Author: Steven M. Bellovin

Publications

Publication period start: 2012
Number of co-authors: 9

Co-authors

Number of publications with favourite co-authors
Fred B. Schneider
2
Susan Landau
2
Matt Blaze
3

Productive Colleagues

Most productive colleagues in number of publications
Susan Landau
6
Serge Egelman
13
Peter G. Neumann
105

Publications

Bellovin, Steven M. (2008): The physical world and the real world. In Communications of the ACM, 51 (5) pp. 104. https://dl.acm.org/doi/10.1145/1342327.1342345

Bellovin, Steven M., Blaze, Matt, Diffie, Whitfield, Landau, Susan, Rexford, Jennifer, Neumann, Peter G. (2007): Internal surveillance, external risks. In Communications of the ACM, 50 (12) pp. 128. https://dl.acm.org/doi/10.1145/1323688.1323717

Bellovin, Steven M. (2006): Virtual machines, virtual security?. In Communications of the ACM, 49 (10) pp. 104. https://dl.acm.org/doi/10.1145/1164414

Bellovin, Steven M., Blaze, Matt, Landau, Susan (2005): The real national-security needs for VoIP. In Communications of the ACM, 48 (11) pp. 120. https://dl.acm.org/doi/10.1145/1096000.1096030

Bellovin, Steven M. (2004): Spamming, phishing, authentication, and privacy. In Communications of the ACM, 47 (12) pp. 144. https://dl.acm.org/doi/10.1145/1035134.1035159

Bellovin, Steven M. (2001): Computer security - an end state?. In Communications of the ACM, 44 (3) pp. 131-132. https://dl.acm.org/doi/10.1145/365181.365241

Blaze, Matt, Bellovin, Steven M. (2000): Tapping on my network door. In Communications of the ACM, 43 (10) pp. 136. https://dl.acm.org/doi/10.1145/352183.352213

Schneider, Fred B., Bellovin, Steven M., Inouye, Alan S. (1999): Building Trustworthy Systems: Lessons from the PTN and Internet. In IEEE Internet Computing, 3 (6) pp. 64-72.

Schneider, Fred B., Bellovin, Steven M. (1999): Evolving Telephone Networks. In Communications of the ACM, 42 (1) pp. 160. https://dl.acm.org/doi/10.1145/291469.291485

Johnson, Maritza, Egelman, Serge, Bellovin, Steven M. (2012): Facebook and privacy: it's complicated. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 9. https://dx.doi.org/10.1145/2335356.2335369