2001 - Member of the National Academy of Engineering For contributions to network applications and security.
Steven M. Bellovin spends much of his time researching Computer security, Computer network, The Internet, Encryption and Internet privacy. His research combines Root name server and Computer security. Steven M. Bellovin combines subjects such as Internet Protocol and Denial-of-service attack with his study of Computer network.
The various areas that Steven M. Bellovin examines in his The Internet study include Internet security, SIMPLE and Network socket. His study looks at the intersection of Encryption and topics like Bloom filter with Construct, Censorship, Order and Anonymity. His Internet privacy research includes elements of Pseudonym, Identity and Access control.
Steven M. Bellovin mostly deals with Computer security, Computer network, The Internet, Internet privacy and Encryption. In his study, which falls under the umbrella issue of Computer security, Computer security model is strongly linked to Cloud computing security. The concepts of his Computer network study are interwoven with issues in Internet Protocol, Denial-of-service attack and Implementation.
His research integrates issues of Law and Law enforcement in his study of The Internet. Steven M. Bellovin mostly deals with Information privacy in his studies of Internet privacy. Steven M. Bellovin specializes in Cryptography, namely Cryptographic protocol.
His primary areas of investigation include Computer security, Internet privacy, The Internet, Law enforcement and Cryptography. He interconnects Software and Software deployment in the investigation of issues within Computer security. Many of his research projects under Internet privacy are closely connected to Set with Set, tying the diverse disciplines of science together.
His The Internet study incorporates themes from Law and Mandate. His biological study spans a wide range of topics, including Theoretical computer science, Cyber-security regulation, Focus and Arithmetic. His work deals with themes such as Key and Usability, which intersect with Encryption.
His main research concerns Law enforcement, The Internet, Computer security, Internet privacy and Mandate. His study in Law enforcement is interdisciplinary in nature, drawing from both Social network, Web service, Discriminative model and Personalization. His studies deal with areas such as Statutory law, Statute, Metadata and Third-party doctrine as well as The Internet.
Steven M. Bellovin has researched Computer security in several fields, including Software deployment and Specific-information. His Internet privacy research incorporates themes from Government, Enforcement, Key escrow and Social cost. His studies in Data Protection Act 1998 integrate themes in fields like Scalability, Database, Cryptography, Set and Authorization.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Encrypted key exchange: password-based protocols secure against dictionary attacks
S.M. Bellovin;M. Merritt.
ieee symposium on security and privacy (1992)
Encrypted key exchange: password-based protocols secure against dictionary attacks
S.M. Bellovin;M. Merritt.
ieee symposium on security and privacy (1992)
Firewalls and Internet Security: Repelling the Wily Hacker
William R. Cheswick;Steven M. Bellovin;Aviel D. Rubin.
(2003)
Firewalls and Internet Security: Repelling the Wily Hacker
William R. Cheswick;Steven M. Bellovin;Aviel D. Rubin.
(2003)
Security problems in the TCP/IP protocol suite
S. M. Bellovin.
acm special interest group on data communication (1989)
Security problems in the TCP/IP protocol suite
S. M. Bellovin.
acm special interest group on data communication (1989)
Controlling high bandwidth aggregates in the network
Ratul Mahajan;Steven M. Bellovin;Sally Floyd;John Ioannidis.
acm special interest group on data communication (2002)
Controlling high bandwidth aggregates in the network
Ratul Mahajan;Steven M. Bellovin;Sally Floyd;John Ioannidis.
acm special interest group on data communication (2002)
ICMP Traceback Messages
Tom Taylor;Marcus Leech;Steven Bellovin.
Internet Draft: draft-bellovin-itrace-00. txt (2003)
ICMP Traceback Messages
Tom Taylor;Marcus Leech;Steven Bellovin.
Internet Draft: draft-bellovin-itrace-00. txt (2003)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Georgia Institute of Technology
Google (United States)
Columbia University
University of British Columbia
AT&T (United States)
Boston University
Columbia University
Stanford University
Columbia University
Harvard University
Queen's University
University of Washington
Kyoto University
Oregon State University
Uppsala University
University of Florida
Newcastle University
Nanjing University
McMaster University
University of Erlangen-Nuremberg
Research Triangle Park Foundation
Emory University
University College London
Johns Hopkins University
University of Oslo
University College London