HAIL: a high-availability and integrity layer for cloud storage KD Bowers, A Juels, A Oprea Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 1457 | 2009 |
Proofs of retrievability: Theory and implementation KD Bowers, A Juels, A Oprea Proceedings of the 2009 ACM workshop on Cloud computing security, 43-54, 2009 | 834 | 2009 |
Detection of malicious web activity in enterprise computer networks AM Oprea, Z Li, R Norris, KD Bowers US Patent 9,838,407, 2017 | 322 | 2017 |
More for your money: exploiting performance heterogeneity in public clouds B Farley, A Juels, V Varadarajan, T Ristenpart, KD Bowers, MM Swift Proceedings of the Third ACM Symposium on Cloud Computing, 1-14, 2012 | 215 | 2012 |
How to tell if your cloud files are vulnerable to drive crashes KD Bowers, M van Dijk, A Juels, A Oprea, RL Rivest Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 133 | 2011 |
MADE: Security Analytics for Enterprise Threat Detection A Oprea, Z Li, R Norris, K Bowers Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 92 | 2018 |
A linear logic of authorization and knowledge D Garg, L Bauer, K Bowers, F Pfenning, M Reiter Proceedings of the 11th European conference on Research in Computer Security …, 2006 | 88 | 2006 |
Defending against the Unknown Enemy: Applying FlipIt to System Security KD Bowers, M Dijk, R Griffin, A Juels, A Oprea, RL Rivest, ... International Conference on Decision and Game Theory for Security, 248-263, 2012 | 86 | 2012 |
Exploring implicit memory for painless password recovery T Denning, K Bowers, M van Dijk, A Juels Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011 | 73 | 2011 |
Consumable credentials in logic-based access-control systems KD Bowers, L Bauer, D Garg, F Pfenning, MK Reiter Proceedings of the 14th Annual Network and Distributed System Security …, 2007 | 64* | 2007 |
Distributed storage system with efficient handling of file updates A Juels, KD Bowers, A Oprea US Patent 8,984,384, 2015 | 53 | 2015 |
Graph-based approach to deterring persistent security threats KD Bowers, ME Van Dijk, A Juels, AM Oprea, RL Rivest, N Triandopoulos US Patent 8,813,234, 2014 | 52 | 2014 |
Providing authentication codes which include token codes and biometric factors M van Dijk, KD Bowers, S Curry, SP Doyle, N Triandopoulos, R Zolfonoon US Patent 8,752,146, 2014 | 51 | 2014 |
Proof of retrievability for archived files A Juels, BS Kaliski Jr, KD Bowers, AM Oprea US Patent 8,984,363, 2015 | 49 | 2015 |
Distributed storage system with enhanced security KD Bowers, A Juels, A Oprea US Patent 8,132,073, 2012 | 49 | 2012 |
Efficient software implementations of large finite fields GF(2n) for secure storage applications J Luo, KD Bowers, A Oprea, L Xu ACM Transactions on Storage (TOS) 8 (1), 1-27, 2012 | 44 | 2012 |
PillarBox: Combating next-generation malware with fast forward-secure logging KD Bowers, C Hart, A Juels, N Triandopoulos International Workshop on Recent Advances in Intrusion Detection, 46-67, 2014 | 40 | 2014 |
Split-key based cryptography system for data protection and synchronization across multiple computing devices S Machani, B Kronrod, KD Bowers US Patent 10,516,527, 2019 | 38 | 2019 |
Managing user access with mobile device posture M Van Dijk, KD Bowers, S Curry, SP Doyle, E Kolman, N Triandopoulos, ... US Patent 8,819,769, 2014 | 33 | 2014 |
Proof of retrievability for archived files A Juels, BS Kaliski Jr, KD Bowers, AM Oprea US Patent 8,381,062, 2013 | 31 | 2013 |