Full Publication List
Full Publication List:
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea and Ronald L. Rivest. How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011), To appear, October 2011. Full version available at: http://eprint.iacr.org/2010/214.
Jianqiang Luo, Kevin D. Bowers, Alina Oprea, and Lihao Xu. Efficient Implementations of Large Finite Fields GF(2n) for Secure Storage Applications.ACM Transactions on Storage. To appear.
Tamara Denning, Kevin D. Bowers, Marten van Dijk, and Ari Juels. Exploring Implicit Memory for Painless Password Recovery. In Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems (CHI '11), pages 2615-2618, May 2011.
Kevin D. Bowers, Ari Juels, and Alina Oprea. HAIL: A High-Availability and Integrity Layer for Cloud Storage. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), pages 187-198, November 2009. Full version available at: http://eprint.iacr.org/2008/489.
Kevin D. Bowers, Ari Juels, and Alina Oprea. Proofs of Retrievability: Theory and Implementation. In Proceedings of the ACM Cloud Computing Security Workshop (CCSW 2009), pages 43-53, November 2009. Full version available at: http://eprint.iacr.org/2008/175.
Alina Oprea and Kevin D. Bowers. Authentic Time-Stamps for Archival Storage. In Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009). Full version available at http://eprint.iacr.org/2009/306.
Kevin D. Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning, and Michael K. Reiter. Consumable Credentials in Logic-Based Access-Control Systems. In Proceedings of the 2007 Network and Distributed Systems Security Symposium, pages 143-157, February 2007.
Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, and Michael K. Reiter. A Linear Logic of Authorization and Knowledge. In Computer Security - ESORICS 2006: 11th European Symposium on Research in Computer Security, volume 4189 of Lecture Notes in Computer Science, pages 297-312, September 2006.
Jeremiah J. Harmsen, Kevin D. Bowers, and William A. Pearlman. Fast Additive Noise Steganalysis. In Proceedings of the SPIE International Society for Optical Engineering, volume 5306 - Security, Steganography, and Watermarking of Multimedia Contents VI, pages 489-495, January 2004.
Kevin D. Bowers, Kevin Mills, and Scott Rose. Self-adaptive Leasing for Jini. In Pervasive Computing and Communications, 2003 (PerCom '03): Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, pages 539-542. March 2003.