Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Crowds: anonymity for Web transactions
TLDR
The Design and Analysis of Graphical Passwords
- I. Jermyn, A. Mayer, F. Monrose, M. Reiter, A. Rubin
- Computer Science
- USENIX Security Symposium
- 23 August 1999
TLDR
Keystroke dynamics as a biometric for authentication
- F. Monrose, A. Rubin
- Computer Science
- Future Gener. Comput. Syst.
- 1 February 2000
TLDR
Zerocoin: Anonymous Distributed E-Cash from Bitcoin
- Ian Miers, Christina Garman, Matthew Green, A. Rubin
- Computer Science
- IEEE Symposium on Security and Privacy
- 19 May 2013
TLDR
A framework for detection and measurement of phishing attacks
- Sujata Garera, Niels Provos, M. Chew, A. Rubin
- Engineering
- WORM '07
- 2 November 2007
Phishing is form of identity theft that combines social engineering techniques and sophisticated attack vectors to harvest financial information from unsuspecting consumers. Often a phisher tries to… Expand
Authentication via keystroke dynamics
- F. Monrose, A. Rubin
- Computer Science
- CCS '97
- 1 April 1997
TLDR
Charm: a framework for rapidly prototyping cryptosystems
- Joseph A. Akinyele, Christina Garman, +4 authors A. Rubin
- Computer Science
- Journal of Cryptographic Engineering
- 7 March 2013
TLDR
Analysis of an electronic voting system
- T. Kohno, A. Stubblefield, A. Rubin, D. Wallach
- Computer Science
- IEEE Symposium on Security and Privacy…
- 9 May 2004
TLDR
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
- A. Stubblefield, J. Ioannidis, A. Rubin
- Computer Science
- NDSS
- 2002
TLDR
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing
- G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, A. Rubin
- Computer Science
- NDSS
- 2003
TLDR