BibTeX records: Aviel D. Rubin

download as .bib file

@article{DBLP:journals/popets/JoisBBCCKZKR24,
  author       = {Tushar M. Jois and
                  Gabrielle Beck and
                  Sofia Belikovetsky and
                  Joseph Carrigan and
                  Alishah Chator and
                  Logan Kostick and
                  Maximilian Zinkus and
                  Gabriel Kaptchuk and
                  Aviel D. Rubin},
  title        = {SocIoTy: Practical Cryptography in Smart Home Contexts},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {1},
  pages        = {447--464},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0026},
  doi          = {10.56553/POPETS-2024-0026},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/JoisBBCCKZKR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccwc/ManojWSRWR23,
  author       = {Valeti Manoj and
                  Shao Wenda and
                  Niu Sihan and
                  Christopher A. Rouff and
                  Lanier A. Watkins and
                  Aviel Rubin},
  title        = {Explainable Autonomic Cybersecurity For Industrial Control Systems},
  booktitle    = {13th {IEEE} Annual Computing and Communication Workshop and Conference,
                  {CCWC} 2023, Las Vegas, NV, USA, March 8-11, 2023},
  pages        = {900--9006},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CCWC57344.2023.10099307},
  doi          = {10.1109/CCWC57344.2023.10099307},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccwc/ManojWSRWR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaa2/BeattieWRRW22,
  author       = {Hedin Beattie and
                  Lanier A. Watkins and
                  William H. Robinson and
                  Aviel D. Rubin and
                  Shari Watkins},
  title        = {Measuring and Mitigating Bias in AI-Chatbots},
  booktitle    = {{IEEE} International Conference on Assured Autonomy, {ICAA} 2022,
                  Virtual Event / Fajardo, PR, USA, March 22-24, 2022},
  pages        = {117--123},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAA52185.2022.00023},
  doi          = {10.1109/ICAA52185.2022.00023},
  timestamp    = {Tue, 03 May 2022 17:07:11 +0200},
  biburl       = {https://dblp.org/rec/conf/icaa2/BeattieWRRW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/CerviniMBMRW22,
  author       = {James Cervini and
                  Daniel Muller and
                  Alexander Beall and
                  Joseph Maurio and
                  Aviel Rubin and
                  Lanier A. Watkins},
  editor       = {Jason Staggs and
                  Sujeet Shenoi},
  title        = {Trusted Virtualization-Based Programmable Logic Controller Resilience
                  Using a Backfit Approach},
  booktitle    = {Critical Infrastructure Protection {XVI} - 16th {IFIP} {WG} 11.10
                  International Conference, {ICCIP} 2022, Virtual Event, March 14-15,
                  2022, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {666},
  pages        = {103--117},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20137-0\_4},
  doi          = {10.1007/978-3-031-20137-0\_4},
  timestamp    = {Thu, 08 Dec 2022 17:43:50 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/CerviniMBMRW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-04766,
  author       = {Random Gwinn and
                  Mark A. Matties and
                  Aviel D. Rubin},
  title        = {Configuration and Collection Factors for Side-Channel Disassembly},
  journal      = {CoRR},
  volume       = {abs/2204.04766},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.04766},
  doi          = {10.48550/ARXIV.2204.04766},
  eprinttype    = {arXiv},
  eprint       = {2204.04766},
  timestamp    = {Wed, 13 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-04766.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KaptchukJ0R21,
  author       = {Gabriel Kaptchuk and
                  Tushar M. Jois and
                  Matthew Green and
                  Aviel D. Rubin},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Meteor: Cryptographically Secure Steganography for Realistic Distributions},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1529--1548},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484550},
  doi          = {10.1145/3460120.3484550},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KaptchukJ0R21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/WatkinsHKR21,
  author       = {Lanier A. Watkins and
                  Denzel Hamilton and
                  Kevin T. Kornegay and
                  Aviel Rubin},
  title        = {Triaging Autonomous Drone Faults By Simultaneously Assuring Autonomy
                  and Security},
  booktitle    = {55th Annual Conference on Information Sciences and Systems, {CISS}
                  2021, Baltimore, MD, USA, March 24-26, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CISS50987.2021.9400286},
  doi          = {10.1109/CISS50987.2021.9400286},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ciss/WatkinsHKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotais/SiilRED0W21,
  author       = {Karl Siil and
                  Aviel Rubin and
                  Matthew Elder and
                  Anton Dahbura and
                  Matthew Green and
                  Lanier A. Watkins},
  title        = {Cost-Effective Mission Assurance Engineering Through Simulation},
  booktitle    = {{IEEE} International Conference on Internet of Things and Intelligence
                  Systems, IoTaIS 2021, Bandung, Indonesia, November 23-24, 2021},
  pages        = {67--72},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IoTaIS53735.2021.9628592},
  doi          = {10.1109/IOTAIS53735.2021.9628592},
  timestamp    = {Wed, 15 Dec 2021 12:58:42 +0100},
  biburl       = {https://dblp.org/rec/conf/iotais/SiilRED0W21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SchaffterRW21,
  author       = {James Schaffter and
                  Aviel Rubin and
                  Lanier A. Watkins},
  title        = {A Containerization-Based Backfit Approach for Industrial Control System
                  Resiliency},
  booktitle    = {{IEEE} Security and Privacy Workshops, {SP} Workshops 2021, San Francisco,
                  CA, USA, May 27, 2021},
  pages        = {246--252},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SPW53761.2021.00043},
  doi          = {10.1109/SPW53761.2021.00043},
  timestamp    = {Thu, 21 Sep 2023 16:11:08 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SchaffterRW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-11870,
  author       = {Random Gwinn and
                  Mark A. Matties and
                  Aviel D. Rubin},
  title        = {Wavelet Selection and Employment for Side-Channel Disassembly},
  journal      = {CoRR},
  volume       = {abs/2107.11870},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.11870},
  eprinttype    = {arXiv},
  eprint       = {2107.11870},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-11870.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KaptchukJGR21,
  author       = {Gabriel Kaptchuk and
                  Tushar M. Jois and
                  Matthew Green and
                  Aviel D. Rubin},
  title        = {Meteor: Cryptographically Secure Steganography for Realistic Distributions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {686},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/686},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KaptchukJGR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccwc/CartagenaRDWRR20,
  author       = {Adrian Cartagena and
                  Gerald Rimmer and
                  Thomas van Dalsen and
                  Lanier A. Watkins and
                  William H. Robinson and
                  Aviel D. Rubin},
  title        = {Privacy Violating Opensource Intelligence Threat Evaluation Framework:
                  {A} Security Assessment Framework For Critical Infrastructure Owners},
  booktitle    = {10th Annual Computing and Communication Workshop and Conference, {CCWC}
                  2020, Las Vegas, NV, USA, January 6-8, 2020},
  pages        = {494--499},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CCWC47524.2020.9031172},
  doi          = {10.1109/CCWC47524.2020.9031172},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccwc/CartagenaRDWRR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccwc/ChavisBRW20,
  author       = {Jeffrey S. Chavis and
                  Anna L. Buczak and
                  Aviel D. Rubin and
                  Lanier A. Watkins},
  title        = {Connected Home Automated Security Monitor {(CHASM):} Protecting IoT
                  Through Application of Machine Learning},
  booktitle    = {10th Annual Computing and Communication Workshop and Conference, {CCWC}
                  2020, Las Vegas, NV, USA, January 6-8, 2020},
  pages        = {684--690},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CCWC47524.2020.9031162},
  doi          = {10.1109/CCWC47524.2020.9031162},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccwc/ChavisBRW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/WatkinsBHCRRD20,
  author       = {Lanier A. Watkins and
                  James Ballard and
                  Kevin Hamilton and
                  Jay Chow and
                  Aviel D. Rubin and
                  William H. Robinson and
                  Cleon Davis},
  editor       = {Guojun Wang and
                  Aniello Castiglione and
                  Alberto Huertas Celdr{\'{a}}n},
  title        = {Bio-Inspired, Host-based Firewall},
  booktitle    = {23rd {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2020, Guangzhou, China, December 29, 2020 - January
                  1, 2021},
  pages        = {86--91},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CSE50738.2020.00022},
  doi          = {10.1109/CSE50738.2020.00022},
  timestamp    = {Fri, 30 Apr 2021 12:35:40 +0200},
  biburl       = {https://dblp.org/rec/conf/cse/WatkinsBHCRRD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SiilREDGW20,
  author       = {Karl Siil and
                  Aviel D. Rubin and
                  Matthew Elder and
                  Anton Dahbura and
                  Matthew Green and
                  Lanier A. Watkins},
  title        = {Mission Assurance for Autonomous Undersea Vehicles},
  booktitle    = {2020 {IEEE} Security and Privacy Workshops, {SP} Workshops, San Francisco,
                  CA, USA, May 21, 2020},
  pages        = {244--249},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SPW50608.2020.00056},
  doi          = {10.1109/SPW50608.2020.00056},
  timestamp    = {Thu, 21 Sep 2023 16:11:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SiilREDGW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChavisBKRW20,
  author       = {Jeffrey S. Chavis and
                  Anna L. Buczak and
                  Aaron Kunz and
                  Aviel D. Rubin and
                  Lanier A. Watkins},
  title        = {A Capability for Autonomous IoT System Security: Pushing IoT Assurance
                  to the Edge},
  booktitle    = {2020 {IEEE} Security and Privacy Workshops, {SP} Workshops, San Francisco,
                  CA, USA, May 21, 2020},
  pages        = {256--261},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SPW50608.2020.00058},
  doi          = {10.1109/SPW50608.2020.00058},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ChavisBKRW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uemcom/WatkinsYLRR20,
  author       = {Lanier A. Watkins and
                  Yue Yu and
                  Sifan Li and
                  William H. Robinson and
                  Aviel D. Rubin},
  title        = {Using Deep Learning to Identify Security Risks of Personal Mobile
                  Devices in Enterprise Networks},
  booktitle    = {11th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile
                  Communication Conference, {UEMCON} 2020, New York City, NY, USA, October
                  28-31, 2020},
  pages        = {292--297},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/UEMCON51285.2020.9298079},
  doi          = {10.1109/UEMCON51285.2020.9298079},
  timestamp    = {Wed, 03 Feb 2021 15:37:19 +0100},
  biburl       = {https://dblp.org/rec/conf/uemcom/WatkinsYLRR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uemcom/WatkinsFLYRR20,
  author       = {Lanier A. Watkins and
                  Kevin D. Fairbanks and
                  Chengyu Li and
                  Mengdi Yang and
                  William H. Robinson and
                  Aviel D. Rubin},
  title        = {A Black Box Approach to Inferring, Characterizing, and Breaking Native
                  Device Tracking Autonomy},
  booktitle    = {11th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile
                  Communication Conference, {UEMCON} 2020, New York City, NY, USA, October
                  28-31, 2020},
  pages        = {303--308},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/UEMCON51285.2020.9298163},
  doi          = {10.1109/UEMCON51285.2020.9298163},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uemcom/WatkinsFLYRR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotdi/0002RRCS18,
  author       = {Paul D. Martin and
                  David Russell and
                  Aviel D. Rubin and
                  Stephen Checkoway and
                  Malek Ben Salem},
  title        = {Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems},
  booktitle    = {2018 {IEEE/ACM} Third International Conference on Internet-of-Things
                  Design and Implementation, IoTDI 2018, Orlando, FL, USA, April 17-20,
                  2018},
  pages        = {105--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/IoTDI.2018.00020},
  doi          = {10.1109/IOTDI.2018.00020},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iotdi/0002RRCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Kaptchuk0R17,
  author       = {Gabriel Kaptchuk and
                  Matthew Green and
                  Aviel D. Rubin},
  editor       = {Aggelos Kiayias},
  title        = {Outsourcing Medical Dataset Analysis: {A} Possible Solution},
  booktitle    = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {98--123},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70972-7\_6},
  doi          = {10.1007/978-3-319-70972-7\_6},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Kaptchuk0R17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcb/0002RTLR16,
  author       = {Paul D. Martin and
                  Michael Rushanan and
                  Thomas Tantillo and
                  Christoph U. Lehmann and
                  Aviel D. Rubin},
  title        = {Applications of Secure Location Sensing in Healthcare},
  booktitle    = {Proceedings of the 7th {ACM} International Conference on Bioinformatics,
                  Computational Biology, and Health Informatics, {BCB} 2016, Seattle,
                  WA, USA, October 2-5, 2016},
  pages        = {58--67},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2975167.2975173},
  doi          = {10.1145/2975167.2975173},
  timestamp    = {Tue, 06 Nov 2018 16:59:10 +0100},
  biburl       = {https://dblp.org/rec/conf/bcb/0002RTLR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/RushananRR16,
  author       = {Michael Rushanan and
                  David Russell and
                  Aviel D. Rubin},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {MalloryWorker: Stealthy Computation and Covert Channels Using Web
                  Workers},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {196--211},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_14},
  doi          = {10.1007/978-3-319-46598-2\_14},
  timestamp    = {Sat, 19 Oct 2019 20:20:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/RushananRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/KotzFGR15,
  author       = {David Kotz and
                  Kevin Fu and
                  Carl A. Gunter and
                  Aviel D. Rubin},
  title        = {Security for mobile and cloud frontiers in healthcare},
  journal      = {Commun. {ACM}},
  volume       = {58},
  number       = {8},
  pages        = {21--23},
  year         = {2015},
  url          = {https://doi.org/10.1145/2790830},
  doi          = {10.1145/2790830},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/KotzFGR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Rubin14,
  author       = {Aviel D. Rubin},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Taking two-factor to the next level: protecting online poker, banking,
                  healthcare and other applications},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {1--5},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2684461},
  doi          = {10.1145/2664243.2684461},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Rubin14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Garman0MR14,
  author       = {Christina Garman and
                  Matthew Green and
                  Ian Miers and
                  Aviel D. Rubin},
  editor       = {Rainer B{\"{o}}hme and
                  Michael Brenner and
                  Tyler Moore and
                  Matthew Smith},
  title        = {Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN}
                  and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8438},
  pages        = {140--155},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44774-1\_10},
  doi          = {10.1007/978-3-662-44774-1\_10},
  timestamp    = {Wed, 12 Aug 2020 17:59:02 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Garman0MR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RushananRKS14,
  author       = {Michael Rushanan and
                  Aviel D. Rubin and
                  Denis Foo Kune and
                  Colleen M. Swanson},
  title        = {SoK: Security and Privacy in Implantable Medical Devices and Body
                  Area Networks},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {524--539},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.40},
  doi          = {10.1109/SP.2014.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/RushananRKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AkinyeleGMPR0R13,
  author       = {Joseph A. Akinyele and
                  Christina Garman and
                  Ian Miers and
                  Matthew W. Pagano and
                  Michael Rushanan and
                  Matthew Green and
                  Aviel D. Rubin},
  title        = {Charm: a framework for rapidly prototyping cryptosystems},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {2},
  pages        = {111--128},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0057-3},
  doi          = {10.1007/S13389-013-0057-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AkinyeleGMPR0R13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcb/MartinRB13,
  author       = {Paul D. Martin and
                  Aviel D. Rubin and
                  Rafae Bhatti},
  editor       = {Jing Gao},
  title        = {Enforcing Minimum Necessary Access in Healthcare Through Integrated
                  Audit and Access Control},
  booktitle    = {{ACM} Conference on Bioinformatics, Computational Biology and Biomedical
                  Informatics. {ACM-BCB} 2013, Washington, DC, USA, September 22-25,
                  2013},
  pages        = {946},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2506583.2512368},
  doi          = {10.1145/2506583.2512368},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bcb/MartinRB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MiersG0R13,
  author       = {Ian Miers and
                  Christina Garman and
                  Matthew Green and
                  Aviel D. Rubin},
  title        = {Zerocoin: Anonymous Distributed E-Cash from Bitcoin},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {397--411},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.34},
  doi          = {10.1109/SP.2013.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MiersG0R13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Akinyele0R12,
  author       = {Joseph A. Akinyele and
                  Matthew Green and
                  Aviel D. Rubin},
  title        = {Charm: {A} Framework for Rapidly Prototyping Cryptosystems},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/charm-framework-rapidly-prototyping-cryptosystems},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Akinyele0R12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Miers0LR12,
  author       = {Ian Miers and
                  Matthew Green and
                  Christoph U. Lehmann and
                  Aviel D. Rubin},
  editor       = {Carl A. Gunter and
                  Zachary N. J. Peterson},
  title        = {Vis-{\`{a}}-vis Cryptography: Private and Trustworthy In-Person Certifications},
  booktitle    = {3rd {USENIX} Workshop on Health Security and Privacy, HealthSec'12,
                  Bellevue, WA, USA, August 6-7, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/healthsec12/workshop-program/presentation/miers},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Miers0LR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AkinyelePGLPR11,
  author       = {Joseph A. Akinyele and
                  Matthew W. Pagano and
                  Matthew D. Green and
                  Christoph U. Lehmann and
                  Zachary N. J. Peterson and
                  Aviel D. Rubin},
  editor       = {Xuxian Jiang and
                  Amiya Bhattacharya and
                  Partha Dasgupta and
                  William Enck},
  title        = {Securing electronic medical records using attribute-based encryption
                  on mobile devices},
  booktitle    = {SPSM'11, Proceedings of the 1st {ACM} Workshop Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2011, October
                  17, 2011, Chicago, IL, {USA}},
  pages        = {75--86},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046614.2046628},
  doi          = {10.1145/2046614.2046628},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AkinyelePGLPR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GreenR11,
  author       = {Matthew D. Green and
                  Aviel D. Rubin},
  editor       = {Ben Adida and
                  Umesh Shankar},
  title        = {A Research Roadmap for Healthcare {IT} Security Inspired by the {PCAST}
                  Health Information Technology Report},
  booktitle    = {2nd {USENIX} Workshop on Health Security and Privacy, HealthSec'11,
                  San Francisco, CA, USA, August 9, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/healthsec11/research-roadmap-healthcare-it-security-inspired-pcast-health-information},
  timestamp    = {Mon, 01 Feb 2021 17:03:06 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GreenR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkinyeleGR11,
  author       = {Joseph A. Akinyele and
                  Matthew Green and
                  Aviel D. Rubin},
  title        = {Charm: {A} framework for Rapidly Prototyping Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {617},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/617},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkinyeleGR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GardnerGR10,
  author       = {Ryan W. Gardner and
                  Sujata Garera and
                  Aviel D. Rubin},
  editor       = {Radu Sion},
  title        = {Designing for Audit: {A} Voting Machine with a Tiny {TCB}},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {312--319},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_24},
  doi          = {10.1007/978-3-642-14577-3\_24},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GardnerGR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2010healthsec,
  editor       = {Kevin Fu and
                  Tadayoshi Kohno and
                  Aviel D. Rubin},
  title        = {1st {USENIX} Workshop on Health Security and Privacy, HealthSec'10,
                  Washington, D.C., USA, August 10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/healthsec10},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2010healthsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkinyeleLGPPR10,
  author       = {Joseph A. Akinyele and
                  Christoph U. Lehmann and
                  Matthew Green and
                  Matthew W. Pagano and
                  Zachary N. J. Peterson and
                  Aviel D. Rubin},
  title        = {Self-Protecting Electronic Medical Records Using Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {565},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/565},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkinyeleLGPPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/BlazeIKMR09,
  author       = {Matt Blaze and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Tal Malkin and
                  Aviel D. Rubin},
  title        = {Anonymity in Wireless Broadcast Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {37--51},
  year         = {2009},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v8-n1/ijns-2009-v8-n1-p37-51.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/BlazeIKMR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RivestCPRSV09,
  author       = {Ronald L. Rivest and
                  David Chaum and
                  Bart Preneel and
                  Aviel D. Rubin and
                  Donald G. Saari and
                  Poorvi L. Vora},
  title        = {Guest editorial: special issue on electronic voting},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {593--596},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2034721},
  doi          = {10.1109/TIFS.2009.2034721},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RivestCPRSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GardnerGR09,
  author       = {Ryan W. Gardner and
                  Sujata Garera and
                  Aviel D. Rubin},
  title        = {Detecting code alteration by creating a temporary memory bottleneck},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {638--650},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033231},
  doi          = {10.1109/TIFS.2009.2033231},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GardnerGR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GardnerGR09,
  author       = {Ryan W. Gardner and
                  Sujata Garera and
                  Aviel D. Rubin},
  editor       = {Roger Dingledine and
                  Philippe Golle},
  title        = {Coercion Resistant End-to-end Voting},
  booktitle    = {Financial Cryptography and Data Security, 13th International Conference,
                  {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5628},
  pages        = {344--361},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03549-4\_21},
  doi          = {10.1007/978-3-642-03549-4\_21},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GardnerGR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RubinJ08,
  author       = {Aviel D. Rubin and
                  David R. Jefferson},
  title        = {New Research Results for Electronic Voting},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {3},
  pages        = {12--13},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.68},
  doi          = {10.1109/MSP.2008.68},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RubinJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GareraR07,
  author       = {Sujata Garera and
                  Aviel D. Rubin},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {An independent audit framework for software dependent voting systems},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {256--265},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315278},
  doi          = {10.1145/1315245.1315278},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GareraR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GardnerGR07,
  author       = {Ryan W. Gardner and
                  Sujata Garera and
                  Aviel D. Rubin},
  editor       = {Ray Martinez and
                  David A. Wagner},
  title        = {On the Difficulty of Validating Voting Machine Software with Software},
  booktitle    = {2007 {USENIX/ACCURATE} Electronic Voting Technology Workshop, EVT'07,
                  Boston, MA, USA, August 6, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/evt-07/difficulty-validating-voting-machine-software-software},
  timestamp    = {Mon, 01 Feb 2021 08:42:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GardnerGR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BonoRSG06,
  author       = {Stephen Bono and
                  Aviel D. Rubin and
                  Adam Stubblefield and
                  Matthew Green},
  title        = {Security through legality},
  journal      = {Commun. {ACM}},
  volume       = {49},
  number       = {6},
  pages        = {41--43},
  year         = {2006},
  url          = {https://doi.org/10.1145/1132469.1132499},
  doi          = {10.1145/1132469.1132499},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/BonoRSG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DoshiMR06,
  author       = {Sujata Doshi and
                  Fabian Monrose and
                  Aviel D. Rubin},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Feng Bao},
  title        = {Efficient Memory Bound Puzzles Using Pattern Databases},
  booktitle    = {Applied Cryptography and Network Security, 4th International Conference,
                  {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3989},
  pages        = {98--113},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767480\_7},
  doi          = {10.1007/11767480\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/DoshiMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/QiuMMR06,
  author       = {Sophie Y. Qiu and
                  Patrick D. McDaniel and
                  Fabian Monrose and
                  Aviel D. Rubin},
  editor       = {Paolo Bellavista and
                  Chi{-}Ming Chen and
                  Antonio Corradi and
                  Mahmoud Daneshmand},
  title        = {Characterizing Address Use Structure and Stability of Origin Advertisement
                  in Inter-domain Routing},
  booktitle    = {Proceedings of the 11th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2006), 26-29 June 2006, Cagliari, Sardinia, Italy},
  pages        = {489--496},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISCC.2006.48},
  doi          = {10.1109/ISCC.2006.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/QiuMMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2006,
  editor       = {Giovanni Di Crescenzo and
                  Aviel D. Rubin},
  title        = {Financial Cryptography and Data Security, 10th International Conference,
                  {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4107},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889663},
  doi          = {10.1007/11889663},
  isbn         = {3-540-46255-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/McDanielR05,
  author       = {Patrick D. McDaniel and
                  Aviel D. Rubin},
  title        = {Web security},
  journal      = {Comput. Networks},
  volume       = {48},
  number       = {5},
  pages        = {697--699},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.comnet.2005.02.001},
  doi          = {10.1016/J.COMNET.2005.02.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/McDanielR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecr/StubblefieldRW05,
  author       = {Adam Stubblefield and
                  Aviel D. Rubin and
                  Dan S. Wallach},
  title        = {Managing the Performance Impact of Web Security},
  journal      = {Electron. Commer. Res.},
  volume       = {5},
  number       = {1},
  pages        = {99--116},
  year         = {2005},
  url          = {https://doi.org/10.1023/B:ELEC.0000045975.59531.08},
  doi          = {10.1023/B:ELEC.0000045975.59531.08},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ecr/StubblefieldRW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fast/PetersonBHSR05,
  author       = {Zachary N. J. Peterson and
                  Randal C. Burns and
                  Joseph Herring and
                  Adam Stubblefield and
                  Aviel D. Rubin},
  editor       = {Garth Gibson},
  title        = {Secure Deletion for a Versioning File System},
  booktitle    = {Proceedings of the {FAST} '05 Conference on File and Storage Technologies,
                  December 13-16, 2005, San Francisco, California, {USA}},
  publisher    = {{USENIX}},
  year         = {2005},
  url          = {http://www.usenix.org/events/fast05/tech/peterson.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fast/PetersonBHSR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Bono0SJRS05,
  author       = {Steve Bono and
                  Matthew Green and
                  Adam Stubblefield and
                  Ari Juels and
                  Aviel D. Rubin and
                  Michael Szydlo},
  editor       = {Patrick D. McDaniel},
  title        = {Security Analysis of a Cryptographically-Enabled {RFID} Device},
  booktitle    = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD,
                  USA, July 31 - August 5, 2005},
  publisher    = {{USENIX} Association},
  year         = {2005},
  url          = {https://www.usenix.org/conference/14th-usenix-security-symposium/security-analysis-cryptographically-enabled-rfid-device},
  timestamp    = {Mon, 01 Feb 2021 08:42:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Bono0SJRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/JeffersonRSW04,
  author       = {David R. Jefferson and
                  Aviel D. Rubin and
                  Barbara Simons and
                  David A. Wagner},
  title        = {Analyzing internet voting security},
  journal      = {Commun. {ACM}},
  volume       = {47},
  number       = {10},
  pages        = {59--64},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022594.1022624},
  doi          = {10.1145/1022594.1022624},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/JeffersonRSW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/VoraABCDJJLRSY04,
  author       = {Poorvi L. Vora and
                  Ben Adida and
                  Ren Bucholz and
                  David Chaum and
                  David L. Dill and
                  David R. Jefferson and
                  Douglas W. Jones and
                  William Lattin and
                  Aviel D. Rubin and
                  Michael Ian Shamos and
                  Moti Yung},
  title        = {Evaluation of voting systems},
  journal      = {Commun. {ACM}},
  volume       = {47},
  number       = {11},
  pages        = {144},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029496.1029520},
  doi          = {10.1145/1029496.1029520},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/VoraABCDJJLRSY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ShimGRG04,
  author       = {Simon S. Y. Shim and
                  Li Gong and
                  Aviel D. Rubin and
                  Linley Gwennap},
  title        = {Guest Editors' Introduction: Securing the High-Speed Internet},
  journal      = {Computer},
  volume       = {37},
  number       = {6},
  pages        = {33--35},
  year         = {2004},
  url          = {https://doi.org/10.1109/MC.2004.25},
  doi          = {10.1109/MC.2004.25},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ShimGRG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DillR04,
  author       = {David L. Dill and
                  Aviel D. Rubin},
  title        = {Guest Editors' Introduction: E-Voting Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {22--23},
  year         = {2004},
  url          = {https://doi.org/10.1109/MSECP.2004.1264849},
  doi          = {10.1109/MSECP.2004.1264849},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DillR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/StubblefieldIR04,
  author       = {Adam Stubblefield and
                  John Ioannidis and
                  Aviel D. Rubin},
  title        = {A key recovery attack on the 802.11b wired equivalent privacy protocol
                  {(WEP)}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {319--332},
  year         = {2004},
  url          = {https://doi.org/10.1145/996943.996948},
  doi          = {10.1145/996943.996948},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/StubblefieldIR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/ByersRK04,
  author       = {Simon D. Byers and
                  Aviel D. Rubin and
                  David P. Kormann},
  title        = {Defending against an Internet-based attack on the physical world},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {4},
  number       = {3},
  pages        = {239--254},
  year         = {2004},
  url          = {https://doi.org/10.1145/1013202.1013203},
  doi          = {10.1145/1013202.1013203},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/ByersRK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KohnoSRW04,
  author       = {Tadayoshi Kohno and
                  Adam Stubblefield and
                  Aviel D. Rubin and
                  Dan S. Wallach},
  title        = {Analysis of an Electronic Voting System},
  booktitle    = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12
                  May 2004, Berkeley, CA, {USA}},
  pages        = {27},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SECPRI.2004.1301313},
  doi          = {10.1109/SECPRI.2004.1301313},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KohnoSRW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Rubin03,
  author       = {Aviel D. Rubin},
  title        = {Introduction},
  journal      = {Commun. {ACM}},
  volume       = {46},
  number       = {5},
  pages        = {28--30},
  year         = {2003},
  url          = {https://doi.org/10.1145/769800.769821},
  doi          = {10.1145/769800.769821},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Rubin03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GoodellAGIMR03,
  author       = {Geoffrey Goodell and
                  William Aiello and
                  Timothy Griffin and
                  John Ioannidis and
                  Patrick D. McDaniel and
                  Aviel D. Rubin},
  title        = {Working around {BGP:} An Incremental Approach to Improving Security
                  and Accuracy in Interdomain Routing},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2003, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2003},
  url          = {https://www.ndss-symposium.org/ndss2003/working-around-bgp-incremental-approach-improving-security-and-accuracy-interdomain-routing/},
  timestamp    = {Mon, 01 Feb 2021 08:42:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/GoodellAGIMR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BlazeIKMR03,
  author       = {Matt Blaze and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Tal Malkin and
                  Aviel D. Rubin},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {{WAR:} Wireless Anonymous Routing},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {218--232},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_27},
  doi          = {10.1007/11542322\_27},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BlazeIKMR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Rubin02,
  author       = {Aviel D. Rubin},
  title        = {Security considerations for remote electronic voting},
  journal      = {Commun. {ACM}},
  volume       = {45},
  number       = {12},
  pages        = {39--44},
  year         = {2002},
  url          = {https://doi.org/10.1145/585597.585599},
  doi          = {10.1145/585597.585599},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Rubin02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/IvancicWRRS02,
  author       = {Will Ivancic and
                  David A. Wagner and
                  Aviel D. Rubin and
                  E. Paul Ratazzi and
                  James P. G. Sterbenz},
  title        = {Securing Wireless and Mobile Networks - Is It Possible?},
  booktitle    = {Proceedings {IEEE} {INFOCOM} 2002, The 21st Annual Joint Conference
                  of the {IEEE} Computer and Communications Societies, New York, USA,
                  June 23-27, 2002},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  timestamp    = {Thu, 05 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/IvancicWRRS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/StubblefieldIR02,
  author       = {Adam Stubblefield and
                  John Ioannidis and
                  Aviel D. Rubin},
  title        = {Using the Fluhrer, Mantin, and Shamir Attack to Break {WEP}},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2002, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2002},
  url          = {https://www.ndss-symposium.org/ndss2002/using-fluhrer-mantin-and-shamir-attack-break-wep/},
  timestamp    = {Mon, 01 Feb 2021 08:42:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/StubblefieldIR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/ByersRK02,
  author       = {Simon D. Byers and
                  Aviel D. Rubin and
                  David P. Kormann},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Defending against an Internet-based attack on the physical world},
  booktitle    = {Proceedings of the 2002 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2002, Washington, DC, USA, November 21, 2002},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/644527.644529},
  doi          = {10.1145/644527.644529},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/ByersRK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/WaldmanRC01,
  author       = {Marc Waldman and
                  Aviel D. Rubin and
                  Lorrie Faith Cranor},
  title        = {The architecture of robust publishing systems},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {1},
  number       = {2},
  pages        = {199--230},
  year         = {2001},
  url          = {https://doi.org/10.1145/502152.502154},
  doi          = {10.1145/502152.502154},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/WaldmanRC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/RubinW01,
  author       = {Aviel D. Rubin and
                  Rebecca N. Wright},
  editor       = {Paul F. Syverson},
  title        = {Off-Line Generation of Limited-Use Credit Card Numbers},
  booktitle    = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
                  Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {187--200},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-46088-8\_18},
  doi          = {10.1007/3-540-46088-8\_18},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/RubinW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GerckNRRY01,
  author       = {Ed Gerck and
                  C. Andrew Neff and
                  Ronald L. Rivest and
                  Aviel D. Rubin and
                  Moti Yung},
  editor       = {Paul F. Syverson},
  title        = {The Business of Electronic Voting},
  booktitle    = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
                  Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {234--259},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-46088-8\_21},
  doi          = {10.1007/3-540-46088-8\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GerckNRRY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/Rubin01,
  author       = {Aviel D. Rubin},
  editor       = {Mark Burgess},
  title        = {Security for E-Voting in Public Elections},
  booktitle    = {Proceedings of the 15th Conference on Systems Administration {(LISA}
                  2001), San Diego, California, USA, December 2-7, 2001},
  publisher    = {{USENIX}},
  year         = {2001},
  timestamp    = {Wed, 04 Jul 2018 13:06:35 +0200},
  biburl       = {https://dblp.org/rec/conf/lisa/Rubin01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0108017,
  author       = {Aviel D. Rubin},
  title        = {Security Considerations for Remote Electronic Voting over the Internet},
  journal      = {CoRR},
  volume       = {cs.CR/0108017},
  year         = {2001},
  url          = {https://arxiv.org/abs/cs/0108017},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-0108017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KormannR00,
  author       = {David P. Kormann and
                  Aviel D. Rubin},
  title        = {Risks of the Passport single signon protocol},
  journal      = {Comput. Networks},
  volume       = {33},
  number       = {1-6},
  pages        = {51--58},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1389-1286(00)00048-7},
  doi          = {10.1016/S1389-1286(00)00048-7},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/KormannR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/MonroseR00,
  author       = {Fabian Monrose and
                  Aviel D. Rubin},
  title        = {Keystroke dynamics as a biometric for authentication},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {16},
  number       = {4},
  pages        = {351--359},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0167-739X(99)00059-X},
  doi          = {10.1016/S0167-739X(99)00059-X},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/MonroseR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/McDanielR00,
  author       = {Patrick D. McDaniel and
                  Aviel D. Rubin},
  editor       = {Yair Frankel},
  title        = {A Response to ''Can We Eliminate Certificate Revocation Lists?''},
  booktitle    = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla,
                  British West Indies, February 20-24, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1962},
  pages        = {245--258},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45472-1\_17},
  doi          = {10.1007/3-540-45472-1\_17},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/McDanielR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WaldmanRC00,
  author       = {Marc Waldman and
                  Aviel D. Rubin and
                  Lorrie Faith Cranor},
  editor       = {Steven M. Bellovin and
                  Greg Rose},
  title        = {Publius: {A} Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous
                  Web Publishing System},
  booktitle    = {9th {USENIX} Security Symposium, Denver, Colorado, USA, August 14-17,
                  2000},
  publisher    = {{USENIX} Association},
  year         = {2000},
  url          = {https://www.usenix.org/conference/9th-usenix-security-symposium/publius-robust-tamper-evident-censorship-resistant-and},
  timestamp    = {Mon, 01 Feb 2021 08:43:02 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WaldmanRC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/ReiterR99,
  author       = {Michael K. Reiter and
                  Aviel D. Rubin},
  title        = {Anonymous Web Transactions with Crowds},
  journal      = {Commun. {ACM}},
  volume       = {42},
  number       = {2},
  pages        = {32--38},
  year         = {1999},
  url          = {https://doi.org/10.1145/293411.293778},
  doi          = {10.1145/293411.293778},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/ReiterR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/GilmoreKR99,
  author       = {Christian Gilmore and
                  David P. Kormann and
                  Aviel D. Rubin},
  title        = {Secure remote access to an Internet Web server},
  journal      = {{IEEE} Netw.},
  volume       = {13},
  number       = {6},
  pages        = {31--37},
  year         = {1999},
  url          = {https://doi.org/10.1109/65.806985},
  doi          = {10.1109/65.806985},
  timestamp    = {Thu, 01 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/GilmoreKR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AielloRS99,
  author       = {William Aiello and
                  Aviel D. Rubin and
                  Martin Strauss},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {Using Smartcards to Secure a Personalized Gambling Device},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {128--137},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319727},
  doi          = {10.1145/319709.319727},
  timestamp    = {Tue, 10 Nov 2020 20:00:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AielloRS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GilmoreKR99,
  author       = {Christian Gilmore and
                  David P. Kormann and
                  Aviel D. Rubin},
  title        = {Secure Remote Access to an Internal Web Server},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 1999, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {1999},
  url          = {https://www.ndss-symposium.org/ndss1999/secure-remote-access-internal-web-server/},
  timestamp    = {Mon, 01 Feb 2021 08:42:19 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/GilmoreKR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MonroseWR99,
  author       = {Fabian Monrose and
                  Peter Wyckoff and
                  Aviel D. Rubin},
  title        = {Distributed Execution with Remote Audit},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 1999, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {1999},
  url          = {https://www.ndss-symposium.org/ndss1999/distributed-execution-remote-audit/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/MonroseWR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JermynMMRR99,
  author       = {Ian Jermyn and
                  Alain J. Mayer and
                  Fabian Monrose and
                  Michael K. Reiter and
                  Aviel D. Rubin},
  editor       = {G. Winfield Treese},
  title        = {The Design and Analysis of Graphical Passwords},
  booktitle    = {Proceedings of the 8th {USENIX} Security Symposium, Washington, DC,
                  USA, August 23-26, 1999},
  publisher    = {{USENIX} Association},
  year         = {1999},
  url          = {https://www.usenix.org/conference/8th-usenix-security-symposium/design-and-analysis-graphical-passwords},
  timestamp    = {Mon, 01 Feb 2021 08:43:06 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JermynMMRR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RubinG98,
  author       = {Aviel D. Rubin and
                  Daniel E. Geer Jr.},
  title        = {A Survey of Web Security},
  journal      = {Computer},
  volume       = {31},
  number       = {9},
  pages        = {34--41},
  year         = {1998},
  url          = {https://doi.org/10.1109/2.708448},
  doi          = {10.1109/2.708448},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RubinG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/RubinG98,
  author       = {Aviel D. Rubin and
                  Daniel E. Geer Jr.},
  title        = {Mobile Code Security},
  journal      = {{IEEE} Internet Comput.},
  volume       = {2},
  number       = {6},
  pages        = {30--34},
  year         = {1998},
  url          = {https://doi.org/10.1109/4236.735984},
  doi          = {10.1109/4236.735984},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/RubinG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ReiterR98,
  author       = {Michael K. Reiter and
                  Aviel D. Rubin},
  title        = {Crowds: Anonymity for Web Transactions},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {66--92},
  year         = {1998},
  url          = {https://doi.org/10.1145/290163.290168},
  doi          = {10.1145/290163.290168},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ReiterR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MalkhiRR98,
  author       = {Dahlia Malkhi and
                  Michael K. Reiter and
                  Aviel D. Rubin},
  title        = {Secure Execution of Java Applets using a Remote Playground},
  booktitle    = {Security and Privacy - 1998 {IEEE} Symposium on Security and Privacy,
                  Oakland, CA, USA, May 3-6, 1998, Proceedings},
  pages        = {40--51},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/SECPRI.1998.674822},
  doi          = {10.1109/SECPRI.1998.674822},
  timestamp    = {Thu, 21 Sep 2023 15:57:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MalkhiRR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/1998,
  editor       = {Aviel D. Rubin},
  title        = {Proceedings of the 7th {USENIX} Security Symposium, San Antonio, TX,
                  USA, January 26-29, 1998},
  publisher    = {{USENIX} Association},
  year         = {1998},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rubin97,
  author       = {Aviel D. Rubin},
  title        = {An Experience Teaching a Graduate Course in Cryptography},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {2},
  pages        = {97--109},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885832},
  doi          = {10.1080/0161-119791885832},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rubin97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/Rubin97,
  author       = {Aviel D. Rubin},
  title        = {Extending {NCP} for Protocols Using Public Keys},
  journal      = {Mob. Networks Appl.},
  volume       = {2},
  number       = {3},
  pages        = {227--241},
  year         = {1997},
  url          = {https://doi.org/10.1023/A:1013636817876},
  doi          = {10.1023/A:1013636817876},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/Rubin97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/RubinBF97,
  author       = {Aviel D. Rubin and
                  Dan Boneh and
                  Kevin Fu},
  editor       = {Vijay Varadharajan and
                  Josef Pieprzyk and
                  Yi Mu},
  title        = {Revocation of Unread E-mail in an Untrusted Network},
  booktitle    = {Information Security and Privacy, Second Australasian Conference,
                  ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1270},
  pages        = {62--75},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0027944},
  doi          = {10.1007/BFB0027944},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/RubinBF97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MonroseR97,
  author       = {Fabian Monrose and
                  Aviel D. Rubin},
  editor       = {Richard Graveman and
                  Philippe A. Janson and
                  Clifford Neuman and
                  Li Gong},
  title        = {Authentication via Keystroke Dynamics},
  booktitle    = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and
                  Communications Security, Zurich, Switzerland, April 1-4, 1997},
  pages        = {48--56},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/266420.266434},
  doi          = {10.1145/266420.266434},
  timestamp    = {Tue, 10 Nov 2020 20:00:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MonroseR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MartinRR97,
  author       = {David M. Martin Jr. and
                  Sivaramakrishnan Rajagopalan and
                  Aviel D. Rubin},
  title        = {Blocking Java Applets at the Firewall},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 1997, San Diego, California, {USA}},
  pages        = {16--26},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/NDSS.1997.579215},
  doi          = {10.1109/NDSS.1997.579215},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/MartinRR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csys/Rubin96,
  author       = {Aviel D. Rubin},
  title        = {Independent One-Time Passwords},
  journal      = {Comput. Syst.},
  volume       = {9},
  number       = {1},
  pages        = {15--27},
  year         = {1996},
  url          = {http://www.usenix.org/publications/compsystems/1996/win\_rubin.pdf},
  timestamp    = {Sun, 10 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csys/Rubin96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csys/Rubin96a,
  author       = {Aviel D. Rubin},
  title        = {Response: Independent One-Time Passwords},
  journal      = {Comput. Syst.},
  volume       = {9},
  number       = {3},
  pages        = {257},
  year         = {1996},
  url          = {http://www.usenix.org/publications/compsystems/1996/sum\_rubin.pdf},
  timestamp    = {Sun, 10 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csys/Rubin96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ShoupR96,
  author       = {Victor Shoup and
                  Aviel D. Rubin},
  editor       = {Ueli M. Maurer},
  title        = {Session Key Distribution Using Smart Cards},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {321--331},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_28},
  doi          = {10.1007/3-540-68339-9\_28},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ShoupR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/JaegerR96,
  author       = {Trent Jaeger and
                  Aviel D. Rubin},
  editor       = {James T. Ellis and
                  B. Clifford Neuman and
                  David M. Balenson},
  title        = {Preserving Integrity in Remote File Location and Retrieval},
  booktitle    = {1996 Symposium on Network and Distributed System Security, {(S)NDSS}
                  '96, San Diego, CA, USA, February 22-23, 1996},
  pages        = {53--63},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/NDSS.1996.492413},
  doi          = {10.1109/NDSS.1996.492413},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/JaegerR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Rubin95,
  author       = {Aviel D. Rubin},
  title        = {Secure Distribution of Electronic Documents in a Hostile Environment},
  journal      = {Comput. Commun.},
  volume       = {18},
  number       = {6},
  pages        = {429--434},
  year         = {1995},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Rubin95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/Rubin95,
  author       = {Aviel D. Rubin},
  title        = {Extending {NCP} for protocols using public keys},
  booktitle    = {Proceedings of the 4th International Conference on Computer Communications
                  and Networks {(ICCCN} '95), September 20-23, 1995, Las Vegas, Nevada,
                  {USA}},
  pages        = {94},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/ICCCN.1995.540107},
  doi          = {10.1109/ICCCN.1995.540107},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/Rubin95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Rubin95,
  author       = {Aviel D. Rubin},
  editor       = {James T. Ellis and
                  David M. Balenson and
                  Robert W. Shirey},
  title        = {Trusted distribution of software over the Internet},
  booktitle    = {1995 Symposium on Network and Distributed System Security, {(S)NDSS}
                  '95, San Diego, California, USA, February 16-17, 1995},
  pages        = {47--53},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/NDSS.1995.390646},
  doi          = {10.1109/NDSS.1995.390646},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Rubin95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Rubin95,
  author       = {Aviel D. Rubin},
  editor       = {Frederick M. Avolio and
                  Steven M. Bellovin},
  title        = {Independent One-Time Passwords},
  booktitle    = {Proceedings of the 5th {USENIX} Security Symposium, Salt Lake City,
                  Utah, USA, June 5-7, 1995},
  publisher    = {{USENIX} Association},
  year         = {1995},
  url          = {https://www.usenix.org/legacy/publications/library/proceedings/security95/rubin.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Rubin95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc1805,
  author       = {Aviel D. Rubin},
  title        = {Location-Independent Data/Software Integrity Protocol},
  journal      = {{RFC}},
  volume       = {1805},
  pages        = {1--6},
  year         = {1995},
  url          = {https://doi.org/10.17487/RFC1805},
  doi          = {10.17487/RFC1805},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc1805.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Rubin94,
  author       = {Aviel D. Rubin},
  title        = {Nonmonotonic cryptographic protocols},
  school       = {University of Michigan, {USA}},
  year         = {1994},
  url          = {https://hdl.handle.net/2027.42/104026},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Rubin94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/RubinH94,
  author       = {Aviel D. Rubin and
                  Peter Honeyman},
  title        = {Nonmonotonic Cryptographic Protocols},
  booktitle    = {Seventh {IEEE} Computer Security Foundations Workshop - CSFW'94, Franconia,
                  New Hampshire, USA, June 14-16, 1994, Proceedings},
  pages        = {100--116},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/CSFW.1994.315943},
  doi          = {10.1109/CSFW.1994.315943},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/RubinH94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RubinH93,
  author       = {Aviel D. Rubin and
                  Peter Honeyman},
  title        = {Long Running Jobs in an Authenticated Environment},
  booktitle    = {Proceedings of the 4th {USENIX} Security Symposium, Santa Clara, CA,
                  USA, October 4-6, 1993},
  publisher    = {{USENIX} Association},
  year         = {1993},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RubinH93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/RubinB77,
  author       = {Aviel D. Rubin and
                  Bertram C. Bruce},
  editor       = {Raj Reddy},
  title        = {From Conversations to Stories: An Analysis of Differences Between
                  Oral and Written Language Comprehension},
  booktitle    = {Proceedings of the 5th International Joint Conference on Artificial
                  Intelligence. Cambridge, MA, USA, August 22-25, 1977},
  pages        = {141},
  publisher    = {William Kaufmann},
  year         = {1977},
  url          = {http://ijcai.org/Proceedings/77-1/Papers/023C.pdf},
  timestamp    = {Tue, 20 Aug 2019 16:18:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/RubinB77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics