David A. McGrew
According to our database1, David A. McGrew authored at least 51 papers between 2000 and 2021.
Legend:Book In proceedings Article PhD thesis Other
Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security.
RFC, June, 2020
TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior.
Proceedings of the Internet Measurement Conference, 2019
Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
J. Comput. Virol. Hacking Tech., 2018
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018
Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016
Proceedings of the Artificial Intelligence for Cyber Security, 2016
RFC, December, 2015
An Actionable Threat Intelligence system using a Publish-Subscribe communications model.
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, 2015
Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH).
RFC, August, 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Using Counter Modes with Encapsulating Security Payload (ESP) and Authentication Header (AH) to Protect Group Traffic.
RFC, November, 2010
Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP).
RFC, May, 2010
Dynamic Provisioning Using Flexible Authentication via Secure Tunneling Extensible Authentication Protocol (EAP-FAST).
RFC, March, 2009
Using Authenticated Encryption Algorithms with the Encrypted Payload of the Internet Key Exchange version 2 (IKEv2) Protocol.
RFC, August, 2008
The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST).
RFC, May, 2007
IACR Cryptol. ePrint Arch., 2007
RFC, May, 2006
IEEE J. Sel. Areas Commun., 2006
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006
RFC, June, 2005
Divide-and-concatenate: an architecture-level optimization technique for universal hash functions.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2005
Minimizing center key storage in hybrid one-way function based group key management with communication constraints.
Inf. Process. Lett., 2005
IACR Cryptol. ePrint Arch., 2005
Efficient Authentication of Large, Dynamic Data Sets Using Galois/Counter Mode (GCM).
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005
Microprocess. Microsystems, 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Progress in Cryptology, 2004
IEEE Trans. Software Eng., 2003
IACR Cryptol. ePrint Arch., 2003
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000