default search action
Sean W. Smith
Person information
- affiliation: Dartmouth College, Hanover, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c101]Sameed Ali, Michael E. Locasto, Sean W. Smith:
Weird Machines in Package Managers: A Case Study of Input Language Complexity and Emergent Execution in Software Systems. SP (Workshops) 2024: 169-179 - [c100]J. Peter Brady, Sean W. Smith:
Parsing, Performance, and Pareto in Data Stream Security. SP (Workshops) 2024: 215-223 - [i1]Ben Kallus, Prashant Anantharaman, Michael E. Locasto, Sean W. Smith:
The HTTP Garden: Discovering Parsing Vulnerabilities in HTTP/1.1 Implementations by Differential Fuzzing of Request Streams. CoRR abs/2405.17737 (2024) - 2023
- [c99]Sameed Ali, Sean W. Smith:
A Survey of Parser Differential Anti-Patterns. SP (Workshops) 2023: 105-116 - 2022
- [c98]Sameed Ali, Sean W. Smith:
A Secure Parser Generation Framework for IoT Protocols on Microcontrollers. SP (Workshops) 2022: 124-135 - [c97]Vijay H. Kothari, Prashant Anantharaman, Sean W. Smith, Briland Hitaj, Prashanth Mundkur, Natarajan Shankar, Letitia W. Li, Iavor Diatchki, William Harris:
Capturing the iccMAX calculatorElement: A Case Study on Format Design. SP (Workshops) 2022: 176-197 - 2021
- [j40]Sameed Ali, Prashant Anantharaman, Zephyr Lucas, Sean W. Smith:
What We Have Here Is Failure to Validate: Summer of LangSec. IEEE Secur. Priv. 19(3): 17-23 (2021) - [c96]Prashant Anantharaman, Anmol Chachra, Shikhar Sinha, Michael C. Millian, Bogdan Copos, Sean W. Smith, Michael E. Locasto:
A Communications Validity Detector for SCADA Networks. Critical Infrastructure Protection 2021: 155-183 - [c95]Zephyr S. Lucas, Joanna Y. Liu, Prashant Anantharaman, Sean W. Smith:
Research Report: Parsing PEGs with Length Fields in Software and Hardware. SP (Workshops) 2021: 128-133 - 2020
- [j39]Sean W. Smith:
Securing the Internet of Things: An Ongoing Challenge. Computer 53(6): 62-66 (2020) - [c94]Ira Ray Jenkins, Sean W. Smith:
Distributed IoT Attestation via Blockchain. CCGRID 2020: 798-801 - [c93]Niveta Ramkumar, Vijay H. Kothari, Caitlin Mills, Ross Koppel, Jim Blythe, Sean W. Smith, Andrew L. Kun:
Eyes on URLs: Relating Visual Behavior to Safety Decisions. ETRA 2020: 19:1-19:10 - [c92]Ira Ray Jenkins, Prashant Anantharaman, Rebecca Shapiro, J. Peter Brady, Sergey Bratus, Sean W. Smith:
Ghostbusting: mitigating spectre with intraprocess memory isolation. HotSoS 2020: 10:1-10:11 - [c91]Sameed Ali, Prashant Anantharaman, Sean W. Smith:
Armor Within: Defending Against Vulnerabilities in Third-Party Libraries. SP (Workshops) 2020: 291-299 - [c90]Prashanth Mundkur, Linda Briesemeister, Natarajan Shankar, Prashant Anantharaman, Sameed Ali, Zephyr Lucas, Sean W. Smith:
Research Report: The Parsley Data Format Definition Language. SP (Workshops) 2020: 300-307
2010 – 2019
- 2019
- [j38]Paul C. van Oorschot, Sean W. Smith:
The Internet of Things: Security Challenges. IEEE Secur. Priv. 17(5): 7-9 (2019) - [c89]Michael C. Millian, Prashant Anantharaman, Sergey Bratus, Sean W. Smith, Michael E. Locasto:
Converting an Electric Power Utility Network to Defend Against Crafted Inputs. Critical Infrastructure Protection 2019: 73-85 - [c88]J. Peter Brady, Sergey Bratus, Sean W. Smith:
Dynamic Repair of Mission-Critical Applications with Runtime Snap-Ins. Critical Infrastructure Protection 2019: 235-252 - [c87]Prashant Anantharaman, Kartik Palani, Sean W. Smith:
Scalable Identity and Key Management for Publish-Subscribe Protocols in the Internet-of-Things. IOT 2019: 12:1-12:7 - [c86]Prashant Anantharaman, Vijay H. Kothari, J. Peter Brady, Ira Ray Jenkins, Sameed Ali, Michael C. Millian, Ross Koppel, Jim Blythe, Sergey Bratus, Sean W. Smith:
Mismorphism: The Heart of the Weird Machine. Security Protocols Workshop 2019: 113-124 - [c85]Vijay H. Kothari, Prashant Anantharaman, Ira Ray Jenkins, Michael C. Millian, J. Peter Brady, Sameed Ali, Sergey Bratus, Jim Blythe, Ross Koppel, Sean W. Smith:
Human-Computability Boundaries. Security Protocols Workshop 2019: 157-166 - 2018
- [c84]Ira Ray Jenkins, Sergey Bratus, Sean W. Smith, Maxwell Koo:
Reinventing the privilege drop: how principled preservation of programmer intent would prevent security bugs. HotSoS 2018: 3:1-3:9 - [c83]Prashant Anantharaman, J. Peter Brady, Patrick Flathers, Vijay H. Kothari, Michael C. Millian, Jason Reeves, Nathan Reitinger, William G. Nisen, Sean W. Smith:
Going Dark: A Retrospective on the North American Blackout of 2038. NSPW 2018: 52-63 - [c82]Prashant Anantharaman, Kartik Palani, Rafael Brantley, Galen Brown, Sergey Bratus, Sean W. Smith:
PhasorSec: Protocol Security Filters for Wide Area Measurement Systems. SmartGridComm 2018: 1-6 - 2017
- [c81]Peter C. Johnson, Sergey Bratus, Sean W. Smith:
Protecting Against Malicious Bits On the Wire: Automatically Generating a USB Protocol Parser for a Production Kernel. ACSAC 2017: 528-541 - [c80]Christopher Novak, Jim Blythe, Ross Koppel, Vijay H. Kothari, Sean W. Smith:
Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques. SOUPS 2017 - 2016
- [c79]Bruno Korbar, Jim Blythe, Ross Koppel, Vijay H. Kothari, Sean W. Smith:
Validating an Agent-Based Model of Human Password Behavior. AAAI Workshop: Artificial Intelligence for Cyber Security 2016 - [c78]Sergey Bratus, J. Adam Crain, Sven M. Hallberg, Daniel P. Hirsch, Meredith L. Patterson, Maxwell Koo, Sean W. Smith:
Implementing a vertically hardened DNP3 control stack for power applications. ICSS 2016: 45-53 - [c77]Prashant Anantharaman, Kartik Palani, David M. Nicol, Sean W. Smith:
I Am Joe's Fridge: Scalable Identity in the Internet of Things. iThings/GreenCom/CPSCom/SmartData 2016: 129-135 - [c76]Kartik Palani, Emily Holt, Sean W. Smith:
Invisible and forgotten: Zero-day blooms in the IoT. PerCom Workshops 2016: 1-6 - [c75]Ross Koppel, Jim Blythe, Vijay H. Kothari, Sean W. Smith:
Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users. WSF@SOUPS 2016 - 2015
- [j37]Sean W. Smith, John S. Erickson:
Never Mind Pearl Harbor-What about a Cyber Love Canal? IEEE Secur. Priv. 13(2): 94-98 (2015) - [c74]Sean W. Smith, Ross Koppel, Jim Blythe, Vijay H. Kothari:
Mismorphism: a Semiotic Model of Computer Security Circumvention. HAISA 2015: 172-182 - [c73]Vijay H. Kothari, Jim Blythe, Sean W. Smith, Ross Koppel:
Measuring the security impacts of password policies using cognitive behavioral agent-based modeling. HotSoS 2015: 13:1-13:9 - [c72]Sean W. Smith, Ross Koppel, Jim Blythe, Vijay H. Kothari:
Mismorphism: a semiotic model of computer security circumvention (poster abstract). HotSoS 2015: 25:1-25:2 - [c71]Ross Koppel, Sean W. Smith, Jim Blythe, Vijay H. Kothari:
Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient? ITCH 2015: 215-220 - [c70]Jason Reeves, Sean W. Smith:
Solving the Grid Defender's Dilemma: Tamper Protection for Distributed Cyber-Physical Systems. SECRYPT 2015: 309-316 - 2014
- [j36]Sean W. Smith, Ross Koppel:
Healthcare information technology's relativity problems: a typology of how patients' physical reality, clinicians' mental models, and healthcare information technology differ. J. Am. Medical Informatics Assoc. 21(1): 117-131 (2014) - 2013
- [j35]Jim Blythe, Ross Koppel, Sean W. Smith:
Circumvention of Security: Good Users Do Bad Things. IEEE Secur. Priv. 11(5): 80-83 (2013) - [j34]Denise L. Anthony, Andrew T. Campbell, Thomas Candon, Andrew Gettinger, David Kotz, Lisa A. Marsch, Andres Molina-Markham, Karen Page, Sean W. Smith, Carl A. Gunter, M. Eric Johnson:
Securing Information Technology in Healthcare. IEEE Secur. Priv. 11(6): 25-33 (2013) - [j33]Joseph Cooley, Sean W. Smith:
Privacy-preserving screen capture: Towards closing the loop for health IT usability. J. Biomed. Informatics 46(4): 721-733 (2013) - [c69]Samuel Tan, Rebecca Shapiro, Sean W. Smith:
Electronic Prescription for Controlled Substances: A Cybersecurity Perspective. HealthTech 2013 - [c68]Julian Bangert, Sergey Bratus, Rebecca Shapiro, Sean W. Smith:
The Page-Fault Weird Machine: Lessons in Instruction-less Computation. WOOT 2013 - [c67]Rebecca Shapiro, Sergey Bratus, Sean W. Smith:
"Weird Machines" in ELF: A Spotlight on the Underappreciated Metadata. WOOT 2013 - 2012
- [j32]Sean W. Smith:
Security and Cognitive Bias: Exploring the Role of the Mind. IEEE Secur. Priv. 10(5): 75-78 (2012) - [j31]Jason Reeves, Ashwin Ramaswamy, Michael E. Locasto, Sergey Bratus, Sean W. Smith:
Intrusion detection for resource-constrained embedded control systems in the power grid. Int. J. Crit. Infrastructure Prot. 5(2): 74-83 (2012) - [c66]Travis Goodspeed, Sergey Bratus, Ricky Melgares, Ryan Speers, Sean W. Smith:
Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters. HICSS 2012: 2133-2140 - [c65]Sean W. Smith:
Cryptographic scalability challenges in the smart grid (extended abstract). ISGT 2012: 1-3 - [c64]Gabriel A. Weaver, Sean W. Smith:
XUTools: Unix Commands for Processing Next-Generation Structured Text. LISA 2012: 83-99 - [c63]Yifei Wang, Sean W. Smith, Andrew Gettinger:
Access Control Hygiene and the Empathy Gap in Medical IT. HealthSec 2012 - 2011
- [j30]Sean W. Smith:
Room at the Bottom: Authenticated Encryption on Slow Legacy Networks. IEEE Secur. Priv. 9(4): 60-63 (2011) - [j29]Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sean W. Smith:
Nymble: Blocking Misbehaving Users in Anonymizing Networks. IEEE Trans. Dependable Secur. Comput. 8(2): 256-269 (2011) - [c62]Jason Reeves, Ashwin Ramaswamy, Michael E. Locasto, Sergey Bratus, Sean W. Smith:
Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems. Critical Infrastructure Protection 2011: 31-46 - [c61]Rebecca Shapiro, Sergey Bratus, Edmond Rogers, Sean W. Smith:
Identifying Vulnerabilities in SCADA Systems via Fuzz-Testing. Critical Infrastructure Protection 2011: 57-72 - [c60]Gabriel A. Weaver, Nicholas J. Foti, Sergey Bratus, Daniel N. Rockmore, Sean W. Smith:
Using Hierarchical Change Mining to Manage Network Security Policy Evolution. Hot-ICE 2011 - [r6]Sean W. Smith:
Attestation. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 50-51 - [r5]Sean W. Smith:
Dynamic Root of Trust. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 368-369 - [r4]Sean W. Smith:
Logic Bomb. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 734 - [r3]Sean W. Smith:
Secure Coprocessor. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1102-1103 - [r2]Sean W. Smith:
Tamper Evidence. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1277-1278 - [r1]Sean W. Smith:
Zeroization. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1401 - 2010
- [j28]Sara Sinclair, Sean W. Smith:
What's Wrong with Access Control in the Real World? IEEE Secur. Priv. 8(4): 74-77 (2010) - [j27]Sergey Bratus, James Oakley, Ashwin Ramaswamy, Sean W. Smith, Michael E. Locasto:
Katana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader Toolchain. Int. J. Secur. Softw. Eng. 1(3): 1-17 (2010) - [j26]Massimiliano Pala, Sean W. Smith:
Finding the PKI needles in the Internet haystack. J. Comput. Secur. 18(3): 397-420 (2010) - [j25]Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith:
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs. ACM Trans. Inf. Syst. Secur. 13(4): 39:1-39:33 (2010) - [c59]Ashwin Ramaswamy, Sergey Bratus, Sean W. Smith, Michael E. Locasto:
Katana: A Hot Patching Framework for ELF Executables. ARES 2010: 507-512 - [c58]Alexander Iliev, Sean W. Smith:
Small, stupid, and scalable: secure computing with faerieplay. STC@CCS 2010: 41-52 - [c57]Katelin A. Bailey, Sean W. Smith:
Trusted virtual containers on demand. STC@CCS 2010: 63-72 - [c56]Anna Shubina, Sergey Bratus, Wyllys Ingersol, Sean W. Smith:
The diversity of TPMs and its effects on development: a case study of integrating the TPM into OpenSolaris. STC@CCS 2010: 85-90 - [c55]Massimiliano Pala, Sara Sinclair, Sean W. Smith:
PorKI: Portable PKI Credentials via Proxy Certificates. EuroPKI 2010: 1-16 - [c54]Gabriel A. Weaver, Scott A. Rea, Sean W. Smith:
Computational techniques for increasing PKI policy comprehension by human analysts. IDtrust 2010: 51-62 - [c53]Rouslan Solomakhin, Patrick P. Tsang, Sean W. Smith:
High Security with Low Latency in Legacy SCADA Systems. Critical Infrastructure Protection 2010: 63-79 - [c52]Sergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith:
VM-based security overkill: a lament for applied systems security research. NSPW 2010: 51-60 - [c51]Joseph Cooley, Sean W. Smith:
Dr. Jekyll or Mr. Hyde: Information Security in the Ecosystem of Healthcare. HealthSec 2010 - [e2]Alessandro Acquisti, Sean W. Smith, Ahmad-Reza Sadeghi:
Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings. Lecture Notes in Computer Science 6101, Springer 2010, ISBN 978-3-642-13868-3 [contents]
2000 – 2009
- 2009
- [j24]Massimiliano Pala, Shreyas Cholia, Scott A. Rea, Sean W. Smith:
Interoperable PKI Data Distribution in Computational Grids. Int. J. Grid High Perform. Comput. 1(2): 56-73 (2009) - [c50]Sergey Bratus, Peter C. Johnson, Ashwin Ramaswamy, Sean W. Smith, Michael E. Locasto:
The cake is a lie: privilege rings as a policy resource. VMSec@CCS 2009: 33-38 - [c49]Gabriel A. Weaver, Scott A. Rea, Sean W. Smith:
A Computational Framework for Certificate Policy Operations. EuroPKI 2009: 17-33 - [c48]Chris Masone, Sean W. Smith:
ABUSE: PKI for Real-World Email Trust. EuroPKI 2009: 146-162 - [c47]Stephanie Trudeau, Sara Sinclair, Sean W. Smith:
The effects of introspection on creating privacy policy. WPES 2009: 1-10 - 2008
- [b2]Sean W. Smith, John Marchesini:
The Craft of System Security. Addison-Wesley 2008, ISBN 978-0-321-43483-8 - [j23]Sergey Bratus, Chris Masone, Sean W. Smith:
Why Do Street-Smart People Do Stupid Things Online? IEEE Secur. Priv. 6(3): 71-74 (2008) - [j22]Samuel T. King, Sean W. Smith:
Virtualization and Security: Back to the Future. IEEE Secur. Priv. 6(5): 15 (2008) - [c46]Patrick P. Tsang, Sean W. Smith:
PPAA: Peer-to-Peer Anonymous Authentication. ACNS 2008: 55-74 - [c45]Massimiliano Pala, Shreyas Cholia, Scott A. Rea, Sean W. Smith:
Extending PKI Interoperability in Computational Grids. CCGRID 2008: 645-650 - [c44]Sergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith:
Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security. VMSec 2008: 49-58 - [c43]Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith:
PEREA: towards practical TTP-free revocation in anonymous authentication. CCS 2008: 333-344 - [c42]Massimiliano Pala, Sean W. Smith:
PEACHES and Peers. EuroPKI 2008: 223-238 - [c41]Patrick P. Tsang, Sean W. Smith:
Secure Cryptographic Precomputation with Insecure Memory. ISPEC 2008: 146-160 - [c40]Patrick P. Tsang, Sean W. Smith:
Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers. ISPEC 2008: 188-202 - [c39]Patrick P. Tsang, Sean W. Smith:
YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems. SEC 2008: 445-459 - [c38]Sergey Bratus, Nihal D'Cunha, Evan Randall Sparks, Sean W. Smith:
TOCTOU, Traps, and Trusted Computing. TRUST 2008: 14-32 - [c37]Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith:
TwoKind authentication: protecting private information in untrustworthy environments. WPES 2008: 39-44 - [p1]Sara Sinclair, Sean W. Smith:
Preventative Directions For Insider Threat Mitigation Via Access Control. Insider Attack and Cyber Security 2008: 165-194 - [e1]Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair:
Insider Attack and Cyber Security - Beyond the Hacker. Advances in Information Security 39, Springer 2008, ISBN 978-0-387-77321-6 [contents] - 2007
- [j21]Christopher Masone, Sean W. Smith:
Towards usefully secure email. IEEE Technol. Soc. Mag. 26(1): 25-34 (2007) - [c36]Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W. Smith:
Pastures: Towards Usable Security Policy Engineering. ARES 2007: 1052-1059 - [c35]Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith:
Blacklistable anonymous credentials: blocking misbehaving users without ttps. CCS 2007: 72-81 - [c34]Massimiliano Pala, Sean W. Smith:
AutoPKI: A PKI Resources Discovery System. EuroPKI 2007: 154-169 - [c33]Chris Masone, Kwang-Hyun Baek, Sean W. Smith:
WSKE: Web Server Key Enabled Cookies. Financial Cryptography 2007: 294-306 - [c32]Sara Sinclair, Sean W. Smith, Stephanie Trudeau, M. Eric Johnson, Anthony Portera:
Information Risk in Financial Institutions: Field Study and Research Roadmap. FinanceCom 2007: 165-180 - [c31]Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smith:
Batch Pairing Delegation. IWSEC 2007: 74-90 - [c30]Apu Kapadia, Patrick P. Tsang, Sean W. Smith:
Attribute-Based Publishing with Hidden Credentials and Hidden Policies. NDSS 2007 - [c29]Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, Sean W. Smith:
Nymble: Anonymous IP-Address Blocking. Privacy Enhancing Technologies 2007: 113-133 - [c28]Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith:
TwoKind authentication: usable authenticators for untrustworthy environments. SOUPS 2007: 169-170 - 2006
- [j20]Gabriel Vanrenen, Sean W. Smith, John Marchesini:
Distributing security-mediated PKI. Int. J. Inf. Sec. 5(1): 3-17 (2006) - [c27]Meiyuan Zhao, Sean W. Smith:
Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI. EuroPKI 2006: 16-30 - 2005
- [b1]Sean W. Smith:
Trusted Computing Platforms - Design and Applications. Springer 2005, ISBN 978-0-387-23916-3, pp. I-XX, 1-239 - [j19]John Marchesini, Sean W. Smith, Meiyuan Zhao:
Keyjacking: the surprising insecurity of client-side SSL. Comput. Secur. 24(2): 109-123 (2005) - [j18]Alexander Iliev, Sean W. Smith:
Protecting Client Privacy with Trusted Computing at the Server. IEEE Secur. Priv. 3(2): 20-28 (2005) - [j17]Sean W. Smith:
Turing is from Mars, Shannon is from Venus: Computer Science and Computer Engineering. IEEE Secur. Priv. 3(2): 66-69 (2005) - [j16]Sara Sinclair, Sean W. Smith:
The TIPPI Point: Toward Trustworthy Interfaces. IEEE Secur. Priv. 3(4): 68-71 (2005) - [j15]Sean W. Smith:
Pretending that Systems Are Secure. IEEE Secur. Priv. 3(6): 73-76 (2005) - [j14]Meiyuan Zhao, Sean W. Smith, David M. Nicol:
The performance impact of BGP security. IEEE Netw. 19(6): 42-48 (2005) - [j13]Zishuang (Eileen) Ye, Sean W. Smith, Denise L. Anthony:
Trusted paths for browsers. ACM Trans. Inf. Syst. Secur. 8(2): 153-186 (2005) - [c26]Sara Sinclair, Sean W. Smith:
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness. ACSAC 2005: 419-430 - [c25]Meiyuan Zhao, Sean W. Smith, David M. Nicol:
Aggregated path authentication for efficient BGP security. CCS 2005: 128-138 - [c24]John Marchesini, Sean W. Smith:
Modeling Public Key Infrastructures in the Real World. EuroPKI 2005: 118-134 - [c23]Mark Franklin, Kevin Mitcham, Sean W. Smith, Joshua Stabiner, Omen Wild:
CA-in-a-Box. EuroPKI 2005: 180-190 - [c22]James E. Dobson, Jeffrey B. Woodward, Susan A. Schwarz, John Marchesini, Hany Farid, Sean W. Smith:
The Dartmouth Green Grid. International Conference on Computational Science (2) 2005: 99-106 - [c21]John Marchesini, Sean W. Smith:
SHEMP: Secure Hardware Enhanced MyProxy. PST 2005 - 2004
- [j12]Sean W. Smith:
Magic Boxes and Boots: Security in Hardware. Computer 37(10): 106-109 (2004) - [j11]Sean W. Smith, Eugene H. Spafford:
Grand Challenges in Information Security: Process and Output. IEEE Secur. Priv. 2(1): 69-71 (2004) - [j10]Sean W. Smith:
Outbound authentication for programmable secure coprocessors. Int. J. Inf. Sec. 3(1): 28-41 (2004) - [j9]David M. Nicol, Sean W. Smith, Meiyuan Zhao:
Evaluation of efficient security for BGP route announcements using parallel simulation. Simul. Model. Pract. Theory 12(3-4): 187-216 (2004) - [c20]John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian:
Open-Source Applications of TCPA Hardware. ACSAC 2004: 294-303 - [c19]Yasir Ali, Sean W. Smith:
Flexible and Scalable Public Key Security for SSH. EuroPKI 2004: 43-56 - [c18]Gabriel Vanrenen, Sean W. Smith:
Distributing Security-Mediated PKI. EuroPKI 2004: 218-231 - [c17]Paul Seligman, Sean W. Smith:
Detecting Unauthorized Use in Online Journal Archives: A Case Study. ICWI 2004: 209-217 - [c16]Sidharth Nazareth, Sean W. Smith:
Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth. ICWI 2004: 218-226 - [c15]Alexander Iliev, Sean W. Smith:
Private Information Storage with Logarithm-Space Secure Hardware. International Information Security Workshops 2004: 199-214 - [c14]Anna Shubina, Sean W. Smith:
Design and Prototype of a Coercion-Resistant, Verifiable Electronic Voting System. PST 2004: 29-39 - 2003
- [j8]Sean W. Smith:
Fairy Dust, Secrets, and the Real World. IEEE Secur. Priv. 1(1): 89-93 (2003) - [j7]Sean W. Smith:
Humans in the Loop: Human-Computer Interaction and Security. IEEE Secur. Priv. 1(3): 75-79 (2003) - [j6]Sean W. Smith, Jothy Rosenberg, Adam Golodner:
A Funny Thing Happened on the Way to the Marketplace. IEEE Secur. Priv. 1(6): 74-78 (2003) - [j5]Anna Shubina, Sean W. Smith:
Using caching for browsing anonymity. SIGecom Exch. 4(2): 11-20 (2003) - 2002
- [c13]K. Kain, Sean W. Smith, R. Asokan:
Digital signatures and electronic documents: a cautionary tale. Communications and Multimedia Security 2002: 293-308 - [c12]Sean W. Smith:
Outbound Authentication for Programmable Secure Coprocessors. ESORICS 2002: 72-89 - [c11]Alexander Iliev, Sean W. Smith:
Prototyping an Armored Data Vault: Rights Management on Big Brother's Computer. Privacy Enhancing Technologies 2002: 144-159 - [c10]Zishuang (Eileen) Ye, Sean W. Smith:
Trusted Paths for Browsers. USENIX Security Symposium 2002: 263-279 - 2001
- [j4]Joan G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, Leendert van Doorn, Sean W. Smith, Steve H. Weingart:
Building the IBM 4758 Secure Coprocessor. Computer 34(10): 57-66 (2001) - [j3]Sean W. Smith, David Safford:
Practical server privacy with secure coprocessors. IBM Syst. J. 40(3): 683-695 (2001) - [j2]Sean W. Smith:
WebALPS: a survey of E-commerce privacy and security applications. SIGecom Exch. 2(3): 29-36 (2001) - [c9]Shan Jiang, Sean W. Smith, Kazuhiro Minami:
Securing Web Servers against Insider Attack . ACSAC 2001: 265-276 - [c8]Suresh Chari, Parviz Kermani, Sean W. Smith, Leandros Tassiulas:
Security Issues in M-Commerce: A Usage-Based Taxonomy. E-Commerce Agents 2001: 264-282 - [c7]Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar:
SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. IPDPS 2001: 170 - [c6]Mark Lindemann, Sean W. Smith:
Improving DES Coprocessor Throughput for Short Operations. USENIX Security Symposium 2001
1990 – 1999
- 1999
- [j1]Sean W. Smith, Steve H. Weingart:
Building a high-performance, programmable secure coprocessor. Comput. Networks 31(8): 831-860 (1999) - 1998
- [c5]Sean W. Smith, Elaine R. Palmer, Steve H. Weingart:
Using a High-Performance, Programmable Secure Coprocessor. Financial Cryptography 1998: 73-89 - [c4]Sean W. Smith, Vernon Austel:
Trusting Trusted Hardware: Towards a Formal Model for Programmable Secure Coprocessors. USENIX Workshop on Electronic Commerce 1998 - 1996
- [c3]Sean W. Smith, David B. Johnson:
Minimizing Timestamp Size for Completely Asynchronous Optimistic Recovery with Minimal Rollback. SRDS 1996: 66-75 - 1995
- [c2]Sean W. Smith, David B. Johnson, J. D. Tygar:
Completely Asynchronous Optimistic Recovery with Minimal Rollbacks. FTCS 1995: 361-370 - 1991
- [c1]Merrick L. Furst, Jeffrey C. Jackson, Sean W. Smith:
Improved Learning of AC0 Functions. COLT 1991: 317-325
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 00:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint