41. Frank Miller: Inventor of the One-Time Pad Bellovin, Steven Michael 2011 Reports Computer science
42. Further Information on Miller's 1882 One-Time Pad Bellovin, Steven Michael 2016 Reports CryptographersData encryption (Computer science)CryptographyComputer science
43. Guidelines for Cryptographic Key Management Bellovin, Steven Michael; Housley, Russell 2005 Reports Computer science
44. Guidelines for Specifying the Use of IPsec Version 2 Bellovin, Steven Michael 2009 Reports Computer science
45. High Performance Firewalls in MANETs Zhao, Hang; Bellovin, Steven Michael 2011 Articles Computer science
46. ICMP Traceback Messages Bellovin, Steven Michael; Leech, Marcus; Taylor, Tom 2003 Reports Computer science
47. Identity and Security Bellovin, Steven Michael 2010 Articles Computer scienceComputer securityOperating systems (Computers)--Security measures
48. Implementing a Distributed Firewall Ioannidis, Sotiris; Keromytis, Angelos D.; Bellovin, Steven Michael; Smith, Jonathan M. 2000 Articles Computer scienceFirewalls (Computer security)IPSec (Computer network protocol)Computer networks--Security measuresOpenBSD (Electronic resource)
49. Implementing Pushback: Router-Based Defense Against DDoS Attacks Ioannidis, John; Bellovin, Steven Michael 2002 Articles Computer science
50. Just Fast Keying: Key Agreement in a Hostile Internet Aiello, William; Bellovin, Steven Michael; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer 2004 Articles Computer science
52. Keys under doormats: mandating insecurity by requiring government access to all data and communications Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J. 2015 Articles Computer networks--Security measuresComputer securityInternet--Security measuresComputer science
53. Laissez-faire file sharing: Access control designed for individuals at the endpoints Johnson, Maritza Lupe; Bellovin, Steven Michael; Reeder, Robert W.; Schechter, Stuart E. 2009 Articles Computer scienceComputer file sharingComputers--Access control
54. Limitations of the Kerberos Authentication System Bellovin, Steven Michael; Merritt, Michael 1991 Articles Computer science
55. Moat: A Virtual Private Network Appliance and Services Platform Denker, John S.; Bellovin, Steven Michael; Daniel, Hugh; Mintz, Nancy L.; Killian, Tom; Plotnick, Mark A. 1999 Articles Computer science
56. Mysterious Checks from Mauborgne to Fabyan Bellovin, Steven Michael 2014 Reports Computer science
57. Newspeak: A Secure Approach for Designing Web Applications Dent, Kyle; Bellovin, Steven Michael 2008 Reports Computer science
59. On the Brittleness of Software and the Infeasibility of Security Metrics Bellovin, Steven Michael 2006 Articles Computer science
60. On the Use of Stream Control Transmission Protocol (SCTP) with IPsec Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Stewart, Randall R. 2003 Reports Computer science