Scott A. Crosby
According to our database1, Scott A. Crosby authored at least 10 papers between 1999 and 2011.
Legend:Book In proceedings Article PhD thesis Other
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Authenticated Dictionaries: Real-World Costs and Trade-Offs.
ACM Trans. Inf. Syst. Secur., 2011
Opportunities and Limits of Remote Timing Attacks.
ACM Trans. Inf. Syst. Secur., 2009
Efficient Data Structures For Tamper-Evident Logging.
Proceedings of the 18th USENIX Security Symposium, 2009
Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries.
Proceedings of the Computer Security, 2009
Finding the Evidence in Tamper-Evident Logs.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008
A Taxonomy of Rational Attacks.
Proceedings of the Peer-to-Peer Systems IV, 4th International Workshop, 2005
Denial of Service via Algorithmic Complexity Attacks.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003
A Cryptanalysis of the High-Bandwidth Digital Content Protection System.
Proceedings of the Security and Privacy in Digital Rights Management, 2001
Adjustable Filmstrips and Skims as Abstractions for a Digital Video Library.
Proceedings of the IEEE Forum on Research and Technology Advances in Digital Libraries, 1999