62. Newspeak: A Secure Approach for Designing Web Applications Dent, Kyle; Bellovin, Steven Michael 2008 Reports Computer science
63. Mysterious Checks from Mauborgne to Fabyan Bellovin, Steven Michael 2014 Reports Computer science
64. Moat: A Virtual Private Network Appliance and Services Platform Denker, John S.; Bellovin, Steven Michael; Daniel, Hugh; Mintz, Nancy L.; Killian, Tom; Plotnick, Mark A. 1999 Articles Computer science
65. Limitations of the Kerberos Authentication System Bellovin, Steven Michael; Merritt, Michael 1991 Articles Computer science
66. Laissez-faire file sharing: Access control designed for individuals at the endpoints Johnson, Maritza Lupe; Bellovin, Steven Michael; Reeder, Robert W.; Schechter, Stuart E. 2009 Articles Computer scienceComputer file sharingComputers--Access control
67. Keys under doormats: mandating insecurity by requiring government access to all data and communications Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J. 2015 Articles Computer networks--Security measuresComputer securityInternet--Security measuresComputer science
69. Just Fast Keying: Key Agreement in a Hostile Internet Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer 2004 Articles Computer science
70. Implementing Pushback: Router-Based Defense Against DDoS Attacks Ioannidis, John; Bellovin, Steven Michael 2002 Articles Computer science
71. Implementing a Distributed Firewall Ioannidis, Sotiris; Keromytis, Angelos D.; Bellovin, Steven Michael; Smith, Jonathan M. 2000 Articles Computer scienceFirewalls (Computer security)IPSec (Computer network protocol)Computer networks--Security measuresOpenBSD (Electronic resource)
72. Identity and Security Bellovin, Steven Michael 2010 Articles Computer scienceComputer securityOperating systems (Computers)--Security measures
73. ICMP Traceback Messages Bellovin, Steven Michael; Leech, Marcus; Taylor, Tom 2003 Reports Computer science
74. High Performance Firewalls in MANETs Zhao, Hang; Bellovin, Steven Michael 2011 Articles Computer science
75. Guidelines for Specifying the Use of IPsec Version 2 Bellovin, Steven Michael 2009 Reports Computer science
76. Guidelines for Cryptographic Key Management Bellovin, Steven Michael; Housley, Russell 2005 Reports Computer science
77. Further Information on Miller's 1882 One-Time Pad Bellovin, Steven Michael 2016 Reports CryptographersData encryption (Computer science)CryptographyComputer science
78. Frank Miller: Inventor of the One-Time Pad Bellovin, Steven Michael 2011 Reports Computer science
80. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks Bellovin, Steven Michael; Merritt, Michael 1992 Articles Computer scienceComputer securityData encryption (Computer science)Public key cryptography