What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Drew Dean
Google Scholar
14
publications in security and cryptology related venues
Year
Venue
Title
2005
conf/fc
A Chat at the Old Phishin' Hole.
Richard Clayton
Drew Dean
Markus Jakobsson
Steven A. Myers
Stuart G. Stubblebine
Michael Szydlo
2004
conf/uss
Fixing Races for Fun and Profit: How to Use access(2).
Drew Dean
Alan J. Hu
2004
conf/ndss
Model Checking One Million Lines of C Code.
Hao Chen
Drew Dean
David A. Wagner
2002
conf/uss
Setuid Demystified.
Hao Chen
David A. Wagner
Drew Dean
2002
conf/sp
Self-Healing Key Distribution with Revocation.
Jessica Staddon
Sara K. Miner
Matthew K. Franklin
Dirk Balfanz
Michael Malkin
Drew Dean
2001
conf/uss
Reading Between the Lines: Lessons from the SDMI Challenge.
Scott Craver
Min Wu
Bede Liu
Adam Stubblefield
Ben Swartzlander
Dan S. Wallach
Drew Dean
Edward W. Felten
2001
conf/uss
Using Client Puzzles to Protect TLS.
Drew Dean
Adam Stubblefield
2001
conf/sp
Intrusion Detection via Static Analysis.
David A. Wagner
Drew Dean
2001
conf/ndss
Cryptology As a Network Service.
Tom Berson
Drew Dean
Matthew K. Franklin
Diana K. Smetters
Mike Spreitzer
2001
conf/ndss
An Algebraic Approach to IP Traceback.
Drew Dean
Matthew K. Franklin
Adam Stubblefield
2000
conf/sp
A Security Infrastructure for Distributed Java Applications.
Dirk Balfanz
Drew Dean
Mike Spreitzer
1997
conf/ccs
The Security of Static Typing with Dynamic Linking.
Drew Dean
1997
conf/sp
Ensuring Assurance in Mobile Computing.
Marvin Schaefer
Sylvan Pinsky
Drew Dean
Li Gong
Jim Roskind
Barbara Fox
1996
conf/sp
Java Security: From HotJava to Netscape and Beyond.
Drew Dean
Edward W. Felten
Dan S. Wallach
Coauthors
Adam Stubblefield
(3)
Alan J. Hu
(1)
Barbara Fox
(1)
Bede Liu
(1)
Ben Swartzlander
(1)
Dan S. Wallach
(2)
David A. Wagner
(3)
Diana K. Smetters
(1)
Dirk Balfanz
(2)
Drew Dean
(14)
Edward W. Felten
(2)
Hao Chen
(2)
Jessica Staddon
(1)
Jim Roskind
(1)
Li Gong
(1)
Markus Jakobsson
(1)
Marvin Schaefer
(1)
Matthew K. Franklin
(3)
Michael Malkin
(1)
Michael Szydlo
(1)
Mike Spreitzer
(2)
Min Wu
(1)
Richard Clayton
(1)
Sara K. Miner
(1)
Scott Craver
(1)
Steven A. Myers
(1)
Stuart G. Stubblebine
(1)
Sylvan Pinsky
(1)
Tom Berson
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to