Steven Bellovin
Steven Bellovin
Professor of Computer Science, Columbia University
Verified email at
TitleCited byYear
Encrypted key exchange: Password-based protocols secure against dictionary attacks
SM Bellovin, M Merritt
Firewalls and Internet security: repelling the wily hacker
WR Cheswick, SM Bellovin, AD Rubin
Addison-Wesley Longman Publishing Co., Inc., 2003
Security problems in the TCP/IP protocol suite
SM Bellovin
ACM SIGCOMM Computer Communication Review 19 (2), 32-48, 1989
ICMP traceback messages
SM Bellovin, M Leech, T Taylor
Controlling high bandwidth aggregates in the network
R Mahajan, SM Bellovin, S Floyd, J Ioannidis, V Paxson, S Shenker
ACM SIGCOMM Computer Communication Review 32 (3), 62-73, 2002
Implementing pushback: Router-based defense against DDoS attacks
J Ioannidis, SM Bellovin
Implementing a distributed firewall
S Ioannidis, AD Keromytis, SM Bellovin, JM Smith
Proceedings of the 7th ACM conference on Computer and communications …, 2000
Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise
SM Bellovin, M Merritt
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
Limitations of the Kerberos authentication system
SM Bellovin, M Merritt
ACM SIGCOMM Computer Communication Review 20 (5), 119-132, 1990
Distributed firewalls
SM Bellovin
login 24 (5), 37-47, 1999
Controlling high-bandwidth flows at the congested router
R Mahajan, S Floyd, D Wetherall
Proceedings Ninth International Conference on Network Protocols. ICNP 2001 …, 2001
Computer science handbook
AB Tucker
CRC press, 2004
Network firewalls
SM Bellovin, WR Cheswick
IEEE communications magazine 32 (9), 50-57, 1994
A technique for counting NATted hosts
SM Bellovin
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, 267-272, 2002
Problem Areas for the IP Security Protocols.
SM Bellovin
USENIX Security Symposium, 205-214, 1996
Facebook and privacy: it's complicated
M Johnson, S Egelman, SM Bellovin
Proceedings of the eighth symposium on usable privacy and security, 1-15, 2012
Cryptographic protocol for secure communications
SM Bellovin, M Merritt
US Patent 5,241,599, 1993
Using the Domain Name System for System Break-ins.
SM Bellovin
USENIX Security Symposium, 1995
The risks of key recovery, key escrow, and trusted third-party encryption
R Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, ...
O'Reilly & Associates, Inc, 1997
A study of privacy settings errors in an online social network
M Madejski, M Johnson, SM Bellovin
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20