Crowds: Anonymity for web transactions MK Reiter, AD Rubin ACM transactions on information and system security (TISSEC) 1 (1), 66-92, 1998 | 3011 | 1998 |
Zerocoin: Anonymous distributed e-cash from bitcoin I Miers, C Garman, M Green, AD Rubin 2013 IEEE symposium on security and privacy, 397-411, 2013 | 1428 | 2013 |
The design and analysis of graphical passwords I Jermyn, A Mayer, F Monrose, MK Reiter, A Rubin 8th USENIX Security Symposium (USENIX Security 99), 1999 | 1205 | 1999 |
Keystroke dynamics as a biometric for authentication F Monrose, AD Rubin Future Generation computer systems 16 (4), 351-359, 2000 | 1129 | 2000 |
Analysis of an electronic voting system T Kohno, A Stubblefield, AD Rubin, DS Wallach IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 27-40, 2004 | 834 | 2004 |
Authentication via keystroke dynamics F Monrose, A Rubin Proceedings of the 4th ACM Conference on Computer and Communications …, 1997 | 752 | 1997 |
A framework for detection and measurement of phishing attacks S Garera, N Provos, M Chew, AD Rubin Proceedings of the 2007 ACM workshop on Recurring malcode, 1-8, 2007 | 722 | 2007 |
Charm: a framework for rapidly prototyping cryptosystems JA Akinyele, C Garman, I Miers, MW Pagano, M Rushanan, M Green, ... Journal of Cryptographic Engineering 3, 111-128, 2013 | 719 | 2013 |
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. A Stubblefield, J Ioannidis, AD Rubin NDSS, 2002 | 560 | 2002 |
Anonymous web transactions with crowds MK Reiter, AD Rubin Communications of the ACM 42 (2), 32-48, 1999 | 457 | 1999 |
Security Analysis of a Cryptographically-Enabled RFID Device. S Bono, M Green, A Stubblefield, A Juels, AD Rubin, M Szydlo USENIX Security Symposium 31, 1-16, 2005 | 423 | 2005 |
Publius: A robust, tamper-evident, censorship-resistant M Waldman, AD Rubin, LF Cranor web publishing system. In Proc. 9th USENIX Security Symposium, 2000 | 382* | 2000 |
Sok: Security and privacy in implantable medical devices and body area networks M Rushanan, AD Rubin, DF Kune, CM Swanson 2014 IEEE symposium on security and privacy, 524-539, 2014 | 366 | 2014 |
Method for the secure distribution of electronic files in a distributed environment AD Rubin US Patent 5,638,446, 1997 | 358 | 1997 |
Working around BGP: an incremental approach to improving security and accuracy in interdomain routing. G Goodell, W Aiello, T Griffin, J Ioannidis, PD McDaniel, AD Rubin NDSS 23, 156, 2003 | 354 | 2003 |
Risks of the passport single signon protocol DP Kormann, AD Rubin Computer networks 33 (1-6), 51-58, 2000 | 310 | 2000 |
Securing electronic medical records using attribute-based encryption on mobile devices JA Akinyele, MW Pagano, MD Green, CU Lehmann, ZNJ Peterson, ... Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011 | 296* | 2011 |
Off-line generation of limited-use credit card numbers A Rubin, R Wright US Patent App. 09/682,830, 2002 | 293 | 2002 |
A key recovery attack on the 802.11 b wired equivalent privacy protocol (WEP) A Stubblefield, J Ioannidis, AD Rubin ACM transactions on information and system security (TISSEC) 7 (2), 319-332, 2004 | 203 | 2004 |
Security considerations for remote electronic voting AD Rubin Communications of the ACM 45 (12), 39-44, 2002 | 203 | 2002 |