Encrypted key exchange: Password-based protocols secure against dictionary attacks SM Bellovin, M Merritt | 2098 | 1992 |
Security problems in the TCP/IP protocol suite SM Bellovin ACM SIGCOMM Computer Communication Review 19 (2), 32-48, 1989 | 1102 | 1989 |
Controlling high bandwidth aggregates in the network R Mahajan, SM Bellovin, S Floyd, J Ioannidis, V Paxson, S Shenker ACM SIGCOMM Computer Communication Review 32 (3), 62-73, 2002 | 1079 | 2002 |
ICMP traceback messages SM Bellovin, M Leech, T Taylor | 1060 | 2003 |
Implementing a distributed firewall S Ioannidis, AD Keromytis, SM Bellovin, JM Smith Proceedings of the 7th ACM conference on Computer and communications …, 2000 | 932 | 2000 |
Implementing pushback: Router-based defense against DDoS attacks J Ioannidis, SM Bellovin | 859 | 2002 |
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise SM Bellovin, M Merritt Proceedings of the 1st ACM Conference on Computer and Communications …, 1993 | 643 | 1993 |
Limitations of the Kerberos authentication system SM Bellovin, M Merritt ACM SIGCOMM Computer Communication Review 20 (5), 119-132, 1990 | 614 | 1990 |
Distributed firewalls SM Bellovin login 24 (5), 37-47, 1999 | 522 | 1999 |
A technique for counting NATted hosts SM Bellovin Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment, 267-272, 2002 | 337 | 2002 |
Network firewalls SM Bellovin, WR Cheswick IEEE communications magazine 32 (9), 50-57, 1994 | 330 | 1994 |
Facebook and privacy: it's complicated M Johnson, S Egelman, SM Bellovin Proceedings of the eighth symposium on usable privacy and security, 1-15, 2012 | 281 | 2012 |
Problem Areas for the IP Security Protocols. SM Bellovin USENIX Security Symposium, 205-214, 1996 | 281 | 1996 |
A study of privacy settings errors in an online social network M Madejski, M Johnson, SM Bellovin 2012 IEEE international conference on pervasive computing and communications …, 2012 | 245 | 2012 |
Cryptographic protocol for secure communications SM Bellovin, M Merritt US Patent 5,241,599, 1993 | 232 | 1993 |
Using the Domain Name System for System Break-ins. SM Bellovin USENIX Security Symposium, 1995 | 218 | 1995 |
Keys under doormats: mandating insecurity by requiring government access to all data and communications H Abelson, R Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, ... Journal of Cybersecurity 1 (1), 69-79, 2015 | 214 | 2015 |
The failure of online social network privacy settings M Madejski, ML Johnson, SM Bellovin | 214 | 2011 |
The risks of key recovery, key escrow, and trusted third-party encryption H Abelson, R Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, ... O'Reilly & Associates, Inc, 1997 | 208 | 1997 |
Just fast keying: Key agreement in a hostile internet W Aiello, SM Bellovin, M Blaze, R Canetti, J Ioannidis, AD Keromytis, ... ACM Transactions on Information and System Security (TISSEC) 7 (2), 242-273, 2004 | 173 | 2004 |