Jeffrey I. Schiller

According to our database1, Jeffrey I. Schiller authored at least 13 papers between 1988 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Bugs in our pockets: the risks of client-side scanning.
J. Cybersecur., January, 2024

2015
Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015

Keys under doormats.
Commun. ACM, 2015

2005
Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2).
RFC, December, 2005

Randomness Requirements for Security.
RFC, June, 2005

Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce.
Proceedings of the Financial Cryptography and Data Security, 2005

How to make secure email easier to use.
Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

2003
Security Mechanisms for the Internet.
RFC, December, 2003

2002
Strong Security Requirements for Internet Engineering Task Force Standard Protocols.
RFC, August, 2002

1997
The risks of key recovery, key escrow, and trusted third-party encryption.
World Wide Web J., 1997

1995
Scaling the Web of Trust: Combining Kerberos and PGP to Provide Large Scale Authentication.
Proceedings of the USENIX 1995 Technical Conference on UNIX and Advanced Computing Systems, 1995

1994
Randomness Recommendations for Security.
RFC, December, 1994

1988
Kerberos: An Authentication Service for Open Network Systems.
Proceedings of the USENIX Winter Conference. Dallas, Texas, USA, January 1988, 1988


  Loading...