Seguir
Kevin D. Bowers
Kevin D. Bowers
RSA Laboratories
Dirección de correo verificada de rsa.com
Título
Citado por
Citado por
Año
HAIL: a high-availability and integrity layer for cloud storage
KD Bowers, A Juels, A Oprea
Proceedings of the 16th ACM conference on Computer and communications …, 2009
14572009
Proofs of retrievability: Theory and implementation
KD Bowers, A Juels, A Oprea
Proceedings of the 2009 ACM workshop on Cloud computing security, 43-54, 2009
8342009
Detection of malicious web activity in enterprise computer networks
AM Oprea, Z Li, R Norris, KD Bowers
US Patent 9,838,407, 2017
3222017
More for your money: exploiting performance heterogeneity in public clouds
B Farley, A Juels, V Varadarajan, T Ristenpart, KD Bowers, MM Swift
Proceedings of the Third ACM Symposium on Cloud Computing, 1-14, 2012
2152012
How to tell if your cloud files are vulnerable to drive crashes
KD Bowers, M van Dijk, A Juels, A Oprea, RL Rivest
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1332011
MADE: Security Analytics for Enterprise Threat Detection
A Oprea, Z Li, R Norris, K Bowers
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
922018
A linear logic of authorization and knowledge
D Garg, L Bauer, K Bowers, F Pfenning, M Reiter
Proceedings of the 11th European conference on Research in Computer Security …, 2006
882006
Defending against the Unknown Enemy: Applying FlipIt to System Security
KD Bowers, M Dijk, R Griffin, A Juels, A Oprea, RL Rivest, ...
International Conference on Decision and Game Theory for Security, 248-263, 2012
862012
Exploring implicit memory for painless password recovery
T Denning, K Bowers, M van Dijk, A Juels
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
732011
Consumable credentials in logic-based access-control systems
KD Bowers, L Bauer, D Garg, F Pfenning, MK Reiter
Proceedings of the 14th Annual Network and Distributed System Security …, 2007
64*2007
Distributed storage system with efficient handling of file updates
A Juels, KD Bowers, A Oprea
US Patent 8,984,384, 2015
532015
Graph-based approach to deterring persistent security threats
KD Bowers, ME Van Dijk, A Juels, AM Oprea, RL Rivest, N Triandopoulos
US Patent 8,813,234, 2014
522014
Providing authentication codes which include token codes and biometric factors
M van Dijk, KD Bowers, S Curry, SP Doyle, N Triandopoulos, R Zolfonoon
US Patent 8,752,146, 2014
512014
Proof of retrievability for archived files
A Juels, BS Kaliski Jr, KD Bowers, AM Oprea
US Patent 8,984,363, 2015
492015
Distributed storage system with enhanced security
KD Bowers, A Juels, A Oprea
US Patent 8,132,073, 2012
492012
Efficient software implementations of large finite fields GF(2n) for secure storage applications
J Luo, KD Bowers, A Oprea, L Xu
ACM Transactions on Storage (TOS) 8 (1), 1-27, 2012
442012
PillarBox: Combating next-generation malware with fast forward-secure logging
KD Bowers, C Hart, A Juels, N Triandopoulos
International Workshop on Recent Advances in Intrusion Detection, 46-67, 2014
402014
Split-key based cryptography system for data protection and synchronization across multiple computing devices
S Machani, B Kronrod, KD Bowers
US Patent 10,516,527, 2019
382019
Managing user access with mobile device posture
M Van Dijk, KD Bowers, S Curry, SP Doyle, E Kolman, N Triandopoulos, ...
US Patent 8,819,769, 2014
332014
Proof of retrievability for archived files
A Juels, BS Kaliski Jr, KD Bowers, AM Oprea
US Patent 8,381,062, 2013
312013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20