dblp.uni-trier.dewww.uni-trier.de

Tadayoshi Kohno Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
41EEKatherine Everitt, Tanya Bragin, James Fogarty, Tadayoshi Kohno: A comprehensive study of frequency, interference, and training of multiple graphical passwords. CHI 2009: 889-898
40EEBarath Raghavan, Tadayoshi Kohno, Alex C. Snoeren, David Wetherall: Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default. Privacy Enhancing Technologies 2009: 143-163
39EETamara Denning, Cynthia Matuszek, Karl Koscher, Joshua R. Smith, Tadayoshi Kohno: A spotlight on security and privacy risks with future household robots: attacks and lessons. UbiComp 2009: 105-114
2008
38 David L. Dill, Tadayoshi Kohno: 2008 USENIX/ACCURATE Electronic Voting Workshop, July 28-29, 2008, San Jose, CA, USA, Proceedings USENIX Association 2008
37EEJaeyeon Jung, Anmol Sheth, Ben Greenstein, David Wetherall, Gabriel Maganis, Tadayoshi Kohno: Privacy oracle: a system for finding application leaks with black box differential testing. ACM Conference on Computer and Communications Security 2008: 279-288
36EEAlexei Czeskis, Karl Koscher, Joshua R. Smith, Tadayoshi Kohno: RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. ACM Conference on Computer and Communications Security 2008: 479-490
35EETamara Denning, Kevin Fu, Tadayoshi Kohno: Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security. HotSec 2008
34EEMichael Piatek, Tadayoshi Kohno, Arvind Krishnamurthy: Challenges and Directions for Monitoring P2P File Sharing Networks - or - Why My Printer Received a DMCA Takedown Notice. HotSec 2008
33EEAlexei Czeskis, David J. St. Hilaire, Karl Koscher, Steven D. Gribble, Tadayoshi Kohno, Bruce Schneier: Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications. HotSec 2008
32EEDaniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, William H. Maisel: Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. IEEE Symposium on Security and Privacy 2008: 129-142
31EEBen Greenstein, Damon McCoy, Jeffrey Pang, Tadayoshi Kohno, Srinivasan Seshan, David Wetherall: Improving wireless privacy with an identifier-free link layer protocol. MobiSys 2008: 40-53
30EECharles Reis, Steven D. Gribble, Tadayoshi Kohno, Nicholas C. Weaver: Detecting In-Flight Page Changes with Web Tripwires. NSDI 2008: 31-44
29EEDamon McCoy, Kevin S. Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas C. Sicker: Shining Light in Dark Places: Understanding the Tor Network. Privacy Enhancing Technologies 2008: 63-76
28EEThomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy, Tadayoshi Kohno: Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs. USENIX Security Symposium 2008: 275-290
27EETadayoshi Kohno: An Interview with RFID Security Expert Ari Juels. IEEE Pervasive Computing 7(1): 10-11 (2008)
26EEDaniel Halperin, Thomas S. Heydt-Benjamin, Kevin Fu, Tadayoshi Kohno, William H. Maisel: Security and Privacy for Implantable Medical Devices. IEEE Pervasive Computing 7(1): 30-39 (2008)
25EEMichel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. J. Cryptology 21(3): 350-391 (2008)
2007
24EEKevin S. Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, Douglas C. Sicker: Low-resource routing attacks against tor. WPES 2007: 11-20
23EETravis Kriplean, Evan Welbourne, Nodira Khoussainova, Vibhor Rastogi, Magdalena Balazinska, Gaetano Borriello, Tadayoshi Kohno, Dan Suciu: Physical Access Control for Captured RFID Data. IEEE Pervasive Computing 6(4): 48-55 (2007)
2006
22EEMihir Bellare, Tadayoshi Kohno, Victor Shoup: Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. ACM Conference on Computer and Communications Security 2006: 380-389
21EEJohn Kelsey, Tadayoshi Kohno: Herding Hash Functions and the Nostradamus Attack. EUROCRYPT 2006: 183-200
20EEDavid Molnar, Tadayoshi Kohno, Naveen Sastry, David Wagner: Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 365-370
2005
19EEMichel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. CRYPTO 2005: 205-222
18EETadayoshi Kohno, Andre Broido, Kimberly C. Claffy: Remote Physical Device Fingerprinting. IEEE Symposium on Security and Privacy 2005: 211-225
17EETadayoshi Kohno, Andre Broido, Kimberly C. Claffy: Remote Physical Device Fingerprintin. IEEE Trans. Dependable Sec. Comput. 2(2): 93-108 (2005)
2004
16EETadayoshi Kohno: Attacking and repairing the winZip encryption scheme. ACM Conference on Computer and Communications Security 2004: 72-81
15EEMihir Bellare, Tadayoshi Kohno: Hash Function Balance and Its Impact on Birthday Attacks. EUROCRYPT 2004: 401-418
14EETadayoshi Kohno, John Viega, Doug Whiting: CWC: A High-Performance Conventional Authenticated Encryption Mode. FSE 2004: 408-426
13EETetsu Iwata, Tadayoshi Kohno: New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. FSE 2004: 427-445
12EETadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach: Analysis of an Electronic Voting System. IEEE Symposium on Security and Privacy 2004: 27-
11EEMihir Bellare, Tadayoshi Kohno, Chanathip Namprempre: Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. ACM Trans. Inf. Syst. Secur. 7(2): 206-241 (2004)
2003
10EEMihir Bellare, Tadayoshi Kohno: A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications. EUROCRYPT 2003: 491-506
9EELars R. Knudsen, Tadayoshi Kohno: Analysis of RMAC. FSE 2003: 182-191
8EENiels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno: Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. FSE 2003: 330-346
2002
7EEMihir Bellare, Tadayoshi Kohno, Chanathip Namprempre: Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. ACM Conference on Computer and Communications Security 2002: 1-11
6EEJohn Viega, J. T. Bloch, Tadayoshi Kohno, Gary McGraw: Token-based scanning of source code for security problems. ACM Trans. Inf. Syst. Secur. 5(3): 238-261 (2002)
2001
5EETadayoshi Kohno, Mark McGovern: On the Global Content PMI: Improved Copy-Protected Internet Content Distribution. Financial Cryptography 2001: 70-81
4 Harold N. Gabow, Tadayoshi Kohno: A Network-Flow-Based Scheduler: Design, Performance History, and Experimental Analysis. ACM Journal of Experimental Algorithmics 6: 3 (2001)
3EEJohn Viega, Tadayoshi Kohno, Bruce Potter: Trust (and mistrust) in secure applications. Commun. ACM 44(2): 31-36 (2001)
2000
2 Tadayoshi Kohno, John Kelsey, Bruce Schneier: Preliminary Cryptanalysis of Reduced-Round Serpent. AES Candidate Conference 2000: 195-211
1EEJohn Kelsey, Tadayoshi Kohno, Bruce Schneier: Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. FSE 2000: 75-93

Coauthor Index

1Michel Abdalla [19] [25]
2Magdalena Balazinska [23]
3Kevin S. Bauer [24] [29]
4Mihir Bellare [7] [10] [11] [15] [19] [22] [25]
5J. T. Bloch [6]
6Gaetano Borriello [23]
7Tanya Bragin [41]
8Andre Broido [17] [18]
9Dario Catalano [19] [25]
10Kimberly C. Claffy (kc claffy) [17] [18]
11Shane S. Clark [32]
12Alexei Czeskis [33] [36]
13Benessa Defend [32]
14Tamara Denning [35] [39]
15David L. Dill [38]
16Katherine Everitt [41]
17Niels Ferguson [8]
18James Fogarty [41]
19Kevin Fu [26] [32] [35]
20Harold N. Gabow [4]
21Ben Greenstein (Benjamin Greenstein) [31] [37]
22Steven D. Gribble [30] [33]
23Dirk Grunwald [24] [29]
24Daniel Halperin [26] [32]
25Thomas S. Heydt-Benjamin [26] [32]
26David J. St. Hilaire [33]
27Tetsu Iwata [13]
28Jaeyeon Jung [37]
29John Kelsey [1] [2] [8] [21]
30Nodira Khoussainova [23]
31Eike Kiltz [19] [25]
32Lars R. Knudsen [9]
33Karl Koscher [33] [36] [39]
34Travis Kriplean [23]
35Arvind Krishnamurthy [28] [34]
36Tanja Lange [19] [25]
37Stefan Lucks [8]
38Gabriel Maganis [28] [37]
39William H. Maisel [26] [32]
40John Malone-Lee [19] [25]
41Cynthia Matuszek [39]
42Damon McCoy [24] [29] [31]
43Mark McGovern [5]
44Gary McGraw [6]
45David Molnar [20]
46Will Morgan [32]
47Chanathip Namprempre [7] [11]
48Gregory Neven [19] [25]
49Pascal Paillier [19] [25]
50Jeffrey Pang [31]
51Michael Piatek [34]
52Bruce Potter [3]
53Barath Raghavan [40]
54Benjamin Ransford [32]
55Vibhor Rastogi [23]
56Charles Reis [30]
57Thomas Ristenpart [28]
58Aviel D. Rubin [12]
59Naveen Sastry [20]
60Bruce Schneier [1] [2] [8] [33]
61Srinivasan Seshan [31]
62Anmol Sheth [37]
63Haixia Shi [19] [25]
64Victor Shoup [22]
65Douglas C. Sicker [24] [29]
66Joshua R. Smith [36] [39]
67Alex C. Snoeren [40]
68Adam Stubblefield [12]
69Dan Suciu [23]
70John Viega [3] [6] [14]
71David Wagner [20]
72Dan S. Wallach [12]
73Nicholas C. Weaver [30]
74Evan Welbourne [23]
75David Wetherall [31] [37] [40]
76Doug Whiting [8] [14]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)