Stuart G. Stubblebine

According to our database1, Stuart G. Stubblebine authored at least 41 papers between 1991 and 2010.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Temporarily hidden bit commitment and lottery applications.
Int. J. Inf. Sec., 2010

2007
Regular expression pocket reference - regular expressions for Perl, Ruby, PHP, Python, C, Java, and .NET (2. ed.).
O'Reilly, ISBN: 978-0-596-51427-3, 2007

2006
On countering online dictionary attacks with login histories and humans-in-the-loop.
ACM Trans. Inf. Syst. Secur., 2006

Secure Distributed Human Computation.
Proceedings of the Security Protocols, 2006

Reducing the Dependence of SPKI/SDSI on PKI.
Proceedings of the Computer Security, 2006

2005
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling.
Proceedings of the Financial Cryptography and Data Security, 2005

Secure Distributed <i>Human</i> Computation.
Proceedings of the Financial Cryptography and Data Security, 2005

A Chat at the Old Phishin' Hole.
Proceedings of the Financial Cryptography and Data Security, 2005

2004
A General Model for Authenticated Data Structures.
Algorithmica, 2004

A Formal Privacy System and Its Application to Location Based Services.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract).
Proceedings of the Financial Cryptography, 2004

2003
Authentic Data Publication Over the Internet.
J. Comput. Secur., 2003

Certifying data from multiple sources (extended abstract).
Proceedings of the Proceedings 4th ACM Conference on Electronic Commerce (EC-2003), 2003

Certifying Data from Multiple Sources.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

On Generalized Authorization Problems.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

2002
An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency.
IEEE Trans. Software Eng., 2002

Stack and Queue Integrity on Hostile Platforms.
IEEE Trans. Software Eng., 2002

2001
Secure Distributed Computing in a Commercial Environment.
Proceedings of the Financial Cryptography, 2001

Flexible authentication of XML documents.
Proceedings of the CCS 2001, 2001

2000
Cryptographic Verification of Test Coverage Claims.
IEEE Trans. Software Eng., 2000

Formal characterization and automated analysis of known-pair and chosen-text attacks.
IEEE J. Sel. Areas Commun., 2000

Software engineering for security: a roadmap.
Proceedings of the 22nd International Conference on on Software Engineering, 2000

Authentic Attributes with Fine-Grained Anonymity Protection.
Proceedings of the Financial Cryptography, 2000

Authentic Third-party Data Publication.
Proceedings of the Data and Application Security, 2000

1999
Unlinkable serial transactions: protocols and applications.
ACM Trans. Inf. Syst. Secur., 1999

Authentication Metric Analysis and Design.
ACM Trans. Inf. Syst. Secur., 1999

Group Principals and the Formalization of Anonymity.
Proceedings of the FM'99 - Formal Methods, 1999

Fair On-Line Auctions without Special Trusted Parties.
Proceedings of the Financial Cryptography, 1999

1998
Resilient Authentication Using Path Independence.
IEEE Trans. Computers, 1998

Techniques for Trusted Software Engineering.
Proceedings of the Forging New Links, 1998

Publicly Verifiable Lotteries: Applications of Delaying Functions.
Proceedings of the Financial Cryptography, 1998

1997
Toward Acceptable Metrics of Authentication.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

Research Directions for Automated Software Verification: Using Trusted Hardware.
Proceedings of the 1997 International Conference on Automated Software Engineering, 1997

Unlinkable Serial Transactions.
Proceedings of the Financial Cryptography, 1997

Path Independence for Authentication in Large-Scale Systems.
Proceedings of the CCS '97, 1997

1996
An Authentication Logic Supporting Synchronization, Revocation, and Recency.
Proceedings of the CCS '96, 1996

1995
Recent-secure authentication: enforcing revocation in distributed systems.
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995

1993
A Note on the Use of Timestamps as Nonces.
ACM SIGOPS Oper. Syst. Rev., 1993

Protocol design for integrity protection.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

1992
On message integrity in cryptographic protocols.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

1991
Logics for Cryptographic Protocols - Virtues and Limitations.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991


  Loading...