Steven Bellovin
Steven Bellovin
Professor of Computer Science, Columbia University
Verified email at cs.columbia.edu
TitleCited byYear
Encrypted key exchange: Password-based protocols secure against dictionary attacks
SM Bellovin, M Merritt
18921992
Firewalls and Internet security: repelling the wily hacker
WR Cheswick, SM Bellovin, AD Rubin
Addison-Wesley Longman Publishing Co., Inc., 2003
17352003
Security problems in the TCP/IP protocol suite
SM Bellovin
ACM SIGCOMM Computer Communication Review 19 (2), 32-48, 1989
10431989
ICMP traceback messages
SM Bellovin, M Leech, T Taylor
10132003
Controlling high bandwidth aggregates in the network
R Mahajan, SM Bellovin, S Floyd, J Ioannidis, V Paxson, S Shenker
ACM SIGCOMM Computer Communication Review 32 (3), 62-73, 2002
10062002
Implementing pushback: Router-based defense against DDoS attacks
J Ioannidis, SM Bellovin
8062002
Implementing a distributed firewall
S Ioannidis, AD Keromytis, SM Bellovin, JM Smith
Proceedings of the 7th ACM conference on Computer and communications …, 2000
8062000
Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise
SM Bellovin, M Merritt
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
5921993
Limitations of the Kerberos authentication system
SM Bellovin, M Merritt
ACM SIGCOMM Computer Communication Review 20 (5), 119-132, 1990
5811990
Distributed firewalls
SM Bellovin
login 24 (5), 37-47, 1999
4581999
Controlling high-bandwidth flows at the congested router
R Mahajan, S Floyd, D Wetherall
Proceedings Ninth International Conference on Network Protocols. ICNP 2001 …, 2001
4542001
Computer science handbook
AB Tucker
CRC press, 2004
3172004
Network firewalls
SM Bellovin, WR Cheswick
IEEE communications magazine 32 (9), 50-57, 1994
3031994
A technique for counting NATted hosts
SM Bellovin
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, 267-272, 2002
2972002
Problem Areas for the IP Security Protocols.
SM Bellovin
USENIX Security Symposium, 205-214, 1996
2701996
Facebook and privacy: it's complicated
M Johnson, S Egelman, SM Bellovin
Proceedings of the eighth symposium on usable privacy and security, 1-15, 2012
2242012
Cryptographic protocol for secure communications
SM Bellovin, M Merritt
US Patent 5,241,599, 1993
2201993
Using the Domain Name System for System Break-ins.
SM Bellovin
USENIX Security Symposium, 1995
2031995
The risks of key recovery, key escrow, and trusted third-party encryption
R Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, ...
O'Reilly & Associates, Inc, 1997
1871997
A study of privacy settings errors in an online social network
M Madejski, M Johnson, SM Bellovin
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
1832012
The system can't perform the operation now. Try again later.
Articles 1–20