Aviel D. Rubin

According to our database1, Aviel D. Rubin authored at least 96 papers between 1977 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SocIoTy: Practical Cryptography in Smart Home Contexts.
Proc. Priv. Enhancing Technol., January, 2024

2023
Explainable Autonomic Cybersecurity For Industrial Control Systems.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023

2022
Configuration and Collection Factors for Side-Channel Disassembly.
CoRR, 2022

Trusted Virtualization-Based Programmable Logic Controller Resilience Using a Backfit Approach.
Proceedings of the Critical Infrastructure Protection XVI, 2022

Measuring and Mitigating Bias in AI-Chatbots.
Proceedings of the IEEE International Conference on Assured Autonomy, 2022

2021
Meteor: Cryptographically Secure Steganography for Realistic Distributions.
IACR Cryptol. ePrint Arch., 2021

Wavelet Selection and Employment for Side-Channel Disassembly.
CoRR, 2021

A Containerization-Based Backfit Approach for Industrial Control System Resiliency.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Cost-Effective Mission Assurance Engineering Through Simulation.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2021

Triaging Autonomous Drone Faults By Simultaneously Assuring Autonomy and Security.
Proceedings of the 55th Annual Conference on Information Sciences and Systems, 2021

2020
Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

A Black Box Approach to Inferring, Characterizing, and Breaking Native Device Tracking Autonomy.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

Mission Assurance for Autonomous Undersea Vehicles.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the Edge.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

Bio-Inspired, Host-based Firewall.
Proceedings of the 23rd IEEE International Conference on Computational Science and Engineering, 2020

Connected Home Automated Security Monitor (CHASM): Protecting IoT Through Application of Machine Learning.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

Privacy Violating Opensource Intelligence Threat Evaluation Framework: A Security Assessment Framework For Critical Infrastructure Owners.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

2018
Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018

2017
Outsourcing Medical Dataset Analysis: A Possible Solution.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
MalloryWorker: Stealthy Computation and Covert Channels Using Web Workers.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Applications of Secure Location Sensing in Healthcare.
Proceedings of the 7th ACM International Conference on Bioinformatics, 2016

2015
Security for mobile and cloud frontiers in healthcare.
Commun. ACM, 2015

2014
SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity.
Proceedings of the Financial Cryptography and Data Security, 2014

Taking two-factor to the next level: protecting online poker, banking, healthcare and other applications.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Charm: a framework for rapidly prototyping cryptosystems.
J. Cryptogr. Eng., 2013

Zerocoin: Anonymous Distributed E-Cash from Bitcoin.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Enforcing Minimum Necessary Access in Healthcare Through Integrated Audit and Access Control.
Proceedings of the ACM Conference on Bioinformatics, 2013

2012
Vis-à-vis Cryptography: Private and Trustworthy In-Person Certifications.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

2011
Charm: A framework for Rapidly Prototyping Cryptosystems.
IACR Cryptol. ePrint Arch., 2011

A Research Roadmap for Healthcare IT Security Inspired by the PCAST Health Information Technology Report.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Securing electronic medical records using attribute-based encryption on mobile devices.
Proceedings of the SPSM'11, 2011

2010
Self-Protecting Electronic Medical Records Using Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2010

Designing for Audit: A Voting Machine with a Tiny TCB.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
Guest editorial: special issue on electronic voting.
IEEE Trans. Inf. Forensics Secur., 2009

Detecting code alteration by creating a temporary memory bottleneck.
IEEE Trans. Inf. Forensics Secur., 2009

Anonymity in Wireless Broadcast Networks.
Int. J. Netw. Secur., 2009

Coercion Resistant End-to-end Voting.
Proceedings of the Financial Cryptography and Data Security, 2009

2008
New Research Results for Electronic Voting.
IEEE Secur. Priv., 2008

2007
On the Difficulty of Validating Voting Machine Software with Software.
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007

An independent audit framework for software dependent voting systems.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Security through legality.
Commun. ACM, 2006

Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Efficient Memory Bound Puzzles Using Pattern Databases.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Managing the Performance Impact of Web Security.
Electron. Commer. Res., 2005

Web security.
Comput. Networks, 2005

Security Analysis of a Cryptographically-Enabled RFID Device.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Secure Deletion for a Versioning File System.
Proceedings of the FAST '05 Conference on File and Storage Technologies, 2005

2004
Defending against an Internet-based attack on the physical world.
ACM Trans. Internet Techn., 2004

A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP).
ACM Trans. Inf. Syst. Secur., 2004

Guest Editors' Introduction: E-Voting Security.
IEEE Secur. Priv., 2004

Guest Editors' Introduction: Securing the High-Speed Internet.
Computer, 2004

Evaluation of voting systems.
Commun. ACM, 2004

Analyzing internet voting security.
Commun. ACM, 2004

Analysis of an Electronic Voting System.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

2003
Introduction.
Commun. ACM, 2003

WAR: Wireless Anonymous Routing.
Proceedings of the Security Protocols, 2003

Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing.
Proceedings of the Network and Distributed System Security Symposium, 2003

2002
Security considerations for remote electronic voting.
Commun. ACM, 2002

Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
Proceedings of the Network and Distributed System Security Symposium, 2002

Securing Wireless and Mobile Networks - Is It Possible?
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

2001
The architecture of robust publishing systems.
ACM Trans. Internet Techn., 2001

Security Considerations for Remote Electronic Voting over the Internet
CoRR, 2001

Security for E-Voting in Public Elections.
Proceedings of the 15th Conference on Systems Administration (LISA 2001), 2001

Off-Line Generation of Limited-Use Credit Card Numbers.
Proceedings of the Financial Cryptography, 2001

The Business of Electronic Voting.
Proceedings of the Financial Cryptography, 2001

2000
Keystroke dynamics as a biometric for authentication.
Future Gener. Comput. Syst., 2000

Risks of the Passport single signon protocol.
Comput. Networks, 2000

Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System.
Proceedings of the 9th USENIX Security Symposium, 2000

A Response to ''Can We Eliminate Certificate Revocation Lists?''.
Proceedings of the Financial Cryptography, 2000

1999
Secure remote access to an Internet Web server.
IEEE Netw., 1999

Anonymous Web Transactions with Crowds.
Commun. ACM, 1999

The Design and Analysis of Graphical Passwords.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999

Distributed Execution with Remote Audit.
Proceedings of the Network and Distributed System Security Symposium, 1999

Secure Remote Access to an Internal Web Server.
Proceedings of the Network and Distributed System Security Symposium, 1999

Using Smartcards to Secure a Personalized Gambling Device.
Proceedings of the CCS '99, 1999

1998
Crowds: Anonymity for Web Transactions.
ACM Trans. Inf. Syst. Secur., 1998

Mobile Code Security.
IEEE Internet Comput., 1998

A Survey of Web Security.
Computer, 1998

Secure Execution of Java Applets using a Remote Playground.
Proceedings of the Security and Privacy, 1998

1997
Extending NCP for Protocols Using Public Keys.
Mob. Networks Appl., 1997

An Experience Teaching a Graduate Course in Cryptography.
Cryptologia, 1997

Blocking Java Applets at the Firewall.
Proceedings of the Network and Distributed System Security Symposium, 1997

Authentication via Keystroke Dynamics.
Proceedings of the CCS '97, 1997

Revocation of Unread E-mail in an Untrusted Network.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
Response: Independent One-Time Passwords.
Comput. Syst., 1996

Independent One-Time Passwords.
Comput. Syst., 1996

Preserving Integrity in Remote File Location and Retrieval.
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996

Session Key Distribution Using Smart Cards.
Proceedings of the Advances in Cryptology, 1996

1995
Location-Independent Data/Software Integrity Protocol.
RFC, June, 1995

Secure Distribution of Electronic Documents in a Hostile Environment.
Comput. Commun., 1995

Trusted distribution of software over the Internet.
Proceedings of the 1995 Symposium on Network and Distributed System Security, 1995

1994
Nonmonotonic cryptographic protocols.
PhD thesis, 1994

Nonmonotonic Cryptographic Protocols.
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994

1993
Long Running Jobs in an Authenticated Environment.
Proceedings of the 4th USENIX Security Symposium, Santa Clara, CA, USA, October 4-6, 1993, 1993

1977
From Conversations to Stories: An Analysis of Differences Between Oral and Written Language Comprehension.
Proceedings of the 5th International Joint Conference on Artificial Intelligence. Cambridge, 1977


  Loading...