401. The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce 1997 Articles Computer science
402. A Better Key Schedule for DES-like Ciphers Blumenthal, Uri; Bellovin, Steven Michael 1996 Articles Computer science
403. A "Bump in the Stack" Encryptor for MS-DOS Systems Wagner, David A.; Bellovin, Steven Michael 1996 Articles Computer science
404. A DNS Filter and Switch for Packet-filtering Gateways Cheswick, Bill; Bellovin, Steven Michael 1996 Articles Computer science
405. Lexical choice for complex noun phrases: Structure, modifiers, and determiners Elhadad, Michael 1996 Articles Computer science
406. Problem Areas for the IP Security Protocols Bellovin, Steven Michael 1996 Articles Computer science
407. Translating Collocations for Bilingual Lexicons: A Statistical Approach McKeown, Kathleen; Smadja, Frank; Hatzivassiloglou, Vasileios 1996 Articles Computer science
408. CAD model acquisition using BSP trees Reed, Michael K.; Allen, Peter K.; Abrams, Steven 1995 Articles Computer science
409. Combining corpus and machine-readable dictionary data for building bilingual lexicons Klavans, Judith L.; Tzoukermann, Evelyne 1995 Articles Computer scienceInformation technology
410. Computing robust viewpoints with multi-constraints using tree annealing Yao, Yulin; Allen, Peter K. 1995 Articles Computer science
412. The Challenge of Spoken Language Systems: Research Directions for the Nineties McKeown, Kathleen; Cole, Ron; Hirschman, Lynette; Atlas, Les; Beckman, Mary; Biermann, Alan; Bush, Marcia; Clements, Mark; Cohen, Jordan; Garcia, Oscar; Hanson, Brian; Hermansky, Hynek; Levinson, Steve; Morgan, Nelson; Novick, David G.; Ostendorf, Mari; Oviatt, Sharon; Price, Patti; Silverman, Harvey; Spitz, Judy; Waibel, Alex; Weinstein, Clifford; Zahorian, Steve; Zue, Victor 1995 Articles Computer science
413. Using argumentation in text generation Elhadad, Michael 1995 Articles Computer scienceInformation technology
414. Using the Domain Name System for System Break-ins Bellovin, Steven Michael 1995 Articles Computer science
415. A Programmable Plaintext Recognizer Wagner, David A.; Bellovin, Steven Michael 1994 Articles Computer science
416. An Attack on the Interlock Protocol When Used for Authentication Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science
417. Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science
420. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks Bellovin, Steven Michael; Merritt, Michael 1992 Articles Computer scienceComputer securityData encryption (Computer science)Public key cryptography
421. The Monte Carlo Algorithm With a Pseudorandom Generator Traub, Joseph F.; Wozniakowski, Henryk 1992 Articles Computer science
423. Automating the generation of coordinated multimedia explanations McKeown, Kathleen; Feiner, Steven 1991 Articles Computer science
424. Limitations of the Kerberos Authentication System Bellovin, Steven Michael; Merritt, Michael 1991 Articles Computer science
425. Pseudo-Network Drivers and Virtual Networks Bellovin, Steven Michael 1990 Articles Computer science
427. Language generation: Applications, issues, and approaches McKeown, Kathleen 1986 Articles Computer science
428. PATHALIAS, or, The Care and Feeding of Relative Addresses Honeyman, Peter; Bellovin, Steven Michael 1986 Articles Computer science
429. Optimal Integration for Functions of Bounded Variation Traub, Joseph F.; Lee, D. 1985 Articles Computer science
430. Paraphrasing questions using given and new information McKeown, Kathleen 1983 Articles Computer science
431. Asymptotic behavior of vector recurrences with applications Feldstein, Alan; Traub, Joseph F. 1977 Articles Computer scienceVector analysis--Computer programsRecursive programmingIterative methods (Mathematics)Differential equations, Nonlinear--Asymptotic theory
432. Computational Complexity of Iterative Processes Traub, Joseph F. 1972 Articles Iterative methods (Mathematics)MathematicsComputational complexityComputer science
433. A Class of Globally Convergent Iterations for the Solution of Polynomial Equations Traub, Joseph F. 1966 Articles Iterative methods (Mathematics)Polynomials--Study and teachingComputer science