Hilarie K. Orman

Orcid: 0000-0002-1922-6451

According to our database1, Hilarie K. Orman authored at least 50 papers between 1988 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Recent Progress in Quantum Computing Relevant to Internet Security.
IACR Cryptol. ePrint Arch., 2024

2023
IEEE Security and Privacy Symposium in the Year 2003.
IEEE Secur. Priv., 2023

2022
Creating an Open Community of Cryptographers.
Proceedings of the Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, 2022

2021
Internet Security and Quantum Computing.
IACR Cryptol. ePrint Arch., 2021

2019
The Meaning of Identity on the Internet.
IEEE Internet Comput., 2019

Online voting: we can do it! (we have to).
Commun. ACM, 2019

2018
Blockchain: the Emperors New PKI?
IEEE Internet Comput., 2018

From Whom?: SMTP Headers Hold the Clues.
IEEE Internet Comput., 2018

2017
Secure Voting: A Call to Arms.
IEEE Internet Comput., 2017

You Let That In?
IEEE Internet Comput., 2017

Eschew Globals and Beware of the Random.
IEEE Internet Comput., 2017

2016
Evil Offspring - Ransomware and Crypto Technology.
IEEE Internet Comput., 2016

The Power (Energy) of Cryptography.
IEEE Internet Comput., 2016

Both Sides Now: Thinking about Cloud Security.
IEEE Internet Comput., 2016

2015
Encrypted Email - The History and Technology of Message Privacy
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-21344-6, 2015

The Research Horizon: Four Nearly Practical Concepts.
IEEE Internet Comput., 2015

One Target Among Many: Not Your Average Malware.
IEEE Internet Comput., 2015

Why Won't Johnny Encrypt?
IEEE Internet Comput., 2015

Mathematics and Physics Build a New Future for Secure Communication [Guest editors' introduction].
IEEE Secur. Priv., 2015

2014
Co-Evolution with Social Networks: Deception is Protection.
IEEE Internet Comput., 2014

Recent Parables in Cryptography.
IEEE Internet Comput., 2014

2013
Twelve Random Characters: Passwords in the Era of Massive Parallelism.
IEEE Internet Comput., 2013

Did You Want Privacy With That?: Personal Data Protection in Mobile Devices.
IEEE Internet Comput., 2013

The Compleat Story of Phish.
IEEE Internet Comput., 2013

2012
Towards a Semantics of Phish.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

2004
Policy, Authorization, and Enforcement Requirements of the Open Pluggable Edge Services (OPES).
RFC, August, 2004

Security Threats and Risks for Open Pluggable Edge Services (OPES).
RFC, August, 2004

Requirements for Open Pluggable Edge Services (OPES) Callout Protocols.
RFC, August, 2004

An Architecture for Open Pluggable Edge Services (OPES).
RFC, August, 2004

Determining Strengths For Public Keys Used For Exchanging Symmetric Keys.
RFC, April, 2004

Open Pluggable Edge Services (OPES) Use Cases and Deployment Scenarios.
RFC, April, 2004

2003
The Morris Worm: A Fifteen-Year Perspective.
IEEE Secur. Priv., 2003

Hidden Credentials.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

2001
Data Integrity for Mildly Active Content.
Proceedings of the 3rd Annual International Workshop on Active Middleware Services (AMS 2001), 2001

2000
Towards a Platform for Intelligent Activity at the Edge.
Proceedings of the USENIX Special Workshop on Intelligence at the Network Edge, 2000

1999
Activating Networks: A Progress Report.
Computer, 1999

Twenty Year Time Capsule Panel: The Future of Networking.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

Perspectives on Progress and Directions for Network Security Research.
Proceedings of the Network and Distributed System Security Symposium, 1999

1998
The OAKLEY Key Determination Protocol.
RFC, November, 1998

1997
Firewalls: An Expert Roundtable.
IEEE Softw., 1997

Experimental Results of Covert Channel Limitation in One-Way Communication Systems.
Proceedings of the Network and Distributed System Security Symposium, 1997

1996
Positive feedback and the madness of crowds.
Proceedings of the 1996 Workshop on New Security Paradigms, 1996

Parallelized Network Security Protocols.
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996

1995
Implementing a Secure rlogin Environment: A Case Study of Using a Secure Network Layer Protocol.
Proceedings of the 5th USENIX Security Symposium, 1995

Fast Key Exchange with Elliptic Curve Systems.
Proceedings of the Advances in Cryptology, 1995

1993
A High Assurance Window System Prototype.
J. Comput. Secur., 1993

A Fast and General Implementation of Mach IPC in a Network.
Proceedings of the USENIX MACH III Symposium, Santa Fe, New Mexico, USA, April 19-21, 1993, 1993

1992
Evolution of a trusted B3 window system prototype.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

1991
A prototype B3 trusted X Window System.
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991

1988
Reverification of a microprocessor.
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988


  Loading...