Stephen Herwig

Orcid: 0000-0003-2459-2867

According to our database1, Stephen Herwig authored at least 10 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2025
Akeso: Bringing Post-Compromise Security to Cloud Storage.
Proc. Priv. Enhancing Technol., 2025

AccNimbus: Scalable Proofs of Data Possession for Cloud Storage.
Proceedings of the 14th International Workshop on Hardware and Architectural Support for Security and Privacy, 2025

Mazu: A Zero Trust Architecture for Service Mesh Control Planes.
Proceedings of the 18th European Workshop on Systems Security, 2025

2023
Towards Protecting Billions and Billions of Bits on the Interplanetary Internet.
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023

2021
Execution Environments for Running Legacy Applications in Multi-Party Trust Settings.
PhD thesis, 2021

Bento: safely bringing network function virtualization to Tor.
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021

2020
Achieving Keyless CDNs with Conclaves.
Proceedings of the 29th USENIX Security Symposium, 2020

Bento: Bringing Network Function Virtualization to Tor.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2017
DeTor: Provably Avoiding Geographic Regions in Tor.
Proceedings of the 26th USENIX Security Symposium, 2017


  Loading...