1. Further Information on Miller's 1882 One-Time Pad Bellovin, Steven Michael 2016 Reports CryptographersData encryption (Computer science)CryptographyComputer science
2. Keys under doormats: mandating insecurity by requiring government access to all data and communications Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J. 2015 Articles Computer networks--Security measuresComputer securityInternet--Security measuresComputer science
5. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence Bellovin, Steven Michael 2014 Reports Computer science
6. Usable Secure Private Search Raykova, Mariana Petrova; Cui, Ang; Vo, Binh D.; Liu, Bin; Malkin, Tal G.; Bellovin, Steven Michael; Stolfo, Salvatore 2012 Articles Computer science
7. Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent Johnson, Maritza Lupe; Bellovin, Steven Michael; Keromytis, Angelos D. 2011 Articles Computer science
9. High Performance Firewalls in MANETs Zhao, Hang; Bellovin, Steven Michael 2011 Articles Computer science
10. Policy Refinement of Network Services for MANETs Zhao, Hang; Lobo, Jorge; Roy, Arnab; Bellovin, Steven Michael 2011 Articles Computer science
11. Privacy Enhanced Access Control for Outsourced Data Sharing Raykova, Mariana Petrova; Bellovin, Steven Michael; Zhao, Hang 2011 Reports Computer scienceComputers--Access controlComputer securityElectronic data processing--Security measuresCloud computing
12. The Failure of Online Social Network Privacy Settings Madejski, Michelle; Johnson, Maritza Lupe; Bellovin, Steven Michael 2011 Reports Computer science
13. A Real World Identity Management System with Master Secret Revocation Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer science
14. Identity and Security Bellovin, Steven Michael 2010 Articles Computer scienceComputer securityOperating systems (Computers)--Security measures
15. Privacy-Preserving, Taxable Bank Accounts Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer scienceBanks and banking
16. Simple-VPN: Simple IPsec Configuration Srivatsan, Shreyas; Johnson, Maritza Lupe; Bellovin, Steven Michael 2010 Reports Computer science
17. Trade-offs in Private Search Pappas, Vasileios; Raykova, Mariana Petrova; Vo, Binh D.; Bellovin, Steven Michael; Malkin, Tal G. 2010 Reports Computer science
18. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Articles Computer science
19. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
20. APOD: Anonymous Physical Object Delivery Androulaki, Elli; Bellovin, Steven Michael 2009 Articles Computer science