Year |
Citation |
Score |
2020 |
Camp J, Henry R, Kohno T, Mare S, Myers S, Patel S, Streiff J. Toward a Secure Internet of Things: Directions for Research Ieee Security & Privacy. 18: 28-37. DOI: 10.1109/MSEC.2020.2970155 |
0.329 |
|
2018 |
Cobb C, Sudar S, Reiter N, Anderson R, Roesner F, Kohno T. Computer security for data collection technologies. Development Engineering. 3: 1-11. PMID 30555887 DOI: 10.1016/J.Deveng.2017.12.002 |
0.382 |
|
2016 |
Cleland-Huang J, Denning T, Kohno T, Shull F, Weber S. Keeping Ahead of Our Adversaries Ieee Software. 33: 24-28. DOI: 10.1109/Ms.2016.75 |
0.475 |
|
2014 |
Jung J, Kohno T. Workshop on usable privacy & security for wearable and domestic ubiquitous devices (UPSIDE) Ubicomp 2014 - Adjunct Proceedings of the 2014 Acm International Joint Conference On Pervasive and Ubiquitous Computing. 1279-1282. DOI: 10.1145/2638728.2641712 |
0.305 |
|
2014 |
Roesner F, Kohno TO, Molnar D. Security and privacy for augmented reality systems Communications of the Acm. 57: 88-96. DOI: 10.1145/2580723.2580730 |
0.382 |
|
2013 |
Denning T, Kohno T, Levy HM. Computer security and the modern home Communications of the Acm. 56: 94-103. DOI: 10.1145/2398356.2398377 |
0.313 |
|
2011 |
Zhu D(, Jung J, Song D, Kohno T, Wetherall D. TaintEraser Acm Sigops Operating Systems Review. 45: 142-154. DOI: 10.1145/1945023.1945039 |
0.317 |
|
2011 |
Afanasyev M, Kohno T, Ma J, Murphy N, Savage S, Snoeren AC, Voelker GM. Privacy-preserving network forensics Communications of the Acm. 54: 78-87. DOI: 10.1145/1941487.1941508 |
0.331 |
|
2010 |
Maisel WH, Kohno T. Improving the security and privacy of implantable medical devices. The New England Journal of Medicine. 362: 1164-6. PMID 20357279 DOI: 10.1056/Nejmp1000745 |
0.338 |
|
2009 |
Gardner RW, Bishop M, Kohno T. Are patched machines really fixed? Ieee Security and Privacy. 7: 82-85. DOI: 10.1109/MSP.2009.116 |
0.39 |
|
2008 |
Greenstein B, Kohno T, McCoy D, Seshan S, Pang J, Wetherall D. Improving wireless privacy with an identifier-free link layer protocol Mobisys'08 - Proceedings of the 6th International Conference On Mobile Systems, Applications, and Services. 40-53. DOI: 10.1145/1378600.1378607 |
0.371 |
|
2008 |
Kohno T. An interview with RFID security expert Ari Juels Ieee Pervasive Computing. 7: 10-11. DOI: 10.1109/Mprv.2008.4 |
0.343 |
|
2008 |
Halperin D, Kohno T, Heydt-Benjamin TS, Fu K, Maisel WH. Security and privacy for implantable medical devices Ieee Pervasive Computing. 7: 30-39. DOI: 10.1109/Mprv.2008.16 |
0.355 |
|
2008 |
Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions Journal of Cryptology. 21: 350-391. DOI: 10.1007/S00145-007-9006-6 |
0.619 |
|
2007 |
Kriplean T, Welbourne E, Khoussainova N, Rastogi V, Balazinska M, Borriello G, Kohno T, Suciu D. Physical access control for captured RFID data Ieee Pervasive Computing. 6: 48-55. DOI: 10.1109/Mprv.2007.81 |
0.365 |
|
2007 |
Kohno T. Protecting security and privacy Technology Review. 110. |
0.35 |
|
2006 |
Bellare M, Kohno T, Shoup V. Stateful public-key cryptosystems: How to encrypt with one 160-bit exponentiation Proceedings of the Acm Conference On Computer and Communications Security. 380-389. DOI: 10.1145/1180405.1180452 |
0.476 |
|
2004 |
Bellare M, Kohno T, Namprempre C. Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the encode-then-encrypt-and-MAC paradigm Acm Transactions On Information and System Security. 7: 206-241. DOI: 10.1145/996943.996945 |
0.575 |
|
2004 |
Iwata T, Kohno T. New security proofs for the 3GPP confidentiality and integrity algorithms Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3017: 427-445. |
0.35 |
|
2004 |
Kohno T. Attacking and repairing the WinZip encryption scheme Proceedings of the Acm Conference On Computer and Communications Security. 72-81. |
0.455 |
|
2002 |
Viega J, Bloch JT, Kohno T, McGraw G. Token-based scanning of source code for security problems Acm Transactions On Information and System Security. 5: 238-261. DOI: 10.1145/545186.545188 |
0.312 |
|
2001 |
Viega J, Kohno T, Potter B. Trust (and mistrust) in secure applications Communications of the Acm. 44: 31-36. DOI: 10.1145/359205.359223 |
0.471 |
|
Show low-probability matches. |