1. A Better Approach than Carrier-Grade-NAT Maennel, Olaf; Bush, Randy; Cittadini, Luca; Bellovin, Steven Michael 2008 Reports Computer science
2. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
3. A Real World Identity Management System with Master Secret Revocation Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer science
4. A Secure and Privacy-Preserving Targeted Ad-System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
6. Further Information on Miller's 1882 One-Time Pad Bellovin, Steven Michael 2016 Reports CryptographersData encryption (Computer science)CryptographyComputer science
8. Newspeak: A Secure Approach for Designing Web Applications Dent, Kyle; Bellovin, Steven Michael 2008 Reports Computer science
9. OpenTor: Anonymity as a Commodity Service Androulaki, Elli; Raykova, Mariana Petrova; Stavrou, Angelos; Bellovin, Steven Michael 2007 Reports Computer science
10. Policy Algebras for Hybrid Firewalls Zhao, Hang; Bellovin, Steven Michael 2007 Reports Computer science
11. Privacy Enhanced Access Control for Outsourced Data Sharing Raykova, Mariana Petrova; Bellovin, Steven Michael; Zhao, Hang 2011 Reports Computer scienceComputers--Access controlComputer securityElectronic data processing--Security measuresCloud computing
12. Privacy-Enhanced Searches Using Encrypted Bloom Filters Bellovin, Steven Michael; Cheswick, William R. 2007 Reports Computer science
13. Privacy-Preserving, Taxable Bank Accounts Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer scienceBanks and banking
14. Reputation Systems for Anonymous Networks Androulaki, Elli; Choi, Seung Geol; Bellovin, Steven Michael; Malkin, Tal G. 2007 Reports Computer science
15. ROFL: Routing as the Firewall Layer Zhao, Hang; Chau, Chi-Kin; Bellovin, Steven Michael 2008 Reports Computer science
16. Simple-VPN: Simple IPsec Configuration Srivatsan, Shreyas; Johnson, Maritza Lupe; Bellovin, Steven Michael 2010 Reports Computer science
17. Source Prefix Filtering in ROFL Zhao, Hang; Johnson, Maritza Lupe; Chau, Chi-Kin; Bellovin, Steven Michael 2009 Reports Computer science
19. The Failure of Online Social Network Privacy Settings Madejski, Michelle; Johnson, Maritza Lupe; Bellovin, Steven Michael 2011 Reports Computer science
20. The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET Cheng, Yuu-Heng; Alexander, D. Scott; Poylisher, Alex; Raykova, Mariana Petrova; Bellovin, Steven Michael 2009 Reports Computer science
21. Trade-offs in Private Search Pappas, Vasileios; Raykova, Mariana Petrova; Vo, Binh D.; Bellovin, Steven Michael; Malkin, Tal G. 2010 Reports Computer science
22. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence Bellovin, Steven Michael 2014 Reports Computer science