Stephen Farrell

According to our database1, Stephen Farrell authored at least 74 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Reflections on Ten Years Past the Snowden Revelations.
RFC, July, 2023

2021
Report from the IAB COVID-19 Network Impacts Workshop 2020.
RFC, July, 2021

Deprecation of TLS 1.1 for Email Submission and Access.
RFC, March, 2021

Deprecating TLS 1.0 and TLS 1.1.
RFC, March, 2021

Additional Criteria for Nominating Committee Eligibility.
RFC, February, 2021

Contact Tracing App Privacy: What Data Is Shared By Europe's GAEN Contact Tracing Apps.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

2020
Measurement-Based Evaluation Of Google/Apple Exposure Notification API For Proximity Detection in a Commuter Bus.
CoRR, 2020

Coronavirus contact tracing: evaluating the potential of using bluetooth received signal strength for proximity detection.
Comput. Commun. Rev., 2020

Coronavirus Contact Tracing App Privacy: What Data Is Shared by the Singapore OpenTrace App?
Proceedings of the Security and Privacy in Communication Networks, 2020

2018
Low-Power Wide Area Network (LPWAN) Overview.
RFC, May, 2018

Clusters of Re-used Keys.
IACR Cryptol. ePrint Arch., 2018

2017
Report from the Internet of Things Software Update (IoTSU) Workshop 2016.
RFC, September, 2017

2016
Requirements Analysis Required-Otherwise Targeted Monitoring Enables Pervasive Monitoring.
Computer, 2016

2015
Report from the Strengthening the Internet (STRINT) Workshop.
RFC, December, 2015

HTTP Origin-Bound Authentication (HOBA).
RFC, March, 2015

2014
Pervasive Monitoring Is an Attack.
RFC, May, 2014

Why Pervasive Monitoring Is Bad.
IEEE Internet Comput., 2014

2013
Naming Things with Hashes.
RFC, April, 2013

Network of Information (NetInf) - An information-centric networking architecture.
Comput. Commun., 2013

2012
CRiSIS 2012 security standards tutorial.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2011
Bundle Security Protocol Specification.
RFC, May, 2011

Report on an Arctic summer DTN trial.
Wirel. Networks, 2011

Delay- and Disruption-Tolerant Networking (DTN): An Alternative Solution for Future Satellite Networking Applications.
Proc. IEEE, 2011

Not Reinventing PKI until We Have Something Better.
IEEE Internet Comput., 2011

Security in the Wild.
IEEE Internet Comput., 2011

Leaky or Guessable Session Identifiers.
IEEE Internet Comput., 2011

Report on DTN applications during arctic summer 2010 trial.
Proceedings of the 14th International Symposium on Wireless Personal Multimedia Communications, 2011

DTN trials and router updates.
Proceedings of the 3rd Extreme Conference on Communication - The Amazon Expedition, 2011

2010
An Internet Attribute Certificate Profile for Authorization.
RFC, January, 2010

Applications Directly Using Cryptography.
IEEE Internet Comput., 2010

Why Didn't We Spot That?
IEEE Internet Comput., 2010

2009
Other Certificates Extension.
RFC, November, 2009

Delay- and Disruption-Tolerant Networking.
IEEE Internet Comput., 2009

API Keys to the Kingdom.
IEEE Internet Comput., 2009

Keys Don't Grow in Threes.
IEEE Internet Comput., 2009

Why Don't We Encrypt Our Email?
IEEE Internet Comput., 2009

Special issue of computer communications on delay and disruption tolerant networking.
Comput. Commun., 2009

2008
Licklider Transmission Protocol - Security Extensions.
RFC, September, 2008

Licklider Transmission Protocol - Specification.
RFC, September, 2008

Licklider Transmission Protocol - Motivation.
RFC, September, 2008

Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile.
RFC, May, 2008

A delay and disruption tolerant transport layer protocol
PhD thesis, 2008

DTN: an architectural retrospective.
IEEE J. Sel. Areas Commun., 2008

Password Policy Purgatory.
IEEE Internet Comput., 2008

Portable Storage and Data Loss.
IEEE Internet Comput., 2008

Security Boundaries.
IEEE Internet Comput., 2008

Harvesting with SONAR: the value of aggregating social network information.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
Socially augmenting employee profiles with people-tagging.
Proceedings of the 20th Annual ACM Symposium on User Interface Software and Technology, 2007

Building Communities with People-Tags.
Proceedings of the Human-Computer Interaction, 2007

Sensor Network with Delay Tolerance (SeNDT).
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

"End-by-Hop" Data Integrity.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

2006
When TCP Breaks: Delay- and Disruption- Tolerant Networking.
IEEE Internet Comput., 2006

Activity management as a Web service.
IBM Syst. J., 2006

DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel.
Proceedings of the Public Key Infrastructure, 2006

Delay- and disruption-tolerant networking.
Artech House, ISBN: 978-1-59693-063-6, 2006

2005
Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP).
RFC, September, 2005

XKMS Working Group Interoperability Status Report.
Proceedings of the Public Key Infrastructure, 2005

Using the XML Key Management Specification (and Breaking X.509 Rules as You Go).
Proceedings of the Communications and Multimedia Security, 2005

Relescope: an experiment in accelerating relationships.
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

2004
Securely Available Credentials Protocol.
RFC, June, 2004

2003
Web Places: Using Intermediaries to Add People to the Web.
Proceedings of the Designing Information Spaces: The Social Navigation Approach, 2003

End-to-End Trust Starts with Recognition.
Proceedings of the Security in Pervasive Computing, 2003

2002
An Internet Attribute Certificate Profile for Authorization.
RFC, April, 2002

Information programming for personal user interfaces.
Proceedings of the 7th International Conference on Intelligent User Interfaces, 2002

2001
Reuse of CMS Content Encryption Keys.
RFC, October, 2001

Securely Available Credentials - Requirements.
RFC, August, 2001

How to Teach a Fish to Swim.
Proceedings of the 2002 IEEE CS International Symposium on Human-Centric Computing Languages and Environments (HCC 2001), 2001

Social and informational proxies in a fishtank.
Proceedings of the CHI 2001 Extended Abstracts on Human Factors in Computing Systems, 2001

2000
AAA Authorization Requirements.
RFC, August, 2000

AAA Authorization Application Examples.
RFC, August, 2000

AAA Authorization Framework.
RFC, August, 2000

The WAP Forum's Wireless Public Key Infrastructure.
Inf. Secur. Tech. Rep., 2000

LiveInfo: Adapting Web Experience by Customization and Annotation.
Proceedings of the Adaptive Hypermedia and Adaptive Web-Based Systems, 2000

1999
Internet X.509 Public Key Infrastructure Certificate Management Protocols.
RFC, March, 1999


  Loading...