Stop the war!
Остановите войну!
for scientists:
default search action
Steven M. Bellovin
Person information
- affiliation: Columbia University, New York City, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j74]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our pockets: the risks of client-side scanning. J. Cybersecur. 10(1) (2024) - [j73]Steven M. Bellovin:
Degenerative AI? IEEE Secur. Priv. 22(3): 88 (2024) - [i22]Susan Landau, James X. Dempsey, Ece Kamar, Steven M. Bellovin:
Recommendations for Government Development and Use of Advanced Automated Systems to Make Decisions about Individuals. CoRR abs/2403.01649 (2024) - [i21]Susan Landau, James X. Dempsey, Ece Kamar, Steven M. Bellovin, Robert Pool:
Challenging the Machine: Contestability in Government AI Systems. CoRR abs/2406.10430 (2024) - 2023
- [j72]Steven M. Bellovin:
Is Cybersecurity Liability a Liability? IEEE Secur. Priv. 21(4): 99-100 (2023) - [i20]Stephen Farrell, Farzaneh Badii, Bruce Schneier, Steven M. Bellovin:
Reflections on Ten Years Past the Snowden Revelations. RFC 9446: 1-29 (2023) - 2022
- [j71]Steven M. Bellovin:
Open Source and Trust. IEEE Secur. Priv. 20(2): 107-108 (2022) - [j70]Steven M. Bellovin:
What Do We Owe? IEEE Secur. Priv. 20(6): 83-84 (2022) - [c65]Miranda Christ, Sarah Radway, Steven M. Bellovin:
Differential Privacy and Swapping: Examining De-Identification's Impact on Minority Representation and Privacy Preservation in the U.S. Census. SP 2022: 457-472 - 2021
- [j69]Steven M. Bellovin:
The Law and Lawful Hacking. IEEE Secur. Priv. 19(4): 76 (2021) - [c64]John S. Koh, Jason Nieh, Steven M. Bellovin:
Encrypted cloud photo storage using Google photos. MobiSys 2021: 136-149 - [i19]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our Pockets: The Risks of Client-Side Scanning. CoRR abs/2110.07450 (2021) - 2020
- [j68]Steven M. Bellovin:
Policies on Privacy. IEEE Secur. Priv. 18(2): 76 (2020) - [j67]Steven M. Bellovin:
Security, Privacy, and Scale. IEEE Secur. Priv. 18(6): 63-64 (2020)
2010 – 2019
- 2019
- [j66]Steven M. Bellovin:
Layered Insecurity. IEEE Secur. Priv. 17(3): 96-95 (2019) - [j65]John S. Koh, Steven M. Bellovin, Jason Nieh:
Making It Easier to Encrypt Your Emails. login Usenix Mag. 44(3) (2019) - [c63]John S. Koh, Steven M. Bellovin, Jason Nieh:
Why Joanie Can Encrypt: Easy Email Encryption with Easy Key Management. EuroSys 2019: 2:1-2:16 - 2018
- [j64]Steven M. Bellovin, Peter G. Neumann:
The big picture. Commun. ACM 61(11): 24-26 (2018) - [j63]Steven M. Bellovin:
Toward a National Cybersecurity Policy. IEEE Secur. Priv. 16(3): 108 (2018) - 2017
- [j62]Steven M. Bellovin, Susan Landau, Herbert S. Lin:
Limiting the undesired impact of cyber weapons: technical requirements and policy implications. J. Cybersecur. 3(1): 59-68 (2017) - [j61]Steven M. Bellovin:
Jurisdiction and the Internet. IEEE Secur. Priv. 15(3): 96 (2017) - [j60]Steven M. Bellovin:
Who Are You? IEEE Secur. Priv. 15(6): 88 (2017) - [c62]Sebastian Zimmeck, Ziqi Wang, Lieyong Zou, Roger Iyengar, Bin Liu, Florian Schaub, Shomir Wilson, Norman M. Sadeh, Steven M. Bellovin, Joel R. Reidenberg:
Automated Analysis of Privacy Requirements for Mobile Apps. NDSS 2017 - [c61]Sebastian Zimmeck, Jie S. Li, Hyungtae Kim, Steven M. Bellovin, Tony Jebara:
A Privacy Analysis of Cross-device Tracking. USENIX Security Symposium 2017: 1391-1408 - 2016
- [j59]Steven M. Bellovin, Matt Blaze, Susan Landau:
Insecure Surveillance: Technical Issues with Remote Computer Searches. Computer 49(3): 14-24 (2016) - [j58]Steven M. Bellovin:
Attack Surfaces. IEEE Secur. Priv. 14(3): 88 (2016) - [j57]Steven M. Bellovin:
Easy Email Encryption. IEEE Secur. Priv. 14(6): 96 (2016) - [c60]Sebastian Zimmeck, Ziqi Wang, Lieyong Zou, Roger Iyengar, Bin Liu, Florian Schaub, Shomir Wilson, Norman M. Sadeh, Steven M. Bellovin, Joel R. Reidenberg:
Automated Analysis of Privacy Requirements for Mobile Apps. AAAI Fall Symposia 2016 - [c59]Steven M. Bellovin:
Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence. The New Codebreakers 2016: 40-66 - [i18]Peter Gutmann, Steven M. Bellovin, Matt Blaze, Ronald L. Rivest, Nigel P. Smart:
An IBE-based Signcryption Scheme for Group Key Management. CoRR abs/1603.09526 (2016) - 2015
- [j56]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats. Commun. ACM 58(10): 24-26 (2015) - [j55]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats: mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1(1): 69-79 (2015) - [j54]Steven M. Bellovin:
What a Real Cybersecurity Bill Should Address. IEEE Secur. Priv. 13(3): 92 (2015) - [j53]Steven M. Bellovin:
The Key to the Key. IEEE Secur. Priv. 13(6): 96 (2015) - [c58]Christopher J. Riederer, Sebastian Zimmeck, Coralie Phanord, Augustin Chaintreau, Steven M. Bellovin:
"I don't have a photograph, but you can have my footprints.": Revealing the Demographics of Location Data. COSN 2015: 185-195 - [c57]Christopher J. Riederer, Sebastian Zimmeck, Coralie Phanord, Augustin Chaintreau, Steven M. Bellovin:
"I Don't Have a Photograph, But You Can Have My Footprints" - Revealing the Demographics of Location Data. ICWSM 2015: 682-685 - [c56]Ben A. Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin:
Malicious-Client Security in Blind Seer: A Scalable Private DBMS. IEEE Symposium on Security and Privacy 2015: 395-410 - 2014
- [j52]Steven M. Bellovin:
Dr. Strangecode. IEEE Secur. Priv. 12(3): 88 (2014) - [j51]Steven M. Bellovin:
By Any Means Possible: How Intelligence Agencies Have Gotten Their Data. IEEE Secur. Priv. 12(4): 80-84 (2014) - [j50]Steven M. Bellovin:
What Should Crypto Look Like? IEEE Secur. Priv. 12(6): 108 (2014) - [c55]Binh Vo, Steven M. Bellovin:
Anonymous Publish-Subscribe Systems. SecureComm (1) 2014: 195-211 - [c54]Vasilis Pappas, Fernando Krell, Binh Vo, Vladimir Kolesnikov, Tal Malkin, Seung Geol Choi, Wesley George, Angelos D. Keromytis, Steven M. Bellovin:
Blind Seer: A Scalable Private DBMS. IEEE Symposium on Security and Privacy 2014: 359-374 - [c53]Sebastian Zimmeck, Steven M. Bellovin:
Privee: An Architecture for Automatically Analyzing Web Privacy Policies. USENIX Security Symposium 2014: 1-16 - [i17]Ben Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin:
Malicious-Client Security in Blind Seer: A Scalable Private DBMS. IACR Cryptol. ePrint Arch. 2014: 963 (2014) - [i16]Steven M. Bellovin, Randy Bush, David Ward:
Security Requirements for BGP Path Validation. RFC 7353: 1-9 (2014) - 2013
- [j49]Steven M. Bellovin, Matt Blaze, Sandy Clark, Susan Landau:
Going Bright: Wiretapping without Weakening Communications Infrastructure. IEEE Secur. Priv. 11(1): 62-72 (2013) - [j48]Steven M. Bellovin:
Military Cybersomethings. IEEE Secur. Priv. 11(3): 88 (2013) - [j47]Steven M. Bellovin:
Walls and Gates. IEEE Secur. Priv. 11(6): 88 (2013) - 2012
- [j46]Steven M. Bellovin:
Fighting the Last War. IEEE Secur. Priv. 10(3): 96 (2012) - [j45]Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin, Salvatore J. Stolfo:
Usable, Secure, Private Search. IEEE Secur. Priv. 10(5): 53-60 (2012) - [j44]Steven M. Bellovin:
The Major Cyberincident Investigations Board. IEEE Secur. Priv. 10(6): 96 (2012) - [j43]Carl E. Landwehr, Dan Boneh, John C. Mitchell, Steven M. Bellovin, Susan Landau, Michael E. Lesk:
Privacy and Cybersecurity: The Next 100 Years. Proc. IEEE 100(Centennial-Issue): 1659-1673 (2012) - [c52]Mariana Raykova, Hang Zhao, Steven M. Bellovin:
Privacy Enhanced Access Control for Outsourced Data Sharing. Financial Cryptography 2012: 223-238 - [c51]Michelle Madejski, Maritza L. Johnson, Steven M. Bellovin:
A study of privacy settings errors in an online social network. PerCom Workshops 2012: 340-345 - [c50]Maritza L. Johnson, Serge Egelman, Steven M. Bellovin:
Facebook and privacy: it's complicated. SOUPS 2012: 9 - [i15]Fernando Gont, Steven M. Bellovin:
Defending against Sequence Number Attacks. RFC 6528: 1-12 (2012) - 2011
- [j42]Steven M. Bellovin, Scott O. Bradner, Whitfield Diffie, Susan Landau, Jennifer Rexford:
As simple as possible - but not more so. Commun. ACM 54(8): 30-33 (2011) - [j41]Steven M. Bellovin:
Frank Miller: Inventor of the One-Time Pad. Cryptologia 35(3): 203-222 (2011) - [j40]Salvatore J. Stolfo, Steven M. Bellovin, David Evans:
Measuring Security. IEEE Secur. Priv. 9(3): 60-65 (2011) - [j39]Steven M. Bellovin:
Clouds from Both Sides. IEEE Secur. Priv. 9(3): 88 (2011) - [j38]Steven M. Bellovin:
Security Think. IEEE Secur. Priv. 9(6): 88 (2011) - [c49]Vasilis Pappas, Mariana Raykova, Binh Vo, Steven M. Bellovin, Tal Malkin:
Private search in the real world. ACSAC 2011: 83-92 - [c48]Maritza L. Johnson, Steven M. Bellovin, Angelos D. Keromytis:
Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent. Financial Cryptography Workshops 2011: 131-137 - [c47]Hang Zhao, Jorge Lobo, Arnab Roy, Steven M. Bellovin:
Policy refinement of network services for MANETs. Integrated Network Management 2011: 113-120 - [r2]Steven M. Bellovin:
IP Traceback. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 632-634 - 2010
- [j37]Steven M. Bellovin:
Identity and Security. IEEE Secur. Priv. 8(2): 88 (2010) - [j36]Steven M. Bellovin:
Perceptions and Reality. IEEE Secur. Priv. 8(5): 88 (2010) - [c46]Elli Androulaki, Binh Vo, Steven M. Bellovin:
Privacy-Preserving, Taxable Bank Accounts. ESORICS 2010: 37-54 - [c45]Elli Androulaki, Steven M. Bellovin:
A Secure and Privacy-Preserving Targeted Ad-System. Financial Cryptography Workshops 2010: 123-135 - [c44]Hang Zhao, Steven M. Bellovin:
High Performance Firewalls in MANETs. MSN 2010: 154-160 - [c43]Maritza L. Johnson, Steven M. Bellovin:
Policy Management for E-Health Records. HealthSec 2010
2000 – 2009
- 2009
- [j35]D. Scott Alexander, Yuu-Heng Cheng, Brian A. Coan, Andrei Ghetie, Vikram Kaul, Bruce Siegell, Steven M. Bellovin, Nicholas F. Maxemchuk, Henning Schulzrinne, Stephen Schwab, Angelos Stavrou, Jonathan M. Smith:
The dynamic community of interest and its realization in ZODIAC. IEEE Commun. Mag. 47(10): 40-47 (2009) - [j34]Steven M. Bellovin:
The Government and Cybersecurity. IEEE Secur. Priv. 7(2): 96 (2009) - [j33]Steven M. Bellovin, Daniel G. Conway:
Security as a Systems Property. IEEE Secur. Priv. 7(5): 88 (2009) - [j32]Steven M. Bellovin, Randy Bush:
Configuration management and security. IEEE J. Sel. Areas Commun. 27(3): 268-274 (2009) - [c42]Mariana Raykova, Binh Vo, Steven M. Bellovin, Tal Malkin:
Secure anonymous database search. CCSW 2009: 115-126 - [c41]Shaya Potter, Steven M. Bellovin, Jason Nieh:
Two-Person Control Administation: Preventing Administation Faults through Duplication. LISA 2009: 15-27 - [c40]Maritza L. Johnson, Steven M. Bellovin, Robert W. Reeder, Stuart E. Schechter:
Laissez-faire file sharing: access control designed for individuals at the endpoints. NSPW 2009: 1-10 - [c39]Elli Androulaki, Steven M. Bellovin:
APOD: Anonymous Physical Object Delivery. Privacy Enhancing Technologies 2009: 202-215 - [c38]Yuu-Heng Cheng, Mariana Raykova, Alexander Poylisher, D. Scott Alexander, Martin Eiger, Steven M. Bellovin:
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET. POLICY 2009: 174-177 - [c37]Elli Androulaki, Steven M. Bellovin:
An Anonymous Credit Card System. TrustBus 2009: 42-51 - [i14]Steven M. Bellovin:
Guidelines for Specifying the Use of IPsec Version 2. RFC 5406: 1-13 (2009) - 2008
- [j31]Steven M. Bellovin:
The physical world and the real world. Commun. ACM 51(5): 104 (2008) - [j30]Tim Strayer, Mark Allman, Grenville J. Armitage, Steven M. Bellovin, Shudong Jin, Andrew W. Moore:
IMRG workshop on application classification and identification report. Comput. Commun. Rev. 38(3): 87-90 (2008) - [j29]Steven M. Bellovin, Terry V. Benzel, Bob Blakley, Dorothy E. Denning, Whitfield Diffie, Jeremy Epstein, Paulo Veríssimo:
Information Assurance Technology Forecast 2008. IEEE Secur. Priv. 6(1): 16-23 (2008) - [j28]Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Peter G. Neumann, Jennifer Rexford:
Risking Communications Security: Potential Hazards of the Protect America Act. IEEE Secur. Priv. 6(1): 24-33 (2008) - [j27]Steven M. Bellovin:
Security by Checklist. IEEE Secur. Priv. 6(2): 88 (2008) - [j26]Steven M. Bellovin:
The Puzzle of Privacy. IEEE Secur. Priv. 6(5): 88 (2008) - [c36]Maritza L. Johnson, Chaitanya Atreya, Adam J. Aviv, Steven M. Bellovin, Gail E. Kaiser:
RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies. UPSEC 2008 - [c35]Hang Zhao, Chi-Kin Chau, Steven M. Bellovin:
ROFL: routing as the firewall layer. NSPW 2008: 23-31 - [c34]Elli Androulaki, Seung Geol Choi, Steven M. Bellovin, Tal Malkin:
Reputation Systems for Anonymous Networks. Privacy Enhancing Technologies 2008: 202-218 - [c33]Elli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, Steven M. Bellovin:
PAR: Payment for Anonymous Routing. Privacy Enhancing Technologies 2008: 219-236 - [c32]Hang Zhao, Jorge Lobo, Steven M. Bellovin:
An Algebra for Integration and Analysis of Ponder2 Policies. POLICY 2008: 74-77 - [p1]Steven M. Bellovin:
The Insider Attack Problem Nature and Scope. Insider Attack and Cyber Security 2008: 1-4 - [e6]Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung:
Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings. Lecture Notes in Computer Science 5037, 2008, ISBN 978-3-540-68913-3 [contents] - [e5]Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair:
Insider Attack and Cyber Security - Beyond the Hacker. Advances in Information Security 39, Springer 2008, ISBN 978-0-387-77321-6 [contents] - 2007
- [j25]Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Jennifer Rexford, Peter G. Neumann:
Internal surveillance, external risks. Commun. ACM 50(12): 128 (2007) - [j24]Steven M. Bellovin:
DRM, Complexity, and Correctness. IEEE Secur. Priv. 5(1): 80 (2007) - [j23]Steven M. Bellovin:
Seers and Craftspeople. IEEE Secur. Priv. 5(5): 88 (2007) - [j22]Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Kostas G. Anagnostakis, Jonathan M. Smith:
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications. Int. J. Netw. Secur. 4(1): 69-80 (2007) - [e4]Steven M. Bellovin:
3rd Workshop on Steps to Reducing Unwanted Traffic on the Internet, SRUTI'07, Santa Clara, CA, USA, June 18, 2007. USENIX Association 2007 [contents] - [i13]Steven M. Bellovin:
Key Change Strategies for TCP-MD5. RFC 4808: 1-8 (2007) - 2006
- [j21]Steven M. Bellovin:
Virtual machines, virtual security? Commun. ACM 49(10): 104 (2006) - [j20]Steven M. Bellovin:
Unconventional Wisdom. IEEE Secur. Priv. 4(1): 88 (2006) - [j19]Steven M. Bellovin:
On the Brittleness of Software and the Infeasibility of Security Metrics. IEEE Secur. Priv. 4(4): 96-96 (2006) - [j18]Steven M. Bellovin, Bill Cheswick, Angelos D. Keromytis:
Worm Propagation Strategies in an IPv6 Internet. login Usenix Mag. 31(1) (2006) - [c31]Steven M. Bellovin, Eric Rescorla:
Deploying a New Hash Algorithm. NDSS 2006 - [c30]Steven M. Bellovin:
Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography. USENIX ATC, General Track 2006 - [c29]Steven M. Bellovin:
Privacy & Cryptography. USENIX ATC, General Track 2006 - [c28]Ka-Ping Yee, David A. Wagner, Marti A. Hearst, Steven M. Bellovin:
Prerendered User Interfaces for Higher-Assurance Electronic Voting. EVT 2006 - [e3]Steven M. Bellovin:
2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, SRUTI'06, San Jose, CA, USA, July 7, 2006. USENIX Association 2006 [contents] - [i12]Steven M. Bellovin, Alex Zinin:
Standards Maturity Variance Regarding the TCP MD5 Signature Option (RFC 2385) and the BGP-4 Specification. RFC 4278: 1-7 (2006) - 2005
- [j17]Steven M. Bellovin, Matt Blaze, Susan Landau:
The real national-security needs for VoIP. Commun. ACM 48(11): 120 (2005) - [j16]Steven M. Bellovin:
Security and Privacy: Enemies or Allies? IEEE Secur. Priv. 3(3): 92 (2005) - [i11]Steven M. Bellovin, Russell Housley:
Guidelines for Cryptographic Key Management. RFC 4107: 1-7 (2005) - 2004
- [j15]Steven M. Bellovin:
Spamming, phishing, authentication, and privacy. Commun. ACM 47(12): 144 (2004) - [j14]William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold:
Just fast keying: Key agreement in a hostile internet. ACM Trans. Inf. Syst. Secur. 7(2): 242-273 (2004) - [c27]Steven M. Bellovin:
A Look Back at "Security Problems in the TCP/IP Protocol Suite". ACSAC 2004: 229-249 - [c26]