1. Worm propagation strategies in an IPv6 Internet Bellovin, Steven Michael; Cheswick, Bill; Keromytis, Angelos D. 2006 Articles Computer science
3. Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications Ioannidis, Sotiris; Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2007 Articles Computer science
4. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence Bellovin, Steven Michael 2014 Reports Computer science
5. Using the Domain Name System for System Break-ins Bellovin, Steven Michael 1995 Articles Computer science
6. Using Link Cuts to Attack Internet Routing Bellovin, Steven Michael; Gansner, Emden R. 2003 Articles Computer science
7. Using Bloom Filters for Authenticated Yes/No Answers in the DNS Bellovin, Steven Michael 2001 Reports Computer science
8. Usable Secure Private Search Raykova, Mariana Petrova; Cui, Ang; Vo, Binh D.; Liu, Bin; Malkin, Tal G.; Bellovin, Steven Michael; Stolfo, Salvatore 2012 Articles Computer science
10. Two-Person Control Administration: Preventing Administration Faults through Duplication Potter, Shaya; Bellovin, Steven Michael; Nieh, Jason 2009 Articles Computer science