Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Aviel D. Rubin
@article{DBLP:journals/popets/JoisBBCCKZKR24, author = {Tushar M. Jois and Gabrielle Beck and Sofia Belikovetsky and Joseph Carrigan and Alishah Chator and Logan Kostick and Maximilian Zinkus and Gabriel Kaptchuk and Aviel D. Rubin}, title = {SocIoTy: Practical Cryptography in Smart Home Contexts}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {1}, pages = {447--464}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0026}, doi = {10.56553/POPETS-2024-0026}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/JoisBBCCKZKR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccwc/ManojWSRWR23, author = {Valeti Manoj and Shao Wenda and Niu Sihan and Christopher A. Rouff and Lanier A. Watkins and Aviel Rubin}, title = {Explainable Autonomic Cybersecurity For Industrial Control Systems}, booktitle = {13th {IEEE} Annual Computing and Communication Workshop and Conference, {CCWC} 2023, Las Vegas, NV, USA, March 8-11, 2023}, pages = {900--9006}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CCWC57344.2023.10099307}, doi = {10.1109/CCWC57344.2023.10099307}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccwc/ManojWSRWR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaa2/BeattieWRRW22, author = {Hedin Beattie and Lanier A. Watkins and William H. Robinson and Aviel D. Rubin and Shari Watkins}, title = {Measuring and Mitigating Bias in AI-Chatbots}, booktitle = {{IEEE} International Conference on Assured Autonomy, {ICAA} 2022, Virtual Event / Fajardo, PR, USA, March 22-24, 2022}, pages = {117--123}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAA52185.2022.00023}, doi = {10.1109/ICAA52185.2022.00023}, timestamp = {Tue, 03 May 2022 17:07:11 +0200}, biburl = {https://dblp.org/rec/conf/icaa2/BeattieWRRW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/CerviniMBMRW22, author = {James Cervini and Daniel Muller and Alexander Beall and Joseph Maurio and Aviel Rubin and Lanier A. Watkins}, editor = {Jason Staggs and Sujeet Shenoi}, title = {Trusted Virtualization-Based Programmable Logic Controller Resilience Using a Backfit Approach}, booktitle = {Critical Infrastructure Protection {XVI} - 16th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2022, Virtual Event, March 14-15, 2022, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {666}, pages = {103--117}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20137-0\_4}, doi = {10.1007/978-3-031-20137-0\_4}, timestamp = {Thu, 08 Dec 2022 17:43:50 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/CerviniMBMRW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-04766, author = {Random Gwinn and Mark A. Matties and Aviel D. Rubin}, title = {Configuration and Collection Factors for Side-Channel Disassembly}, journal = {CoRR}, volume = {abs/2204.04766}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.04766}, doi = {10.48550/ARXIV.2204.04766}, eprinttype = {arXiv}, eprint = {2204.04766}, timestamp = {Wed, 13 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-04766.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KaptchukJ0R21, author = {Gabriel Kaptchuk and Tushar M. Jois and Matthew Green and Aviel D. Rubin}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Meteor: Cryptographically Secure Steganography for Realistic Distributions}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1529--1548}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484550}, doi = {10.1145/3460120.3484550}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KaptchukJ0R21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/WatkinsHKR21, author = {Lanier A. Watkins and Denzel Hamilton and Kevin T. Kornegay and Aviel Rubin}, title = {Triaging Autonomous Drone Faults By Simultaneously Assuring Autonomy and Security}, booktitle = {55th Annual Conference on Information Sciences and Systems, {CISS} 2021, Baltimore, MD, USA, March 24-26, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CISS50987.2021.9400286}, doi = {10.1109/CISS50987.2021.9400286}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ciss/WatkinsHKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotais/SiilRED0W21, author = {Karl Siil and Aviel Rubin and Matthew Elder and Anton Dahbura and Matthew Green and Lanier A. Watkins}, title = {Cost-Effective Mission Assurance Engineering Through Simulation}, booktitle = {{IEEE} International Conference on Internet of Things and Intelligence Systems, IoTaIS 2021, Bandung, Indonesia, November 23-24, 2021}, pages = {67--72}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IoTaIS53735.2021.9628592}, doi = {10.1109/IOTAIS53735.2021.9628592}, timestamp = {Wed, 15 Dec 2021 12:58:42 +0100}, biburl = {https://dblp.org/rec/conf/iotais/SiilRED0W21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SchaffterRW21, author = {James Schaffter and Aviel Rubin and Lanier A. Watkins}, title = {A Containerization-Based Backfit Approach for Industrial Control System Resiliency}, booktitle = {{IEEE} Security and Privacy Workshops, {SP} Workshops 2021, San Francisco, CA, USA, May 27, 2021}, pages = {246--252}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SPW53761.2021.00043}, doi = {10.1109/SPW53761.2021.00043}, timestamp = {Thu, 21 Sep 2023 16:11:08 +0200}, biburl = {https://dblp.org/rec/conf/sp/SchaffterRW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-11870, author = {Random Gwinn and Mark A. Matties and Aviel D. Rubin}, title = {Wavelet Selection and Employment for Side-Channel Disassembly}, journal = {CoRR}, volume = {abs/2107.11870}, year = {2021}, url = {https://arxiv.org/abs/2107.11870}, eprinttype = {arXiv}, eprint = {2107.11870}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-11870.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KaptchukJGR21, author = {Gabriel Kaptchuk and Tushar M. Jois and Matthew Green and Aviel D. Rubin}, title = {Meteor: Cryptographically Secure Steganography for Realistic Distributions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {686}, year = {2021}, url = {https://eprint.iacr.org/2021/686}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KaptchukJGR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccwc/CartagenaRDWRR20, author = {Adrian Cartagena and Gerald Rimmer and Thomas van Dalsen and Lanier A. Watkins and William H. Robinson and Aviel D. Rubin}, title = {Privacy Violating Opensource Intelligence Threat Evaluation Framework: {A} Security Assessment Framework For Critical Infrastructure Owners}, booktitle = {10th Annual Computing and Communication Workshop and Conference, {CCWC} 2020, Las Vegas, NV, USA, January 6-8, 2020}, pages = {494--499}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CCWC47524.2020.9031172}, doi = {10.1109/CCWC47524.2020.9031172}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccwc/CartagenaRDWRR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccwc/ChavisBRW20, author = {Jeffrey S. Chavis and Anna L. Buczak and Aviel D. Rubin and Lanier A. Watkins}, title = {Connected Home Automated Security Monitor {(CHASM):} Protecting IoT Through Application of Machine Learning}, booktitle = {10th Annual Computing and Communication Workshop and Conference, {CCWC} 2020, Las Vegas, NV, USA, January 6-8, 2020}, pages = {684--690}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CCWC47524.2020.9031162}, doi = {10.1109/CCWC47524.2020.9031162}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccwc/ChavisBRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/WatkinsBHCRRD20, author = {Lanier A. Watkins and James Ballard and Kevin Hamilton and Jay Chow and Aviel D. Rubin and William H. Robinson and Cleon Davis}, editor = {Guojun Wang and Aniello Castiglione and Alberto Huertas Celdr{\'{a}}n}, title = {Bio-Inspired, Host-based Firewall}, booktitle = {23rd {IEEE} International Conference on Computational Science and Engineering, {CSE} 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {86--91}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CSE50738.2020.00022}, doi = {10.1109/CSE50738.2020.00022}, timestamp = {Fri, 30 Apr 2021 12:35:40 +0200}, biburl = {https://dblp.org/rec/conf/cse/WatkinsBHCRRD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SiilREDGW20, author = {Karl Siil and Aviel D. Rubin and Matthew Elder and Anton Dahbura and Matthew Green and Lanier A. Watkins}, title = {Mission Assurance for Autonomous Undersea Vehicles}, booktitle = {2020 {IEEE} Security and Privacy Workshops, {SP} Workshops, San Francisco, CA, USA, May 21, 2020}, pages = {244--249}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SPW50608.2020.00056}, doi = {10.1109/SPW50608.2020.00056}, timestamp = {Thu, 21 Sep 2023 16:11:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/SiilREDGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChavisBKRW20, author = {Jeffrey S. Chavis and Anna L. Buczak and Aaron Kunz and Aviel D. Rubin and Lanier A. Watkins}, title = {A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the Edge}, booktitle = {2020 {IEEE} Security and Privacy Workshops, {SP} Workshops, San Francisco, CA, USA, May 21, 2020}, pages = {256--261}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SPW50608.2020.00058}, doi = {10.1109/SPW50608.2020.00058}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ChavisBKRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uemcom/WatkinsYLRR20, author = {Lanier A. Watkins and Yue Yu and Sifan Li and William H. Robinson and Aviel D. Rubin}, title = {Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks}, booktitle = {11th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile Communication Conference, {UEMCON} 2020, New York City, NY, USA, October 28-31, 2020}, pages = {292--297}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/UEMCON51285.2020.9298079}, doi = {10.1109/UEMCON51285.2020.9298079}, timestamp = {Wed, 03 Feb 2021 15:37:19 +0100}, biburl = {https://dblp.org/rec/conf/uemcom/WatkinsYLRR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uemcom/WatkinsFLYRR20, author = {Lanier A. Watkins and Kevin D. Fairbanks and Chengyu Li and Mengdi Yang and William H. Robinson and Aviel D. Rubin}, title = {A Black Box Approach to Inferring, Characterizing, and Breaking Native Device Tracking Autonomy}, booktitle = {11th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile Communication Conference, {UEMCON} 2020, New York City, NY, USA, October 28-31, 2020}, pages = {303--308}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/UEMCON51285.2020.9298163}, doi = {10.1109/UEMCON51285.2020.9298163}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uemcom/WatkinsFLYRR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotdi/0002RRCS18, author = {Paul D. Martin and David Russell and Aviel D. Rubin and Stephen Checkoway and Malek Ben Salem}, title = {Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems}, booktitle = {2018 {IEEE/ACM} Third International Conference on Internet-of-Things Design and Implementation, IoTDI 2018, Orlando, FL, USA, April 17-20, 2018}, pages = {105--116}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/IoTDI.2018.00020}, doi = {10.1109/IOTDI.2018.00020}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iotdi/0002RRCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Kaptchuk0R17, author = {Gabriel Kaptchuk and Matthew Green and Aviel D. Rubin}, editor = {Aggelos Kiayias}, title = {Outsourcing Medical Dataset Analysis: {A} Possible Solution}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {98--123}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_6}, doi = {10.1007/978-3-319-70972-7\_6}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Kaptchuk0R17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcb/0002RTLR16, author = {Paul D. Martin and Michael Rushanan and Thomas Tantillo and Christoph U. Lehmann and Aviel D. Rubin}, title = {Applications of Secure Location Sensing in Healthcare}, booktitle = {Proceedings of the 7th {ACM} International Conference on Bioinformatics, Computational Biology, and Health Informatics, {BCB} 2016, Seattle, WA, USA, October 2-5, 2016}, pages = {58--67}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2975167.2975173}, doi = {10.1145/2975167.2975173}, timestamp = {Tue, 06 Nov 2018 16:59:10 +0100}, biburl = {https://dblp.org/rec/conf/bcb/0002RTLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/RushananRR16, author = {Michael Rushanan and David Russell and Aviel D. Rubin}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {MalloryWorker: Stealthy Computation and Covert Channels Using Web Workers}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {196--211}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_14}, doi = {10.1007/978-3-319-46598-2\_14}, timestamp = {Sat, 19 Oct 2019 20:20:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/RushananRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/KotzFGR15, author = {David Kotz and Kevin Fu and Carl A. Gunter and Aviel D. Rubin}, title = {Security for mobile and cloud frontiers in healthcare}, journal = {Commun. {ACM}}, volume = {58}, number = {8}, pages = {21--23}, year = {2015}, url = {https://doi.org/10.1145/2790830}, doi = {10.1145/2790830}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/KotzFGR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Rubin14, author = {Aviel D. Rubin}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Taking two-factor to the next level: protecting online poker, banking, healthcare and other applications}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {1--5}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2684461}, doi = {10.1145/2664243.2684461}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Rubin14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Garman0MR14, author = {Christina Garman and Matthew Green and Ian Miers and Aviel D. Rubin}, editor = {Rainer B{\"{o}}hme and Michael Brenner and Tyler Moore and Matthew Smith}, title = {Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity}, booktitle = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN} and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8438}, pages = {140--155}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44774-1\_10}, doi = {10.1007/978-3-662-44774-1\_10}, timestamp = {Wed, 12 Aug 2020 17:59:02 +0200}, biburl = {https://dblp.org/rec/conf/fc/Garman0MR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RushananRKS14, author = {Michael Rushanan and Aviel D. Rubin and Denis Foo Kune and Colleen M. Swanson}, title = {SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {524--539}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.40}, doi = {10.1109/SP.2014.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/RushananRKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AkinyeleGMPR0R13, author = {Joseph A. Akinyele and Christina Garman and Ian Miers and Matthew W. Pagano and Michael Rushanan and Matthew Green and Aviel D. Rubin}, title = {Charm: a framework for rapidly prototyping cryptosystems}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {2}, pages = {111--128}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0057-3}, doi = {10.1007/S13389-013-0057-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/AkinyeleGMPR0R13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcb/MartinRB13, author = {Paul D. Martin and Aviel D. Rubin and Rafae Bhatti}, editor = {Jing Gao}, title = {Enforcing Minimum Necessary Access in Healthcare Through Integrated Audit and Access Control}, booktitle = {{ACM} Conference on Bioinformatics, Computational Biology and Biomedical Informatics. {ACM-BCB} 2013, Washington, DC, USA, September 22-25, 2013}, pages = {946}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2506583.2512368}, doi = {10.1145/2506583.2512368}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bcb/MartinRB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MiersG0R13, author = {Ian Miers and Christina Garman and Matthew Green and Aviel D. Rubin}, title = {Zerocoin: Anonymous Distributed E-Cash from Bitcoin}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {397--411}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.34}, doi = {10.1109/SP.2013.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MiersG0R13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Akinyele0R12, author = {Joseph A. Akinyele and Matthew Green and Aviel D. Rubin}, title = {Charm: {A} Framework for Rapidly Prototyping Cryptosystems}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/charm-framework-rapidly-prototyping-cryptosystems}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Akinyele0R12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Miers0LR12, author = {Ian Miers and Matthew Green and Christoph U. Lehmann and Aviel D. Rubin}, editor = {Carl A. Gunter and Zachary N. J. Peterson}, title = {Vis-{\`{a}}-vis Cryptography: Private and Trustworthy In-Person Certifications}, booktitle = {3rd {USENIX} Workshop on Health Security and Privacy, HealthSec'12, Bellevue, WA, USA, August 6-7, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/healthsec12/workshop-program/presentation/miers}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/Miers0LR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AkinyelePGLPR11, author = {Joseph A. Akinyele and Matthew W. Pagano and Matthew D. Green and Christoph U. Lehmann and Zachary N. J. Peterson and Aviel D. Rubin}, editor = {Xuxian Jiang and Amiya Bhattacharya and Partha Dasgupta and William Enck}, title = {Securing electronic medical records using attribute-based encryption on mobile devices}, booktitle = {SPSM'11, Proceedings of the 1st {ACM} Workshop Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2011, October 17, 2011, Chicago, IL, {USA}}, pages = {75--86}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046614.2046628}, doi = {10.1145/2046614.2046628}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AkinyelePGLPR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GreenR11, author = {Matthew D. Green and Aviel D. Rubin}, editor = {Ben Adida and Umesh Shankar}, title = {A Research Roadmap for Healthcare {IT} Security Inspired by the {PCAST} Health Information Technology Report}, booktitle = {2nd {USENIX} Workshop on Health Security and Privacy, HealthSec'11, San Francisco, CA, USA, August 9, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/healthsec11/research-roadmap-healthcare-it-security-inspired-pcast-health-information}, timestamp = {Mon, 01 Feb 2021 17:03:06 +0100}, biburl = {https://dblp.org/rec/conf/uss/GreenR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkinyeleGR11, author = {Joseph A. Akinyele and Matthew Green and Aviel D. Rubin}, title = {Charm: {A} framework for Rapidly Prototyping Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {617}, year = {2011}, url = {http://eprint.iacr.org/2011/617}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkinyeleGR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GardnerGR10, author = {Ryan W. Gardner and Sujata Garera and Aviel D. Rubin}, editor = {Radu Sion}, title = {Designing for Audit: {A} Voting Machine with a Tiny {TCB}}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {312--319}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_24}, doi = {10.1007/978-3-642-14577-3\_24}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/GardnerGR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2010healthsec, editor = {Kevin Fu and Tadayoshi Kohno and Aviel D. Rubin}, title = {1st {USENIX} Workshop on Health Security and Privacy, HealthSec'10, Washington, D.C., USA, August 10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/healthsec10}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2010healthsec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkinyeleLGPPR10, author = {Joseph A. Akinyele and Christoph U. Lehmann and Matthew Green and Matthew W. Pagano and Zachary N. J. Peterson and Aviel D. Rubin}, title = {Self-Protecting Electronic Medical Records Using Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {565}, year = {2010}, url = {http://eprint.iacr.org/2010/565}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkinyeleLGPPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/BlazeIKMR09, author = {Matt Blaze and John Ioannidis and Angelos D. Keromytis and Tal Malkin and Aviel D. Rubin}, title = {Anonymity in Wireless Broadcast Networks}, journal = {Int. J. Netw. Secur.}, volume = {8}, number = {1}, pages = {37--51}, year = {2009}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v8-n1/ijns-2009-v8-n1-p37-51.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/BlazeIKMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RivestCPRSV09, author = {Ronald L. Rivest and David Chaum and Bart Preneel and Aviel D. Rubin and Donald G. Saari and Poorvi L. Vora}, title = {Guest editorial: special issue on electronic voting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {593--596}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2034721}, doi = {10.1109/TIFS.2009.2034721}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RivestCPRSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GardnerGR09, author = {Ryan W. Gardner and Sujata Garera and Aviel D. Rubin}, title = {Detecting code alteration by creating a temporary memory bottleneck}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {638--650}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033231}, doi = {10.1109/TIFS.2009.2033231}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GardnerGR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GardnerGR09, author = {Ryan W. Gardner and Sujata Garera and Aviel D. Rubin}, editor = {Roger Dingledine and Philippe Golle}, title = {Coercion Resistant End-to-end Voting}, booktitle = {Financial Cryptography and Data Security, 13th International Conference, {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5628}, pages = {344--361}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03549-4\_21}, doi = {10.1007/978-3-642-03549-4\_21}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/GardnerGR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RubinJ08, author = {Aviel D. Rubin and David R. Jefferson}, title = {New Research Results for Electronic Voting}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {3}, pages = {12--13}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.68}, doi = {10.1109/MSP.2008.68}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RubinJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GareraR07, author = {Sujata Garera and Aviel D. Rubin}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {An independent audit framework for software dependent voting systems}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {256--265}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315278}, doi = {10.1145/1315245.1315278}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GareraR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GardnerGR07, author = {Ryan W. Gardner and Sujata Garera and Aviel D. Rubin}, editor = {Ray Martinez and David A. Wagner}, title = {On the Difficulty of Validating Voting Machine Software with Software}, booktitle = {2007 {USENIX/ACCURATE} Electronic Voting Technology Workshop, EVT'07, Boston, MA, USA, August 6, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/evt-07/difficulty-validating-voting-machine-software-software}, timestamp = {Mon, 01 Feb 2021 08:42:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/GardnerGR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BonoRSG06, author = {Stephen Bono and Aviel D. Rubin and Adam Stubblefield and Matthew Green}, title = {Security through legality}, journal = {Commun. {ACM}}, volume = {49}, number = {6}, pages = {41--43}, year = {2006}, url = {https://doi.org/10.1145/1132469.1132499}, doi = {10.1145/1132469.1132499}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BonoRSG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DoshiMR06, author = {Sujata Doshi and Fabian Monrose and Aviel D. Rubin}, editor = {Jianying Zhou and Moti Yung and Feng Bao}, title = {Efficient Memory Bound Puzzles Using Pattern Databases}, booktitle = {Applied Cryptography and Network Security, 4th International Conference, {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3989}, pages = {98--113}, year = {2006}, url = {https://doi.org/10.1007/11767480\_7}, doi = {10.1007/11767480\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/DoshiMR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/QiuMMR06, author = {Sophie Y. Qiu and Patrick D. McDaniel and Fabian Monrose and Aviel D. Rubin}, editor = {Paolo Bellavista and Chi{-}Ming Chen and Antonio Corradi and Mahmoud Daneshmand}, title = {Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing}, booktitle = {Proceedings of the 11th {IEEE} Symposium on Computers and Communications {(ISCC} 2006), 26-29 June 2006, Cagliari, Sardinia, Italy}, pages = {489--496}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ISCC.2006.48}, doi = {10.1109/ISCC.2006.48}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/QiuMMR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2006, editor = {Giovanni Di Crescenzo and Aviel D. Rubin}, title = {Financial Cryptography and Data Security, 10th International Conference, {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4107}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889663}, doi = {10.1007/11889663}, isbn = {3-540-46255-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/McDanielR05, author = {Patrick D. McDaniel and Aviel D. Rubin}, title = {Web security}, journal = {Comput. Networks}, volume = {48}, number = {5}, pages = {697--699}, year = {2005}, url = {https://doi.org/10.1016/j.comnet.2005.02.001}, doi = {10.1016/J.COMNET.2005.02.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/McDanielR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecr/StubblefieldRW05, author = {Adam Stubblefield and Aviel D. Rubin and Dan S. Wallach}, title = {Managing the Performance Impact of Web Security}, journal = {Electron. Commer. Res.}, volume = {5}, number = {1}, pages = {99--116}, year = {2005}, url = {https://doi.org/10.1023/B:ELEC.0000045975.59531.08}, doi = {10.1023/B:ELEC.0000045975.59531.08}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ecr/StubblefieldRW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fast/PetersonBHSR05, author = {Zachary N. J. Peterson and Randal C. Burns and Joseph Herring and Adam Stubblefield and Aviel D. Rubin}, editor = {Garth Gibson}, title = {Secure Deletion for a Versioning File System}, booktitle = {Proceedings of the {FAST} '05 Conference on File and Storage Technologies, December 13-16, 2005, San Francisco, California, {USA}}, publisher = {{USENIX}}, year = {2005}, url = {http://www.usenix.org/events/fast05/tech/peterson.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fast/PetersonBHSR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Bono0SJRS05, author = {Steve Bono and Matthew Green and Adam Stubblefield and Ari Juels and Aviel D. Rubin and Michael Szydlo}, editor = {Patrick D. McDaniel}, title = {Security Analysis of a Cryptographically-Enabled {RFID} Device}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/security-analysis-cryptographically-enabled-rfid-device}, timestamp = {Mon, 01 Feb 2021 08:42:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/Bono0SJRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/JeffersonRSW04, author = {David R. Jefferson and Aviel D. Rubin and Barbara Simons and David A. Wagner}, title = {Analyzing internet voting security}, journal = {Commun. {ACM}}, volume = {47}, number = {10}, pages = {59--64}, year = {2004}, url = {https://doi.org/10.1145/1022594.1022624}, doi = {10.1145/1022594.1022624}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/JeffersonRSW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/VoraABCDJJLRSY04, author = {Poorvi L. Vora and Ben Adida and Ren Bucholz and David Chaum and David L. Dill and David R. Jefferson and Douglas W. Jones and William Lattin and Aviel D. Rubin and Michael Ian Shamos and Moti Yung}, title = {Evaluation of voting systems}, journal = {Commun. {ACM}}, volume = {47}, number = {11}, pages = {144}, year = {2004}, url = {https://doi.org/10.1145/1029496.1029520}, doi = {10.1145/1029496.1029520}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/VoraABCDJJLRSY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ShimGRG04, author = {Simon S. Y. Shim and Li Gong and Aviel D. Rubin and Linley Gwennap}, title = {Guest Editors' Introduction: Securing the High-Speed Internet}, journal = {Computer}, volume = {37}, number = {6}, pages = {33--35}, year = {2004}, url = {https://doi.org/10.1109/MC.2004.25}, doi = {10.1109/MC.2004.25}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ShimGRG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DillR04, author = {David L. Dill and Aviel D. Rubin}, title = {Guest Editors' Introduction: E-Voting Security}, journal = {{IEEE} Secur. Priv.}, volume = {2}, number = {1}, pages = {22--23}, year = {2004}, url = {https://doi.org/10.1109/MSECP.2004.1264849}, doi = {10.1109/MSECP.2004.1264849}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/DillR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/StubblefieldIR04, author = {Adam Stubblefield and John Ioannidis and Aviel D. Rubin}, title = {A key recovery attack on the 802.11b wired equivalent privacy protocol {(WEP)}}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {2}, pages = {319--332}, year = {2004}, url = {https://doi.org/10.1145/996943.996948}, doi = {10.1145/996943.996948}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/StubblefieldIR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/ByersRK04, author = {Simon D. Byers and Aviel D. Rubin and David P. Kormann}, title = {Defending against an Internet-based attack on the physical world}, journal = {{ACM} Trans. Internet Techn.}, volume = {4}, number = {3}, pages = {239--254}, year = {2004}, url = {https://doi.org/10.1145/1013202.1013203}, doi = {10.1145/1013202.1013203}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/ByersRK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KohnoSRW04, author = {Tadayoshi Kohno and Adam Stubblefield and Aviel D. Rubin and Dan S. Wallach}, title = {Analysis of an Electronic Voting System}, booktitle = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12 May 2004, Berkeley, CA, {USA}}, pages = {27}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SECPRI.2004.1301313}, doi = {10.1109/SECPRI.2004.1301313}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/KohnoSRW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Rubin03, author = {Aviel D. Rubin}, title = {Introduction}, journal = {Commun. {ACM}}, volume = {46}, number = {5}, pages = {28--30}, year = {2003}, url = {https://doi.org/10.1145/769800.769821}, doi = {10.1145/769800.769821}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Rubin03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GoodellAGIMR03, author = {Geoffrey Goodell and William Aiello and Timothy Griffin and John Ioannidis and Patrick D. McDaniel and Aviel D. Rubin}, title = {Working around {BGP:} An Incremental Approach to Improving Security and Accuracy in Interdomain Routing}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2003, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2003}, url = {https://www.ndss-symposium.org/ndss2003/working-around-bgp-incremental-approach-improving-security-and-accuracy-interdomain-routing/}, timestamp = {Mon, 01 Feb 2021 08:42:24 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GoodellAGIMR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BlazeIKMR03, author = {Matt Blaze and John Ioannidis and Angelos D. Keromytis and Tal Malkin and Aviel D. Rubin}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {{WAR:} Wireless Anonymous Routing}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {218--232}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_27}, doi = {10.1007/11542322\_27}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BlazeIKMR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Rubin02, author = {Aviel D. Rubin}, title = {Security considerations for remote electronic voting}, journal = {Commun. {ACM}}, volume = {45}, number = {12}, pages = {39--44}, year = {2002}, url = {https://doi.org/10.1145/585597.585599}, doi = {10.1145/585597.585599}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Rubin02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/IvancicWRRS02, author = {Will Ivancic and David A. Wagner and Aviel D. Rubin and E. Paul Ratazzi and James P. G. Sterbenz}, title = {Securing Wireless and Mobile Networks - Is It Possible?}, booktitle = {Proceedings {IEEE} {INFOCOM} 2002, The 21st Annual Joint Conference of the {IEEE} Computer and Communications Societies, New York, USA, June 23-27, 2002}, publisher = {{IEEE} Computer Society}, year = {2002}, timestamp = {Thu, 05 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/IvancicWRRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/StubblefieldIR02, author = {Adam Stubblefield and John Ioannidis and Aviel D. Rubin}, title = {Using the Fluhrer, Mantin, and Shamir Attack to Break {WEP}}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2002, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2002}, url = {https://www.ndss-symposium.org/ndss2002/using-fluhrer-mantin-and-shamir-attack-break-wep/}, timestamp = {Mon, 01 Feb 2021 08:42:25 +0100}, biburl = {https://dblp.org/rec/conf/ndss/StubblefieldIR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/ByersRK02, author = {Simon D. Byers and Aviel D. Rubin and David P. Kormann}, editor = {Sushil Jajodia and Pierangela Samarati}, title = {Defending against an Internet-based attack on the physical world}, booktitle = {Proceedings of the 2002 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2002, Washington, DC, USA, November 21, 2002}, pages = {11--18}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/644527.644529}, doi = {10.1145/644527.644529}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/ByersRK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/WaldmanRC01, author = {Marc Waldman and Aviel D. Rubin and Lorrie Faith Cranor}, title = {The architecture of robust publishing systems}, journal = {{ACM} Trans. Internet Techn.}, volume = {1}, number = {2}, pages = {199--230}, year = {2001}, url = {https://doi.org/10.1145/502152.502154}, doi = {10.1145/502152.502154}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/WaldmanRC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RubinW01, author = {Aviel D. Rubin and Rebecca N. Wright}, editor = {Paul F. Syverson}, title = {Off-Line Generation of Limited-Use Credit Card Numbers}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {187--200}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-46088-8\_18}, doi = {10.1007/3-540-46088-8\_18}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/RubinW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GerckNRRY01, author = {Ed Gerck and C. Andrew Neff and Ronald L. Rivest and Aviel D. Rubin and Moti Yung}, editor = {Paul F. Syverson}, title = {The Business of Electronic Voting}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {234--259}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-46088-8\_21}, doi = {10.1007/3-540-46088-8\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/GerckNRRY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/Rubin01, author = {Aviel D. Rubin}, editor = {Mark Burgess}, title = {Security for E-Voting in Public Elections}, booktitle = {Proceedings of the 15th Conference on Systems Administration {(LISA} 2001), San Diego, California, USA, December 2-7, 2001}, publisher = {{USENIX}}, year = {2001}, timestamp = {Wed, 04 Jul 2018 13:06:35 +0200}, biburl = {https://dblp.org/rec/conf/lisa/Rubin01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0108017, author = {Aviel D. Rubin}, title = {Security Considerations for Remote Electronic Voting over the Internet}, journal = {CoRR}, volume = {cs.CR/0108017}, year = {2001}, url = {https://arxiv.org/abs/cs/0108017}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0108017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KormannR00, author = {David P. Kormann and Aviel D. Rubin}, title = {Risks of the Passport single signon protocol}, journal = {Comput. Networks}, volume = {33}, number = {1-6}, pages = {51--58}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00048-7}, doi = {10.1016/S1389-1286(00)00048-7}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KormannR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/MonroseR00, author = {Fabian Monrose and Aviel D. Rubin}, title = {Keystroke dynamics as a biometric for authentication}, journal = {Future Gener. Comput. Syst.}, volume = {16}, number = {4}, pages = {351--359}, year = {2000}, url = {https://doi.org/10.1016/S0167-739X(99)00059-X}, doi = {10.1016/S0167-739X(99)00059-X}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/MonroseR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/McDanielR00, author = {Patrick D. McDaniel and Aviel D. Rubin}, editor = {Yair Frankel}, title = {A Response to ''Can We Eliminate Certificate Revocation Lists?''}, booktitle = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1962}, pages = {245--258}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45472-1\_17}, doi = {10.1007/3-540-45472-1\_17}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/McDanielR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WaldmanRC00, author = {Marc Waldman and Aviel D. Rubin and Lorrie Faith Cranor}, editor = {Steven M. Bellovin and Greg Rose}, title = {Publius: {A} Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System}, booktitle = {9th {USENIX} Security Symposium, Denver, Colorado, USA, August 14-17, 2000}, publisher = {{USENIX} Association}, year = {2000}, url = {https://www.usenix.org/conference/9th-usenix-security-symposium/publius-robust-tamper-evident-censorship-resistant-and}, timestamp = {Mon, 01 Feb 2021 08:43:02 +0100}, biburl = {https://dblp.org/rec/conf/uss/WaldmanRC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/ReiterR99, author = {Michael K. Reiter and Aviel D. Rubin}, title = {Anonymous Web Transactions with Crowds}, journal = {Commun. {ACM}}, volume = {42}, number = {2}, pages = {32--38}, year = {1999}, url = {https://doi.org/10.1145/293411.293778}, doi = {10.1145/293411.293778}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/ReiterR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/GilmoreKR99, author = {Christian Gilmore and David P. Kormann and Aviel D. Rubin}, title = {Secure remote access to an Internet Web server}, journal = {{IEEE} Netw.}, volume = {13}, number = {6}, pages = {31--37}, year = {1999}, url = {https://doi.org/10.1109/65.806985}, doi = {10.1109/65.806985}, timestamp = {Thu, 01 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/GilmoreKR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AielloRS99, author = {William Aiello and Aviel D. Rubin and Martin Strauss}, editor = {Juzar Motiwalla and Gene Tsudik}, title = {Using Smartcards to Secure a Personalized Gambling Device}, booktitle = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and Communications Security, Singapore, November 1-4, 1999}, pages = {128--137}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/319709.319727}, doi = {10.1145/319709.319727}, timestamp = {Tue, 10 Nov 2020 20:00:25 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AielloRS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GilmoreKR99, author = {Christian Gilmore and David P. Kormann and Aviel D. Rubin}, title = {Secure Remote Access to an Internal Web Server}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 1999, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {1999}, url = {https://www.ndss-symposium.org/ndss1999/secure-remote-access-internal-web-server/}, timestamp = {Mon, 01 Feb 2021 08:42:19 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GilmoreKR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MonroseWR99, author = {Fabian Monrose and Peter Wyckoff and Aviel D. Rubin}, title = {Distributed Execution with Remote Audit}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 1999, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {1999}, url = {https://www.ndss-symposium.org/ndss1999/distributed-execution-remote-audit/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/MonroseWR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JermynMMRR99, author = {Ian Jermyn and Alain J. Mayer and Fabian Monrose and Michael K. Reiter and Aviel D. Rubin}, editor = {G. Winfield Treese}, title = {The Design and Analysis of Graphical Passwords}, booktitle = {Proceedings of the 8th {USENIX} Security Symposium, Washington, DC, USA, August 23-26, 1999}, publisher = {{USENIX} Association}, year = {1999}, url = {https://www.usenix.org/conference/8th-usenix-security-symposium/design-and-analysis-graphical-passwords}, timestamp = {Mon, 01 Feb 2021 08:43:06 +0100}, biburl = {https://dblp.org/rec/conf/uss/JermynMMRR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RubinG98, author = {Aviel D. Rubin and Daniel E. Geer Jr.}, title = {A Survey of Web Security}, journal = {Computer}, volume = {31}, number = {9}, pages = {34--41}, year = {1998}, url = {https://doi.org/10.1109/2.708448}, doi = {10.1109/2.708448}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RubinG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/RubinG98, author = {Aviel D. Rubin and Daniel E. Geer Jr.}, title = {Mobile Code Security}, journal = {{IEEE} Internet Comput.}, volume = {2}, number = {6}, pages = {30--34}, year = {1998}, url = {https://doi.org/10.1109/4236.735984}, doi = {10.1109/4236.735984}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/RubinG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ReiterR98, author = {Michael K. Reiter and Aviel D. Rubin}, title = {Crowds: Anonymity for Web Transactions}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {1}, number = {1}, pages = {66--92}, year = {1998}, url = {https://doi.org/10.1145/290163.290168}, doi = {10.1145/290163.290168}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ReiterR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MalkhiRR98, author = {Dahlia Malkhi and Michael K. Reiter and Aviel D. Rubin}, title = {Secure Execution of Java Applets using a Remote Playground}, booktitle = {Security and Privacy - 1998 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, May 3-6, 1998, Proceedings}, pages = {40--51}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/SECPRI.1998.674822}, doi = {10.1109/SECPRI.1998.674822}, timestamp = {Thu, 21 Sep 2023 15:57:37 +0200}, biburl = {https://dblp.org/rec/conf/sp/MalkhiRR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/1998, editor = {Aviel D. Rubin}, title = {Proceedings of the 7th {USENIX} Security Symposium, San Antonio, TX, USA, January 26-29, 1998}, publisher = {{USENIX} Association}, year = {1998}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin97, author = {Aviel D. Rubin}, title = {An Experience Teaching a Graduate Course in Cryptography}, journal = {Cryptologia}, volume = {21}, number = {2}, pages = {97--109}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885832}, doi = {10.1080/0161-119791885832}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/Rubin97, author = {Aviel D. Rubin}, title = {Extending {NCP} for Protocols Using Public Keys}, journal = {Mob. Networks Appl.}, volume = {2}, number = {3}, pages = {227--241}, year = {1997}, url = {https://doi.org/10.1023/A:1013636817876}, doi = {10.1023/A:1013636817876}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/Rubin97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/RubinBF97, author = {Aviel D. Rubin and Dan Boneh and Kevin Fu}, editor = {Vijay Varadharajan and Josef Pieprzyk and Yi Mu}, title = {Revocation of Unread E-mail in an Untrusted Network}, booktitle = {Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1270}, pages = {62--75}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0027944}, doi = {10.1007/BFB0027944}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/RubinBF97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MonroseR97, author = {Fabian Monrose and Aviel D. Rubin}, editor = {Richard Graveman and Philippe A. Janson and Clifford Neuman and Li Gong}, title = {Authentication via Keystroke Dynamics}, booktitle = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and Communications Security, Zurich, Switzerland, April 1-4, 1997}, pages = {48--56}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/266420.266434}, doi = {10.1145/266420.266434}, timestamp = {Tue, 10 Nov 2020 20:00:22 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MonroseR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MartinRR97, author = {David M. Martin Jr. and Sivaramakrishnan Rajagopalan and Aviel D. Rubin}, title = {Blocking Java Applets at the Firewall}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 1997, San Diego, California, {USA}}, pages = {16--26}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/NDSS.1997.579215}, doi = {10.1109/NDSS.1997.579215}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/MartinRR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/Rubin96, author = {Aviel D. Rubin}, title = {Independent One-Time Passwords}, journal = {Comput. Syst.}, volume = {9}, number = {1}, pages = {15--27}, year = {1996}, url = {http://www.usenix.org/publications/compsystems/1996/win\_rubin.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/Rubin96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/Rubin96a, author = {Aviel D. Rubin}, title = {Response: Independent One-Time Passwords}, journal = {Comput. Syst.}, volume = {9}, number = {3}, pages = {257}, year = {1996}, url = {http://www.usenix.org/publications/compsystems/1996/sum\_rubin.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/Rubin96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ShoupR96, author = {Victor Shoup and Aviel D. Rubin}, editor = {Ueli M. Maurer}, title = {Session Key Distribution Using Smart Cards}, booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1070}, pages = {321--331}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68339-9\_28}, doi = {10.1007/3-540-68339-9\_28}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ShoupR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/JaegerR96, author = {Trent Jaeger and Aviel D. Rubin}, editor = {James T. Ellis and B. Clifford Neuman and David M. Balenson}, title = {Preserving Integrity in Remote File Location and Retrieval}, booktitle = {1996 Symposium on Network and Distributed System Security, {(S)NDSS} '96, San Diego, CA, USA, February 22-23, 1996}, pages = {53--63}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/NDSS.1996.492413}, doi = {10.1109/NDSS.1996.492413}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/JaegerR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Rubin95, author = {Aviel D. Rubin}, title = {Secure Distribution of Electronic Documents in a Hostile Environment}, journal = {Comput. Commun.}, volume = {18}, number = {6}, pages = {429--434}, year = {1995}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Rubin95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/Rubin95, author = {Aviel D. Rubin}, title = {Extending {NCP} for protocols using public keys}, booktitle = {Proceedings of the 4th International Conference on Computer Communications and Networks {(ICCCN} '95), September 20-23, 1995, Las Vegas, Nevada, {USA}}, pages = {94}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/ICCCN.1995.540107}, doi = {10.1109/ICCCN.1995.540107}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccn/Rubin95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Rubin95, author = {Aviel D. Rubin}, editor = {James T. Ellis and David M. Balenson and Robert W. Shirey}, title = {Trusted distribution of software over the Internet}, booktitle = {1995 Symposium on Network and Distributed System Security, {(S)NDSS} '95, San Diego, California, USA, February 16-17, 1995}, pages = {47--53}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/NDSS.1995.390646}, doi = {10.1109/NDSS.1995.390646}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Rubin95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Rubin95, author = {Aviel D. Rubin}, editor = {Frederick M. Avolio and Steven M. Bellovin}, title = {Independent One-Time Passwords}, booktitle = {Proceedings of the 5th {USENIX} Security Symposium, Salt Lake City, Utah, USA, June 5-7, 1995}, publisher = {{USENIX} Association}, year = {1995}, url = {https://www.usenix.org/legacy/publications/library/proceedings/security95/rubin.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Rubin95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc1805, author = {Aviel D. Rubin}, title = {Location-Independent Data/Software Integrity Protocol}, journal = {{RFC}}, volume = {1805}, pages = {1--6}, year = {1995}, url = {https://doi.org/10.17487/RFC1805}, doi = {10.17487/RFC1805}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc1805.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Rubin94, author = {Aviel D. Rubin}, title = {Nonmonotonic cryptographic protocols}, school = {University of Michigan, {USA}}, year = {1994}, url = {https://hdl.handle.net/2027.42/104026}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Rubin94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/RubinH94, author = {Aviel D. Rubin and Peter Honeyman}, title = {Nonmonotonic Cryptographic Protocols}, booktitle = {Seventh {IEEE} Computer Security Foundations Workshop - CSFW'94, Franconia, New Hampshire, USA, June 14-16, 1994, Proceedings}, pages = {100--116}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/CSFW.1994.315943}, doi = {10.1109/CSFW.1994.315943}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/RubinH94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RubinH93, author = {Aviel D. Rubin and Peter Honeyman}, title = {Long Running Jobs in an Authenticated Environment}, booktitle = {Proceedings of the 4th {USENIX} Security Symposium, Santa Clara, CA, USA, October 4-6, 1993}, publisher = {{USENIX} Association}, year = {1993}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/uss/RubinH93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/RubinB77, author = {Aviel D. Rubin and Bertram C. Bruce}, editor = {Raj Reddy}, title = {From Conversations to Stories: An Analysis of Differences Between Oral and Written Language Comprehension}, booktitle = {Proceedings of the 5th International Joint Conference on Artificial Intelligence. Cambridge, MA, USA, August 22-25, 1977}, pages = {141}, publisher = {William Kaufmann}, year = {1977}, url = {http://ijcai.org/Proceedings/77-1/Papers/023C.pdf}, timestamp = {Tue, 20 Aug 2019 16:18:08 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/RubinB77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.