Steven M. Bellovin

Results: 46



#Item
1Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
2A Look Back at “Security Problems in the TCP/IP Protocol Suite” Steven M. Bellovin AT&T Labs—Research  Abstract About fifteen years ago, I wrote a paper on security problems in the TCP/IP protocol s

A Look Back at “Security Problems in the TCP/IP Protocol Suite” Steven M. Bellovin AT&T Labs—Research Abstract About fifteen years ago, I wrote a paper on security problems in the TCP/IP protocol s

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:49:51
    3Input to the Commission on Enhancing National Cybersecurity Steven M. Bellovin Adam Shostack https://www.cs.columbia.edu/~smb http://adam.shostack.org Columbia University1 Independent

    Input to the Commission on Enhancing National Cybersecurity Steven M. Bellovin Adam Shostack https://www.cs.columbia.edu/~smb http://adam.shostack.org Columbia University1 Independent

    Add to Reading List

    Source URL: www.cs.columbia.edu

    - Date: 2016-09-08 11:42:54
      4Thinking Security Steven M. Bellovin https://www.cs.columbia.edu/˜smb Steven M. Bellovin

      Thinking Security Steven M. Bellovin https://www.cs.columbia.edu/˜smb Steven M. Bellovin

      Add to Reading List

      Source URL: www.cs.columbia.edu

      - Date: 2014-09-07 15:54:28
        5To appear in Proceedings of the Third Usenix UNIX Security Sympisum, Baltimore, SeptemberThere Be Dragons Steven M. Bellovin AT&T Bell Laboratories Murray Hill, NJ

        To appear in Proceedings of the Third Usenix UNIX Security Sympisum, Baltimore, SeptemberThere Be Dragons Steven M. Bellovin AT&T Bell Laboratories Murray Hill, NJ

        Add to Reading List

        Source URL: www.avolio.com

        - Date: 2007-12-29 17:42:40
          6IT’S TOO COMPLICATED: THE TECHNOLOGICAL IMPLICATIONS OF IP-BASED COMMUNICATIONS ON CONTENT/NON-CONTENT DISTINCTIONS AND THE THIRD PARTY DOCTRINE Steven M. Bellovin,1 Matt Blaze,2 Susan Landau,3 and Stephanie K. Pell4 F

          IT’S TOO COMPLICATED: THE TECHNOLOGICAL IMPLICATIONS OF IP-BASED COMMUNICATIONS ON CONTENT/NON-CONTENT DISTINCTIONS AND THE THIRD PARTY DOCTRINE Steven M. Bellovin,1 Matt Blaze,2 Susan Landau,3 and Stephanie K. Pell4 F

          Add to Reading List

          Source URL: www.cs.columbia.edu

          Language: English - Date: 2016-06-07 13:58:45
          7Susan Landau Department of Social Science and Policy Studies Salisbury Laboratories 100 Institute Road Worcester, MA

          Susan Landau Department of Social Science and Policy Studies Salisbury Laboratories 100 Institute Road Worcester, MA

          Add to Reading List

          Source URL: www.privacyink.org

          Language: English - Date: 2016-07-14 00:04:44
          8Comments on Proposed Remote Search Rules Steven M. Bellovin Columbia University∗ Matt Blaze University of Pennsylvania*

          Comments on Proposed Remote Search Rules Steven M. Bellovin Columbia University∗ Matt Blaze University of Pennsylvania*

          Add to Reading List

          Source URL: www.privacyink.org

          Language: English - Date: 2015-10-13 22:14:45
          9Just Fast Keying: Key Agreement In A Hostile Internet William Aiello AT&T Labs Research  Steven M. Bellovin

          Just Fast Keying: Key Agreement In A Hostile Internet William Aiello AT&T Labs Research Steven M. Bellovin

          Add to Reading List

          Source URL: omereingold.files.wordpress.com

          Language: English - Date: 2014-10-22 00:30:32