Tadayoshi Kohno, Ph.D. - Publications

Affiliations: 
2006 University of California, San Diego, La Jolla, CA 
Area:
Computer Science

22 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Camp J, Henry R, Kohno T, Mare S, Myers S, Patel S, Streiff J. Toward a Secure Internet of Things: Directions for Research Ieee Security & Privacy. 18: 28-37. DOI: 10.1109/MSEC.2020.2970155  0.329
2018 Cobb C, Sudar S, Reiter N, Anderson R, Roesner F, Kohno T. Computer security for data collection technologies. Development Engineering. 3: 1-11. PMID 30555887 DOI: 10.1016/J.Deveng.2017.12.002  0.382
2016 Cleland-Huang J, Denning T, Kohno T, Shull F, Weber S. Keeping Ahead of Our Adversaries Ieee Software. 33: 24-28. DOI: 10.1109/Ms.2016.75  0.475
2014 Jung J, Kohno T. Workshop on usable privacy & security for wearable and domestic ubiquitous devices (UPSIDE) Ubicomp 2014 - Adjunct Proceedings of the 2014 Acm International Joint Conference On Pervasive and Ubiquitous Computing. 1279-1282. DOI: 10.1145/2638728.2641712  0.305
2014 Roesner F, Kohno TO, Molnar D. Security and privacy for augmented reality systems Communications of the Acm. 57: 88-96. DOI: 10.1145/2580723.2580730  0.382
2013 Denning T, Kohno T, Levy HM. Computer security and the modern home Communications of the Acm. 56: 94-103. DOI: 10.1145/2398356.2398377  0.313
2011 Zhu D(, Jung J, Song D, Kohno T, Wetherall D. TaintEraser Acm Sigops Operating Systems Review. 45: 142-154. DOI: 10.1145/1945023.1945039  0.317
2011 Afanasyev M, Kohno T, Ma J, Murphy N, Savage S, Snoeren AC, Voelker GM. Privacy-preserving network forensics Communications of the Acm. 54: 78-87. DOI: 10.1145/1941487.1941508  0.331
2010 Maisel WH, Kohno T. Improving the security and privacy of implantable medical devices. The New England Journal of Medicine. 362: 1164-6. PMID 20357279 DOI: 10.1056/Nejmp1000745  0.338
2009 Gardner RW, Bishop M, Kohno T. Are patched machines really fixed? Ieee Security and Privacy. 7: 82-85. DOI: 10.1109/MSP.2009.116  0.39
2008 Greenstein B, Kohno T, McCoy D, Seshan S, Pang J, Wetherall D. Improving wireless privacy with an identifier-free link layer protocol Mobisys'08 - Proceedings of the 6th International Conference On Mobile Systems, Applications, and Services. 40-53. DOI: 10.1145/1378600.1378607  0.371
2008 Kohno T. An interview with RFID security expert Ari Juels Ieee Pervasive Computing. 7: 10-11. DOI: 10.1109/Mprv.2008.4  0.343
2008 Halperin D, Kohno T, Heydt-Benjamin TS, Fu K, Maisel WH. Security and privacy for implantable medical devices Ieee Pervasive Computing. 7: 30-39. DOI: 10.1109/Mprv.2008.16  0.355
2008 Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions Journal of Cryptology. 21: 350-391. DOI: 10.1007/S00145-007-9006-6  0.619
2007 Kriplean T, Welbourne E, Khoussainova N, Rastogi V, Balazinska M, Borriello G, Kohno T, Suciu D. Physical access control for captured RFID data Ieee Pervasive Computing. 6: 48-55. DOI: 10.1109/Mprv.2007.81  0.365
2007 Kohno T. Protecting security and privacy Technology Review. 110.  0.35
2006 Bellare M, Kohno T, Shoup V. Stateful public-key cryptosystems: How to encrypt with one 160-bit exponentiation Proceedings of the Acm Conference On Computer and Communications Security. 380-389. DOI: 10.1145/1180405.1180452  0.476
2004 Bellare M, Kohno T, Namprempre C. Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the encode-then-encrypt-and-MAC paradigm Acm Transactions On Information and System Security. 7: 206-241. DOI: 10.1145/996943.996945  0.575
2004 Iwata T, Kohno T. New security proofs for the 3GPP confidentiality and integrity algorithms Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3017: 427-445.  0.35
2004 Kohno T. Attacking and repairing the WinZip encryption scheme Proceedings of the Acm Conference On Computer and Communications Security. 72-81.  0.455
2002 Viega J, Bloch JT, Kohno T, McGraw G. Token-based scanning of source code for security problems Acm Transactions On Information and System Security. 5: 238-261. DOI: 10.1145/545186.545188  0.312
2001 Viega J, Kohno T, Potter B. Trust (and mistrust) in secure applications Communications of the Acm. 44: 31-36. DOI: 10.1145/359205.359223  0.471
Show low-probability matches.