What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Eugene H. Spafford
Google Scholar
38
publications in security and cryptology related venues
Year
Venue
Title
2019
journals/compsec
Editorial.
Eugene H. Spafford
2018
journals/compsec
Reactive redundancy for data destruction protection (R2D2).
Christopher N. Gutierrez
Eugene H. Spafford
Saurabh Bagchi
Thomas Yurek
2018
conf/sec
A Hypergame Analysis for ErsatzPasswords.
Christopher N. Gutierrez
Mohammed H. Almeshekah
Saurabh Bagchi
Eugene H. Spafford
2017
conf/sec
Ghost Patches: Fake Patches for Fake Vulnerabilities.
Jeffrey Avery
Eugene H. Spafford
2015
conf/sec
Enhancing Passwords Security Using Deceptive Covert Communication.
Mohammed H. Almeshekah
Mikhail J. Atallah
Eugene H. Spafford
2015
conf/acsac
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage.
Mohammed H. Almeshekah
Christopher N. Gutierrez
Mikhail J. Atallah
Eugene H. Spafford
2014
journals/compsec
Editorial.
Eugene H. Spafford
2014
conf/nspw
Planning and Integrating Deception into Computer Security Defenses.
Mohammed H. Almeshekah
Eugene H. Spafford
2013
journals/compsec
Editorial.
Eugene H. Spafford
2012
journals/compsec
Editorial.
Eugene H. Spafford
2012
journals/compsec
Editorial.
Eugene H. Spafford
2012
journals/compsec
Editorial.
Eugene H. Spafford
2012
journals/compsec
Editorial.
Eugene H. Spafford
2011
journals/compsec
Editorial for 30/8.
Eugene H. Spafford
2011
journals/compsec
Editorial.
Eugene H. Spafford
2011
journals/compsec
Security, technology, publishing, and ethics (part II).
Eugene H. Spafford
2011
journals/compsec
Editorial.
Eugene H. Spafford
2011
journals/compsec
Editorial.
Eugene H. Spafford
2010
journals/compsec
Security, technology, publishing, and ethics (Part I).
Eugene H. Spafford
2010
journals/compsec
Editorial.
Eugene H. Spafford
2010
journals/compsec
Editorial.
Eugene H. Spafford
2009
journals/compsec
A distributed requirements management framework for legal compliance and accountability.
Travis D. Breaux
Annie I. Antón
Eugene H. Spafford
2007
journals/compsec
Run-time label propagation for forensic audit data.
Florian P. Buchholz
Eugene H. Spafford
2005
conf/sp
Efficient Intrusion Detection using Automaton Inlining.
Rajeev Gopalakrishna
Eugene H. Spafford
Jan Vitek
2005
conf/dsn
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment.
Bingrui Foo
Yu-Sung Wu
Yu-Chun Mao
Saurabh Bagchi
Eugene H. Spafford
2003
conf/acsac
A Failure to Learn from the Past.
Eugene H. Spafford
2003
conf/acsac
Poly2 Paradigm: A Secure Network Service Architecture.
Eric Bryant
James P. Early
Rajeev Gopalakrishna
Gregory Roth
Eugene H. Spafford
Keith Watson
Paul Williams
Scott Yost
2000
conf/nspw
Network traffic tracking systems: folly in the large?
Thomas E. Daniels
Eugene H. Spafford
2000
conf/acsac
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux.
Thomas E. Daniels
Eugene H. Spafford
1998
conf/acsac
An Architecture for Intrusion Detection Using Autonomous Agents.
J. S. Balasubramaniyan
J. O. Garcia-Fernandez
D. Isacoff
Eugene H. Spafford
Diego Zamboni
1997
journals/compsec
Authorship analysis: identifying the author of a program.
Ivan Krsul
Eugene H. Spafford
1997
conf/sp
Analysis of a Denial of Service Attack on TCP.
Christoph L. Schuba
Ivan Krsul
Markus G. Kuhn
Eugene H. Spafford
Aurobindo Sundaram
Diego Zamboni
1997
conf/ndss
Misplaced Trust: Kerberos 4 Session Keys.
Bryn Dole
Steven W. Lodin
Eugene H. Spafford
1997
conf/acsac
A Reference Model for Firewall Technology.
Christoph L. Schuba
Eugene H. Spafford
1994
conf/ccs
The Design and Implementation of Tripwire: A File System Integrity Checker.
Gene H. Kim
Eugene H. Spafford
1993
journals/compsec
Software forensics: Can we track code to its authors?
Eugene H. Spafford
Stephen A. Weeber
1992
journals/compsec
OPUS: Preventing weak password choices.
Eugene H. Spafford
1992
conf/acsac
A generic virus scanner for C++.
Sandeep Kumar
Eugene H. Spafford
Coauthors
Annie I. Antón
(1)
Aurobindo Sundaram
(1)
Bingrui Foo
(1)
Bryn Dole
(1)
Christoph L. Schuba
(2)
Christopher N. Gutierrez
(3)
D. Isacoff
(1)
Diego Zamboni
(2)
Eric Bryant
(1)
Eugene H. Spafford
(38)
Florian P. Buchholz
(1)
Gene H. Kim
(1)
Gregory Roth
(1)
Ivan Krsul
(2)
J. O. Garcia-Fernandez
(1)
J. S. Balasubramaniyan
(1)
James P. Early
(1)
Jan Vitek
(1)
Jeffrey Avery
(1)
Keith Watson
(1)
Markus G. Kuhn
(1)
Mikhail J. Atallah
(2)
Mohammed H. Almeshekah
(4)
Paul Williams
(1)
Rajeev Gopalakrishna
(2)
Sandeep Kumar
(1)
Saurabh Bagchi
(3)
Scott Yost
(1)
Stephen A. Weeber
(1)
Steven W. Lodin
(1)
Thomas E. Daniels
(2)
Thomas Yurek
(1)
Travis D. Breaux
(1)
Yu-Chun Mao
(1)
Yu-Sung Wu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to