Skip to main content
Columbia University Libraries
Academic Commons
search for
Search
About
Explore
Log In
Upload
Your Research
Academic Commons
Toggle facets
Refine your search
Author
Bellovin, Steven Michael
[remove]
123
Keromytis, Angelos D.
13
Androulaki, Elli
11
Ioannidis, John
11
Blaze, Matt
10
more
Author
»
Academic Unit
Computer Science
123
Subject
Computer science
[remove]
123
Computer security
5
Computers--Access control
3
Computer networks--Security measures
2
Data encryption (Computer science)
2
more
Subject
»
Type
Articles
79
Reports
43
Presentations (Communicative Events)
1
Date Published
Date Published range begin
–
Date Published range end
Current results range from
1986
to
2016
View distribution
Series
Columbia University Computer Science Technical Reports
23
Language
English
123
Search Constraints
Start Over
You searched for:
Author
Bellovin, Steven Michael
Remove constraint Author: Bellovin, Steven Michael
Subject
Computer science
Remove constraint Subject: Computer science
« Previous |
1
-
50
of
123
|
Next »
Sort by Best Match
Best Match
Published Latest
Published Earliest
Title A-Z
Title Z-A
Number of results to display per page
50 per page
10
per page
20
per page
50
per page
100
per page
Search Results
1.
Further Information on Miller's 1882 One-Time Pad
Bellovin, Steven Michael
2016
Reports
Cryptographers
Data encryption (Computer science)
Cryptography
Computer science
2.
Keys under doormats: mandating insecurity by requiring government access to all data and communications
Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J.
2015
Articles
Computer networks--Security measures
Computer security
Internet--Security measures
Computer science
3.
Mysterious Checks from Mauborgne to Fabyan
Bellovin, Steven Michael
2014
Reports
Computer science
4.
The Economics of Cyberwar
Bellovin, Steven Michael
2014
Reports
Computer science
5.
Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence
Bellovin, Steven Michael
2014
Reports
Computer science
6.
Usable Secure Private Search
Raykova, Mariana Petrova; Cui, Ang; Vo, Binh D.; Liu, Bin; Malkin, Tal G.; Bellovin, Steven Michael; Stolfo, Salvatore
2012
Articles
Computer science
7.
Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent
Johnson, Maritza Lupe; Bellovin, Steven Michael; Keromytis, Angelos D.
2011
Articles
Computer science
8.
Frank Miller: Inventor of the One-Time Pad
Bellovin, Steven Michael
2011
Reports
Computer science
9.
High Performance Firewalls in MANETs
Zhao, Hang; Bellovin, Steven Michael
2011
Articles
Computer science
10.
Policy Refinement of Network Services for MANETs
Zhao, Hang; Lobo, Jorge; Roy, Arnab; Bellovin, Steven Michael
2011
Articles
Computer science
11.
Privacy Enhanced Access Control for Outsourced Data Sharing
Raykova, Mariana Petrova; Bellovin, Steven Michael; Zhao, Hang
2011
Reports
Computer science
Computers--Access control
Computer security
Electronic data processing--Security measures
Cloud computing
12.
The Failure of Online Social Network Privacy Settings
Madejski, Michelle; Johnson, Maritza Lupe; Bellovin, Steven Michael
2011
Reports
Computer science
13.
A Real World Identity Management System with Master Secret Revocation
Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael
2010
Reports
Computer science
14.
Identity and Security
Bellovin, Steven Michael
2010
Articles
Computer science
Computer security
Operating systems (Computers)--Security measures
15.
Privacy-Preserving, Taxable Bank Accounts
Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael
2010
Reports
Computer science
Banks and banking
16.
Simple-VPN: Simple IPsec Configuration
Srivatsan, Shreyas; Johnson, Maritza Lupe; Bellovin, Steven Michael
2010
Reports
Computer science
17.
Trade-offs in Private Search
Pappas, Vasileios; Raykova, Mariana Petrova; Vo, Binh D.; Bellovin, Steven Michael; Malkin, Tal G.
2010
Reports
Computer science
18.
An Anonymous Credit Card System
Androulaki, Elli; Bellovin, Steven Michael
2009
Articles
Computer science
19.
An Anonymous Credit Card System
Androulaki, Elli; Bellovin, Steven Michael
2009
Reports
Computer science
20.
APOD: Anonymous Physical Object Delivery
Androulaki, Elli; Bellovin, Steven Michael
2009
Articles
Computer science
21.
A Secure and Privacy-Preserving Targeted Ad-System
Androulaki, Elli; Bellovin, Steven Michael
2009
Reports
Computer science
22.
Configuration Management and Security
Bellovin, Steven Michael; Bush, Randy
2009
Articles
Computer science
23.
Cybersecurity through an Identity Management System
Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael
2009
Articles
Computer science
24.
Guidelines for Specifying the Use of IPsec Version 2
Bellovin, Steven Michael
2009
Reports
Computer science
25.
Laissez-faire file sharing: Access control designed for individuals at the endpoints
Johnson, Maritza Lupe; Bellovin, Steven Michael; Reeder, Robert W.; Schechter, Stuart E.
2009
Articles
Computer science
Computer file sharing
Computers--Access control
26.
Secure Anonymous Database Search
Raykova, Mariana Petrova; Vo, Binh D.; Bellovin, Steven Michael; Malkin, Tal G.
2009
Articles
Computer science
27.
Security as a Systems Property
Bellovin, Steven Michael
2009
Articles
Computer science
28.
Source Prefix Filtering in ROFL
Zhao, Hang; Johnson, Maritza Lupe; Chau, Chi-Kin; Bellovin, Steven Michael
2009
Reports
Computer science
29.
The Government and Cybersecurity
Bellovin, Steven Michael
2009
Articles
Computer science
30.
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET
Cheng, Yuu-Heng; Alexander, D. Scott; Poylisher, Alex; Raykova, Mariana Petrova; Bellovin, Steven Michael
2009
Reports
Computer science
31.
Two-Person Control Administration: Preventing Administration Faults through Duplication
Potter, Shaya; Bellovin, Steven Michael; Nieh, Jason
2009
Articles
Computer science
32.
A Better Approach than Carrier-Grade-NAT
Maennel, Olaf; Bush, Randy; Cittadini, Luca; Bellovin, Steven Michael
2008
Reports
Computer science
33.
An Algebra for Integration and Analysis of Ponder2 Policies
Zhao, Hang; Lobo, Jorge; Bellovin, Steven Michael
2008
Articles
Computer science
34.
Newspeak: A Secure Approach for Designing Web Applications
Dent, Kyle; Bellovin, Steven Michael
2008
Reports
Computer science
35.
PAR: Payment for Anonymous Routing
Androulaki, Elli; Raykova, Mariana Petrova; Srivatsan, Shreyas; Stavrou, Angelos; Bellovin, Steven Michael
2008
Articles
Computer science
36.
Reputation Systems for Anonymous Networks
Androulaki, Elli; Choi, Seung Geol; Bellovin, Steven Michael; Malkin, Tal G.
2008
Articles
Computer science
37.
Risking Communications Security: Potential Hazards of the Protect America Act
Bellovin, Steven Michael; Blaze, Matt; Diffie, Whitfield; Landau, Susan; Neumann, Peter G.; Rexford, Jennifer
2008
Articles
Computer science
38.
ROFL: Routing as the Firewall Layer
Zhao, Hang; Chau, Chi-Kin; Bellovin, Steven Michael
2008
Reports
Computer science
39.
RUST: A Retargetable Usability Testbed for Website Authentication Technologies
Johnson, Maritza Lupe; Atreya, Chaitanya; Aviv, Adam; Raykova, Mariana Petrova; Bellovin, Steven Michael; Kaiser, Gail E.
2008
Articles
Computer science
40.
Security Assurance for Web Device APIs
Johnson, Maritza Lupe; Bellovin, Steven Michael
2008
Articles
Computer science
41.
Security by Checklist
Bellovin, Steven Michael
2008
Articles
Computer science
Computer security
Computers--Access control
User interfaces (Computer systems)
42.
The Puzzle of Privacy
Bellovin, Steven Michael
2008
Articles
Computer science
43.
DRM, Complexity, and Correctness
Bellovin, Steven Michael
2007
Articles
Computer science
44.
Key Change Strategies for TCP-MD5
Bellovin, Steven Michael
2007
Reports
Computer science
45.
OpenTor: Anonymity as a Commodity Service
Androulaki, Elli; Raykova, Mariana Petrova; Stavrou, Angelos; Bellovin, Steven Michael
2007
Reports
Computer science
46.
Policy Algebras for Hybrid Firewalls
Zhao, Hang; Bellovin, Steven Michael
2007
Reports
Computer science
47.
Privacy-Enhanced Searches Using Encrypted Bloom Filters
Bellovin, Steven Michael; Cheswick, William R.
2007
Reports
Computer science
48.
Reputation Systems for Anonymous Networks
Androulaki, Elli; Choi, Seung Geol; Bellovin, Steven Michael; Malkin, Tal G.
2007
Reports
Computer science
49.
Seers and Craftspeople
Bellovin, Steven Michael
2007
Articles
Computer science
50.
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Ioannidis, Sotiris; Bellovin, Steven Michael; Ioannidis, John; Anagnostakis, Kostas G.; Keromytis, Angelos D.; Smith, Jonathan M.
2007
Articles
Computer science
« Previous
Next »
1
2
3