Aviel D. Rubin

According to our database1, Aviel D. Rubin authored at least 76 papers between 1977 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018

2017
Outsourcing Medical Dataset Analysis: A Possible Solution.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
MalloryWorker: Stealthy Computation and Covert Channels Using Web Workers.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Applications of Secure Location Sensing in Healthcare.
Proceedings of the 7th ACM International Conference on Bioinformatics, 2016

2015
Security for mobile and cloud frontiers in healthcare.
Commun. ACM, 2015

2014
SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity.
Proceedings of the Financial Cryptography and Data Security, 2014

Taking two-factor to the next level: protecting online poker, banking, healthcare and other applications.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Charm: a framework for rapidly prototyping cryptosystems.
J. Cryptographic Engineering, 2013

Zerocoin: Anonymous Distributed E-Cash from Bitcoin.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Enforcing Minimum Necessary Access in Healthcare Through Integrated Audit and Access Control.
Proceedings of the ACM Conference on Bioinformatics, 2013

2012
Vis-à-vis Cryptography: Private and Trustworthy In-Person Certifications.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

Charm: A Framework for Rapidly Prototyping Cryptosystems.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
A Research Roadmap for Healthcare IT Security Inspired by the PCAST Health Information Technology Report.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Securing electronic medical records using attribute-based encryption on mobile devices.
Proceedings of the SPSM'11, 2011

2010
Self-Protecting Electronic Medical Records Using Attribute-Based Encryption.
IACR Cryptology ePrint Archive, 2010

Designing for Audit: A Voting Machine with a Tiny TCB.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
Guest editorial: special issue on electronic voting.
IEEE Trans. Information Forensics and Security, 2009

Detecting code alteration by creating a temporary memory bottleneck.
IEEE Trans. Information Forensics and Security, 2009

Anonymity in Wireless Broadcast Networks.
I. J. Network Security, 2009

Coercion Resistant End-to-end Voting.
Proceedings of the Financial Cryptography and Data Security, 2009

2008
New Research Results for Electronic Voting.
IEEE Security & Privacy, 2008

2007
On the Difficulty of Validating Voting Machine Software with Software.
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007

An independent audit framework for software dependent voting systems.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Security through legality.
Commun. ACM, 2006

Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Efficient Memory Bound Puzzles Using Pattern Databases.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Managing the Performance Impact of Web Security.
Electronic Commerce Research, 2005

Web security.
Computer Networks, 2005

Security Analysis of a Cryptographically-Enabled RFID Device.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Secure Deletion for a Versioning File System.
Proceedings of the FAST '05 Conference on File and Storage Technologies, 2005

2004
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP).
ACM Trans. Inf. Syst. Secur., 2004

Guest Editors' Introduction: E-Voting Security.
IEEE Security & Privacy, 2004

Guest Editors' Introduction: Securing the High-Speed Internet.
IEEE Computer, 2004

Evaluation of voting systems.
Commun. ACM, 2004

Analyzing internet voting security.
Commun. ACM, 2004

Analysis of an Electronic Voting System.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

2003
Introduction.
Commun. ACM, 2003

WAR: Wireless Anonymous Routing.
Proceedings of the Security Protocols, 2003

Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing.
Proceedings of the Network and Distributed System Security Symposium, 2003

2002
Security considerations for remote electronic voting.
Commun. ACM, 2002

Defending against an Internet-based attack on the physical world.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002

Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
Proceedings of the Network and Distributed System Security Symposium, 2002

Securing Wireless and Mobile Networks - Is It Possible?
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

2001
The architecture of robust publishing systems.
ACM Trans. Internet Techn., 2001

Security for E-Voting in Public Elections.
Proceedings of the 15th Conference on Systems Administration (LISA 2001), 2001

Off-Line Generation of Limited-Use Credit Card Numbers.
Proceedings of the Financial Cryptography, 2001

The Business of Electronic Voting.
Proceedings of the Financial Cryptography, 2001

2000
Keystroke dynamics as a biometric for authentication.
Future Generation Comp. Syst., 2000

Risks of the Passport single signon protocol.
Computer Networks, 2000

Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System.
Proceedings of the 9th USENIX Security Symposium, 2000

A Response to ''Can We Eliminate Certificate Revocation Lists?''.
Proceedings of the Financial Cryptography, 2000

1999
Anonymous Web Transactions with Crowds.
Commun. ACM, 1999

The Design and Analysis of Graphical Passwords.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999

Distributed Execution with Remote Audit.
Proceedings of the Network and Distributed System Security Symposium, 1999

Secure Remote Access to an Internal Web Server.
Proceedings of the Network and Distributed System Security Symposium, 1999

Using Smartcards to Secure a Personalized Gambling Device.
Proceedings of the CCS '99, 1999

1998
Crowds: Anonymity for Web Transactions.
ACM Trans. Inf. Syst. Secur., 1998

Mobile Code Security.
IEEE Internet Computing, 1998

A Survey of Web Security.
IEEE Computer, 1998

Secure Execution of Java Applets using a Remote Playground.
Proceedings of the Security and Privacy, 1998

1997
An Experience Teaching a Graduate Course in Cryptography.
Cryptologia, 1997

Blocking Java Applets at the Firewall.
Proceedings of the Network and Distributed System Security Symposium, 1997

Authentication via Keystroke Dynamics.
Proceedings of the CCS '97, 1997

Revocation of Unread E-mail in an Untrusted Network.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
Response: Independent One-Time Passwords.
Computing Systems, 1996

Preserving Integrity in Remote File Location and Retrieval.
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996

Session Key Distribution Using Smart Cards.
Proceedings of the Advances in Cryptology, 1996

1995
Location-Independent Data/Software Integrity Protocol.
RFC, June, 1995

Secure Distribution of Electronic Documents in a Hostile Environment.
Computer Communications, 1995

Independent One-Time Passwords.
Proceedings of the 5th USENIX Security Symposium, 1995

Trusted distribution of software over the Internet.
Proceedings of the 1995 Symposium on Network and Distributed System Security, 1995

Extending NCP for protocols using public keys.
Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), 1995

1994
Nonmonotonic Cryptographic Protocols.
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994

1993
Long Running Jobs in an Authenticated Environment.
Proceedings of the 4th USENIX Security Symposium, Santa Clara, CA, USA, October 4-6, 1993, 1993

1977
From Conversations to Stories: An Analysis of Differences Between Oral and Written Language Comprehension.
Proceedings of the 5th International Joint Conference on Artificial Intelligence. Cambridge, 1977


  Loading...