Stephen Farrell

According to our database1, Stephen Farrell authored at least 63 papers between 1999 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Low-Power Wide Area Network (LPWAN) Overview.
RFC, May, 2018

Clusters of Re-used Keys.
IACR Cryptology ePrint Archive, 2018

Report from the Internet of Things Software Update (IoTSU) Workshop 2016.
RFC, September, 2017

Requirements Analysis Required-Otherwise Targeted Monitoring Enables Pervasive Monitoring.
IEEE Computer, 2016

Report from the Strengthening the Internet (STRINT) Workshop.
RFC, December, 2015

HTTP Origin-Bound Authentication (HOBA).
RFC, March, 2015

Pervasive Monitoring Is an Attack.
RFC, May, 2014

Why Pervasive Monitoring Is Bad.
IEEE Internet Computing, 2014

Naming Things with Hashes.
RFC, April, 2013

Network of Information (NetInf) - An information-centric networking architecture.
Computer Communications, 2013

CRiSIS 2012 security standards tutorial.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

Bundle Security Protocol Specification.
RFC, May, 2011

Report on an Arctic summer DTN trial.
Wireless Networks, 2011

Delay- and Disruption-Tolerant Networking (DTN): An Alternative Solution for Future Satellite Networking Applications.
Proceedings of the IEEE, 2011

Not Reinventing PKI until We Have Something Better.
IEEE Internet Computing, 2011

Security in the Wild.
IEEE Internet Computing, 2011

Leaky or Guessable Session Identifiers.
IEEE Internet Computing, 2011

Report on DTN applications during arctic summer 2010 trial.
Proceedings of the 14th International Symposium on Wireless Personal Multimedia Communications, 2011

An Internet Attribute Certificate Profile for Authorization.
RFC, January, 2010

Applications Directly Using Cryptography.
IEEE Internet Computing, 2010

Why Didn't We Spot That?
IEEE Internet Computing, 2010

Other Certificates Extension.
RFC, November, 2009

Delay- and Disruption-Tolerant Networking.
IEEE Internet Computing, 2009

API Keys to the Kingdom.
IEEE Internet Computing, 2009

Keys Don't Grow in Threes.
IEEE Internet Computing, 2009

Why Don't We Encrypt Our Email?
IEEE Internet Computing, 2009

Special issue of computer communications on delay and disruption tolerant networking.
Computer Communications, 2009

Licklider Transmission Protocol - Security Extensions.
RFC, September, 2008

Licklider Transmission Protocol - Specification.
RFC, September, 2008

Licklider Transmission Protocol - Motivation.
RFC, September, 2008

Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile.
RFC, May, 2008

DTN: an architectural retrospective.
IEEE Journal on Selected Areas in Communications, 2008

Password Policy Purgatory.
IEEE Internet Computing, 2008

Portable Storage and Data Loss.
IEEE Internet Computing, 2008

Security Boundaries.
IEEE Internet Computing, 2008

Harvesting with SONAR: the value of aggregating social network information.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

Socially augmenting employee profiles with people-tagging.
Proceedings of the 20th Annual ACM Symposium on User Interface Software and Technology, 2007

Building Communities with People-Tags.
Proceedings of the Human-Computer Interaction, 2007

Sensor Network with Delay Tolerance (SeNDT).
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

"End-by-Hop" Data Integrity.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

When TCP Breaks: Delay- and Disruption- Tolerant Networking.
IEEE Internet Computing, 2006

Activity management as a Web service.
IBM Systems Journal, 2006

DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel.
Proceedings of the Public Key Infrastructure, 2006

Delay- and disruption-tolerant networking.
Artech House, ISBN: 978-1-59693-063-6, 2006

Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP).
RFC, September, 2005

XKMS Working Group Interoperability Status Report.
Proceedings of the Public Key Infrastructure, 2005

Using the XML Key Management Specification (and Breaking X.509 Rules as You Go).
Proceedings of the Communications and Multimedia Security, 2005

Relescope: an experiment in accelerating relationships.
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

Securely Available Credentials Protocol.
RFC, June, 2004

Web Places: Using Intermediaries to Add People to the Web.
Proceedings of the Designing Information Spaces: The Social Navigation Approach, 2003

End-to-End Trust Starts with Recognition.
Proceedings of the Security in Pervasive Computing, 2003

An Internet Attribute Certificate Profile for Authorization.
RFC, April, 2002

Information programming for personal user interfaces.
Proceedings of the 7th International Conference on Intelligent User Interfaces, 2002

Reuse of CMS Content Encryption Keys.
RFC, October, 2001

Securely Available Credentials - Requirements.
RFC, August, 2001

How to Teach a Fish to Swim.
Proceedings of the 2002 IEEE CS International Symposium on Human-Centric Computing Languages and Environments (HCC 2001), 2001

Social and informational proxies in a fishtank.
Proceedings of the CHI '01 Extended Abstracts on Human Factors in Computing Systems, 2001

AAA Authorization Requirements.
RFC, August, 2000

AAA Authorization Application Examples.
RFC, August, 2000

AAA Authorization Framework.
RFC, August, 2000

The WAP Forum's Wireless Public Key Infrastructure.
Inf. Sec. Techn. Report, 2000

LiveInfo: Adapting Web Experience by Customization and Annotation.
Proceedings of the Adaptive Hypermedia and Adaptive Web-Based Systems, 2000

Internet X.509 Public Key Infrastructure Certificate Management Protocols.
RFC, March, 1999