specification
Bellovin, Steven Michael; Zinin, Alex
2006
Reports
Computer science
27.
Deploying a New Hash Algorithm
Bellovin, Steven Michael; Rescorla, Eric K.
2005
Reports
Computer science
28.
Guidelines for Cryptographic Key Management
Bellovin, Steven Michael; Housley, Russell
2005
Reports
Computer science
29.
Access Control Prefix Router Advertisement Option for IPv6
Bellovin, Steven Michael
2003
Reports
Computer science
30.
ICMP Traceback Messages
Bellovin, Steven Michael; Leech, Marcus; Taylor, Tom
2003
Reports
Computer science
31.
On the Use of Stream Control Transmission Protocol (SCTP) with IPsec
Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Stewart, Randall R.
2003
Reports
Computer science
32.
The Security Flag in the IPv4 Header
Bellovin, Steven Michael
2003
Reports
Computer science
Intrusion detection systems (Computer security)
Internet communication
Internet--Safety measures
33.
Security Through Obscurity Considered Dangerous
Bellovin, Steven Michael; Bush, Randy
2002
Reports
Computer science
34.
A "Reason" Field for ICMP "Administratively Prohibited" Messages
Bellovin, Steven Michael
2001
Reports
Computer science
35.
Using Bloom Filters for Authenticated Yes/No Answers in the DNS
Bellovin, Steven Michael
2001
Reports
Computer science
36.
Client Certificate and Key Retrieval for IKE
Bellovin, Steven Michael; Moskowitz, Robert G.
2000
Reports
Computer science
37.
Results of the Security in ActiveX Workshop, Pittsburgh, Pennsylvania USA, August 22-23, 2000
Bellovin, Steven Michael; Cohen, Cory; Havrilla, Jeffrey; Hernan, Shawn; King, Brian; Lanza, Jeffrey; Pesante, Linda; Pethia, Rich; McAllister, Sean; Henault, German; Goodden, R. Tom; Peterson, A. Padgett; Finnegan, Sean; Katano, Ken; Smith, Richard M.; Lowenthal, Ralph A.
2000
Reports
Computer science
38.
TCP Compression Filter
Bellovin, Steven Michael; Buchsbaum, Adam L.; Muthukrishnan, S.
1999
Reports
Computer science
39.
TCP Filters
Bellovin, Steven Michael; Buchsbaum, Adam L.; Muthukrishnan, S.
1999
Reports
Computer science
40.
Report of the IAB Security Architecture Workshop
Bellovin, Steven Michael
1998
Reports
Computer science
41.
Defending Against Sequence Number Attacks
Bellovin, Steven Michael
1996
Reports
Computer science
42.
Firewall-Friendly FTP
Bellovin, Steven Michael
1994
Reports
Computer science
43.
On Many Addresses per Host
Bellovin, Steven Michael
1994
Reports
Computer science
44.
Security Concerns for IPng
Bellovin, Steven Michael
1994
Reports
Computer science