2. A Better Approach than Carrier-Grade-NAT Maennel, Olaf; Bush, Randy; Cittadini, Luca; Bellovin, Steven Michael 2008 Reports Computer science
3. A Better Key Schedule for DES-like Ciphers Blumenthal, Uri; Bellovin, Steven Michael 1996 Articles Computer science
4. A "Bump in the Stack" Encryptor for MS-DOS Systems Wagner, David A.; Bellovin, Steven Michael 1996 Articles Computer science
5. Access Control Prefix Router Advertisement Option for IPv6 Bellovin, Steven Michael 2003 Reports Computer science
6. A Clean-Slate Design for the Next-Generation Secure Internet Bellovin, Steven Michael; Clark, David D.; Perrig, Adrian; Song, Dawn 2006 Articles Computer science
7. A DNS Filter and Switch for Packet-filtering Gateways Cheswick, Bill; Bellovin, Steven Michael 1996 Articles Computer science
8. AES Key Agility Issues in High-Speed IPsec Implementations Whiting, Doug; Schneier, Bruce; Bellovin, Steven Michael 2000 Articles Computer science
9. A Look Back at "Security Problems in the TCP/IP Protocol Suite" Bellovin, Steven Michael 2004 Articles Computer science
10. An Algebra for Integration and Analysis of Ponder2 Policies Zhao, Hang; Lobo, Jorge; Bellovin, Steven Michael 2008 Articles Computer science
11. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Articles Computer science
12. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
13. An Attack on the Interlock Protocol When Used for Authentication Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science
14. APOD: Anonymous Physical Object Delivery Androulaki, Elli; Bellovin, Steven Michael 2009 Articles Computer science
15. A Programmable Plaintext Recognizer Wagner, David A.; Bellovin, Steven Michael 1994 Articles Computer science
16. A Real World Identity Management System with Master Secret Revocation Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer science
17. A "Reason" Field for ICMP "Administratively Prohibited" Messages Bellovin, Steven Michael 2001 Reports Computer science
18. A Secure and Privacy-Preserving Targeted Ad-System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
20. Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science