Kevin D. Bowers

According to our database1, Kevin D. Bowers authored at least 16 papers between 2004 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
FrameHanger: Evaluating and Classifying Iframe Injection at Large Scale.
Proceedings of the Security and Privacy in Communication Networks, 2018

MADE: Security Analytics for Enterprise Threat Detection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2014
PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

2013
Securing the Data in Big Data Security Analytics.
IACR Cryptol. ePrint Arch., 2013

Drifting Keys: Impersonation detection for constrained devices.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Efficient software implementations of large finite fields <i>GF</i>(2<sup><i>n</i></sup>) for secure storage applications.
ACM Trans. Storage, 2012

Defending Against the Unknown Enemy: Applying FlipIt to System Security.
IACR Cryptol. ePrint Arch., 2012

More for your money: exploiting performance heterogeneity in public clouds.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012

2011
Exploring implicit memory for painless password recovery.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes.
IACR Cryptol. ePrint Arch., 2010

2009
Authentic Time-Stamps for Archival Storage.
IACR Cryptol. ePrint Arch., 2009

2008
HAIL: A High-Availability and Integrity Layer for Cloud Storage.
IACR Cryptol. ePrint Arch., 2008

Proofs of Retrievability: Theory and Implementation.
IACR Cryptol. ePrint Arch., 2008

2007
Consumable Credentials in Linear-Logic-Based Access-Control Systems.
Proceedings of the Network and Distributed System Security Symposium, 2007

2006
A Linear Logic of Authorization and Knowledge.
Proceedings of the Computer Security, 2006

2004
Fast additive noise steganalysis.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004


  Loading...