Adam Stubblefield

According to our database1, Adam Stubblefield authored at least 14 papers between 2001 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
What Affects Citation Counts in MIS Research Articles? An Empirical Investigation.
Commun. Assoc. Inf. Syst., 2014

2008
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads.
Proceedings of the 17th USENIX Security Symposium, 2008

2006
Technology Evaluation: The Security Implications of VeriChip Cloning.
J. Am. Medical Informatics Assoc., 2006

Security through legality.
Commun. ACM, 2006

A natural language approach to automated cryptanalysis of two-time pads.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Managing the Performance Impact of Web Security.
Electron. Commer. Res., 2005

Security Analysis of a Cryptographically-Enabled RFID Device.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Secure Deletion for a Versioning File System.
Proceedings of the FAST '05 Conference on File and Storage Technologies, 2005

2004
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP).
ACM Trans. Inf. Syst. Secur., 2004

Analysis of an Electronic Voting System.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

2002
An algebraic approach to IP traceback.
ACM Trans. Inf. Syst. Secur., 2002

Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
Proceedings of the Network and Distributed System Security Symposium, 2002

2001
Using Client Puzzles to Protect TLS.
Proceedings of the 10th USENIX Security Symposium, 2001

Reading Between the Lines: Lessons from the SDMI Challenge.
Proceedings of the 10th USENIX Security Symposium, 2001


  Loading...