Daniel R. Simon

According to our database1, Daniel R. Simon authored at least 19 papers between 1991 and 2009.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2009
Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs.
Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, 2009

2008
Characterizing Botnets from Email Spam Records.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

2007
AS-Based Accountability as a Cost-Effective DDoS Defense.
Proceedings of the First Workshop on Hot Topics in Understanding Botnets, 2007

An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks.
Proceedings of the Financial Cryptography and Data Security, 2007

Authorizing applications in singularity.
Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, 2007

2004
Shield: vulnerability-driven network filters for preventing known vulnerability exploits.
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004

2003
Link Evolution: Analysis and Algorithms.
Internet Math., 2003

Secure traceroute to detect faulty or malicious routing.
Comput. Commun. Rev., 2003

Persistent-State Checkpoint Comparison for Troubleshooting Configuration Failures.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

2002
Statistical Identification of Encrypted Web Browsing Traffic.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

2001
Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

1999
Limits on the Efficiency of One-Way Permutation-Based Hash Functions.
Proceedings of the 40th Annual Symposium on Foundations of Computer Science, 1999

1998
Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions?
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1997
On the Power of Quantum Computation.
SIAM J. Comput., 1997

GUMP: Grand Unified Meta-Protocols Recipes for Simple, Standards-Based Financial Cryptography.
Proceedings of the Financial Cryptography, 1997

1996
Anonymous Communication and Anonymous Cash.
Proceedings of the Advances in Cryptology, 1996

1993
On defining and achieving cryptographic security in a multiparty network.
PhD thesis, 1993

Cryptographic defense against traffic analysis.
Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, 1993

1991
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack.
Proceedings of the Advances in Cryptology, 1991


  Loading...