dblp.uni-trier.dewww.uni-trier.de

Aviel D. Rubin Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
51EERyan W. Gardner, Sujata Garera, Aviel D. Rubin: Coercion Resistant End-to-end Voting. Financial Cryptography 2009: 344-361
2008
50EEAviel D. Rubin, David R. Jefferson: New Research Results for Electronic Voting. IEEE Security & Privacy 6(3): 12-13 (2008)
2007
49EESujata Garera, Aviel D. Rubin: An independent audit framework for software dependent voting systems. ACM Conference on Computer and Communications Security 2007: 256-265
2006
48 Giovanni Di Crescenzo, Aviel D. Rubin: Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers Springer 2006
47EESujata Doshi, Fabian Monrose, Aviel D. Rubin: Efficient Memory Bound Puzzles Using Pattern Databases. ACNS 2006: 98-113
46EESophie Y. Qiu, Patrick Drew McDaniel, Fabian Monrose, Aviel D. Rubin: Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing. ISCC 2006: 489-496
45EEStephen Bono, Aviel D. Rubin, Adam Stubblefield, Matthew Green: Security through legality. Commun. ACM 49(6): 41-43 (2006)
2005
44EEZachary N. J. Peterson, Randal C. Burns, Joseph Herring, Adam Stubblefield, Aviel D. Rubin: Secure Deletion for a Versioning File System. FAST 2005
43EEPatrick Drew McDaniel, Aviel D. Rubin: Web security. Computer Networks 48(5): 697-699 (2005)
42EEAdam Stubblefield, Aviel D. Rubin, Dan S. Wallach: Managing the Performance Impact of Web Security. Electronic Commerce Research 5(1): 99-116 (2005)
2004
41EETadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach: Analysis of an Electronic Voting System. IEEE Symposium on Security and Privacy 2004: 27-
40EEAdam Stubblefield, John Ioannidis, Aviel D. Rubin: A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). ACM Trans. Inf. Syst. Secur. 7(2): 319-332 (2004)
39EESimon Byers, Aviel D. Rubin, David P. Kormann: Defending against an Internet-based attack on the physical world. ACM Trans. Internet Techn. 4(3): 239-254 (2004)
38EEDavid R. Jefferson, Aviel D. Rubin, Barbara Simons, David Wagner: Analyzing internet voting security. Commun. ACM 47(10): 59-64 (2004)
37EEPoorvi L. Vora, Ben Adida, Ren Bucholz, David Chaum, David L. Dill, David R. Jefferson, Douglas W. Jones, William Lattin, Aviel D. Rubin, Michael I. Shamos, Moti Yung: Evaluation of voting systems. Commun. ACM 47(11): 144 (2004)
36EESimon S. Y. Shim, Li Gong, Aviel D. Rubin, Linley Gwennap: Guest Editors' Introduction: Securing the High-Speed Internet. IEEE Computer 37(6): 33-35 (2004)
35EEDavid L. Dill, Aviel D. Rubin: Guest Editors' Introduction: E-Voting Security. IEEE Security & Privacy 2(1): 22-23 (2004)
2003
34EEGeoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick Drew McDaniel, Aviel D. Rubin: Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. NDSS 2003
33EEMatt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin: WAR: Wireless Anonymous Routing. Security Protocols Workshop 2003: 218-232
32EEAviel D. Rubin: Introduction. Commun. ACM 46(5): 28-30 (2003)
2002
31 Will Ivancic, David Wagner, Aviel D. Rubin, Paul Ratazzi, James P. G. Sterbenz: Securing Wireless and Mobile Networks - Is It Possible? INFOCOM 2002
30EEAdam Stubblefield, John Ioannidis, Aviel D. Rubin: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. NDSS 2002
29EESimon Byers, Aviel D. Rubin, David P. Kormann: Defending against an Internet-based attack on the physical world. WPES 2002: 11-18
28EEAviel D. Rubin: Security considerations for remote electronic voting. Commun. ACM 45(12): 39-44 (2002)
2001
27EEAviel D. Rubin, Rebecca N. Wright: Off-Line Generation of Limited-Use Credit Card Numbers. Financial Cryptography 2001: 187-200
26EEEd Gerck, C. Andrew Neff, Ronald L. Rivest, Aviel D. Rubin, Moti Yung: The Business of Electronic Voting. Financial Cryptography 2001: 234-259
25 Aviel D. Rubin: Security for E-Voting in Public Elections. LISA 2001
24EEMarc Waldman, Aviel D. Rubin, Lorrie Faith Cranor: The architecture of robust publishing systems. ACM Trans. Internet Techn. 1(2): 199-230 (2001)
23EEAviel D. Rubin: Security Considerations for Remote Electronic Voting over the Internet CoRR cs.CR/0108017: (2001)
2000
22EEPatrick Drew McDaniel, Aviel D. Rubin: A Response to ''Can We Eliminate Certificate Revocation Lists?''. Financial Cryptography 2000: 245-258
21EEDavid P. Kormann, Aviel D. Rubin: Risks of the Passport single signon protocol. Computer Networks 33(1-6): 51-58 (2000)
20EEFabian Monrose, Aviel D. Rubin: Keystroke dynamics as a biometric for authentication. Future Generation Comp. Syst. 16(4): 351-359 (2000)
1999
19EEWilliam Aiello, Aviel D. Rubin, Martin Strauss: Using Smartcards to Secure a Personalized Gambling Device. ACM Conference on Computer and Communications Security 1999: 128-137
18EEFabian Monrose, Peter Wyckoff, Aviel D. Rubin: Distributed Execution with Remote Audit. NDSS 1999
17EEChristian Gilmore, David P. Kormann, Aviel D. Rubin: Secure Remote Access to an Internal Web Server. NDSS 1999
16EEMichael K. Reiter, Aviel D. Rubin: Anonymous Web Transactions with Crowds. Commun. ACM 42(2): 32-38 (1999)
1998
15EEDahlia Malkhi, Michael K. Reiter, Aviel D. Rubin: Secure Execution of Java Applets using a Remote Playground. IEEE Symposium on Security and Privacy 1998: 40-51
14EEMichael K. Reiter, Aviel D. Rubin: Crowds: Anonymity for Web Transactions. ACM Trans. Inf. Syst. Secur. 1(1): 66-92 (1998)
13 Aviel D. Rubin, Daniel E. Geer Jr.: A Survey of Web Security. IEEE Computer 31(9): 34-41 (1998)
12 Aviel D. Rubin, Daniel E. Geer Jr.: Mobile Code Security. IEEE Internet Computing 2(6): 30-34 (1998)
1997
11 Aviel D. Rubin, Dan Boneh, Kevin Fu: Revocation of Unread E-mail in an Untrusted Network. ACISP 1997: 62-75
10EEFabian Monrose, Aviel D. Rubin: Authentication via Keystroke Dynamics. ACM Conference on Computer and Communications Security 1997: 48-56
9EEDavid M. Martin Jr., Sivaramakrishnan Rajagopalan, Aviel D. Rubin: Blocking Java Applets at the Firewall. NDSS 1997
8 Aviel D. Rubin: Extending NCP for Protocols Using Public Keys. MONET 2(3): 227-241 (1997)
1996
7EEVictor Shoup, Aviel D. Rubin: Session Key Distribution Using Smart Cards. EUROCRYPT 1996: 321-331
6 Aviel D. Rubin: Independent One-Time Passwords. Computing Systems 9(1): 15-27 (1996)
5 Aviel D. Rubin: Response: Independent One-Time Passwords. Computing Systems 9(3): 257 (1996)
1995
4EEAviel D. Rubin: Extending NCP for protocols using public keys. ICCCN 1995: 94
3 Aviel D. Rubin: Secure Distribution of Electronic Documents in a Hostile Environment. Computer Communications 18(6): 429-434 (1995)
1994
2 Aviel D. Rubin, Peter Honeyman: Nonmonotonic Cryptographic Protocols. CSFW 1994: 100-116
1977
1 Aviel D. Rubin, Bertram C. Bruce: From Conversations to Stories: An Analysis of Differences Between Oral and Written Language Comprehension. IJCAI 1977: 141

Coauthor Index

1Ben Adida [37]
2William Aiello [19] [34]
3Matt Blaze [33]
4Dan Boneh [11]
5Stephen Bono [45]
6Bertram C. Bruce [1]
7Ren Bucholz [37]
8Randal C. Burns [44]
9Simon Byers [29] [39]
10David Chaum [37]
11Lorrie Faith Cranor [24]
12Giovanni Di Crescenzo [48]
13David L. Dill [35] [37]
14Sujata Doshi [47]
15Kevin Fu [11]
16Ryan W. Gardner [51]
17Sujata Garera [49] [51]
18Daniel E. Geer Jr. [12] [13]
19Ed Gerck [26]
20Christian Gilmore [17]
21Li Gong [36]
22Geoffrey Goodell [34]
23Matthew Green [45]
24Timothy G. Griffin (Timothy Griffin) [34]
25Linley Gwennap [36]
26Joseph Herring [44]
27Peter Honeyman [2]
28John Ioannidis [30] [33] [34] [40]
29Will Ivancic [31]
30David R. Jefferson [37] [38] [50]
31Douglas W. Jones [37]
32Angelos D. Keromytis [33]
33Tadayoshi Kohno [41]
34David P. Kormann [17] [21] [29] [39]
35William Lattin [37]
36Dahlia Malkhi (Dalia Malki) [15]
37Tal Malkin [33]
38David M. Martin Jr. [9]
39Patrick Drew McDaniel (Patrick McDaniel) [22] [34] [43] [46]
40Fabian Monrose [10] [18] [20] [46] [47]
41C. Andrew Neff [26]
42Zachary N. J. Peterson [44]
43Sophie Y. Qiu [46]
44Sivaramakrishnan Rajagopalan [9]
45Paul Ratazzi [31]
46Michael K. Reiter [14] [15] [16]
47Ronald L. Rivest [26]
48Michael I. Shamos [37]
49Simon S. Y. Shim [36]
50Victor Shoup [7]
51Barbara B. Simons (Barbara Simons) [38]
52James P. G. Sterbenz [31]
53Martin Strauss (Martin J. Strauss) [19]
54Adam Stubblefield [30] [40] [41] [42] [44] [45]
55Poorvi L. Vora [37]
56David Wagner [31] [38]
57Marc Waldman [24]
58Dan S. Wallach [41] [42]
59Rebecca N. Wright [27]
60Peter Wyckoff [18]
61Moti Yung (Mordechai M. Yung) [26] [37]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)