Scott A. Crosby

According to our database1, Scott A. Crosby authored at least 10 papers between 1999 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Algorithmic DoS.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Authenticated Dictionaries: Real-World Costs and Trade-Offs.
ACM Trans. Inf. Syst. Secur., 2011

2009
Opportunities and Limits of Remote Timing Attacks.
ACM Trans. Inf. Syst. Secur., 2009

Efficient Data Structures For Tamper-Evident Logging.
Proceedings of the 18th USENIX Security Symposium, 2009

Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries.
Proceedings of the Computer Security, 2009

2008
Finding the Evidence in Tamper-Evident Logs.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

2005
A Taxonomy of Rational Attacks.
Proceedings of the Peer-to-Peer Systems IV, 4th International Workshop, 2005

2003
Denial of Service via Algorithmic Complexity Attacks.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

2001
A Cryptanalysis of the High-Bandwidth Digital Content Protection System.
Proceedings of the Security and Privacy in Digital Rights Management, 2001

1999
Adjustable Filmstrips and Skims as Abstractions for a Digital Video Library.
Proceedings of the IEEE Forum on Research and Technology Advances in Digital Libraries, 1999


  Loading...