Cryptographic Protocols and Network Security

Spensky, C., Stewart, J., Yerukhimovich, A., Shay, R., Trachtenberg, A., Housley, R., Cunningham, R., SoK: Privacy on Mobile Devices – It’s Complicated, Proceedings on Privacy Enhancing Technology (PETS), Volume 3, p. 96-116, 2016.
(Full Paper)

Itkis, G., Kaiser, B. H., Coll, J. E., Smith, W. W., Cunningham, R. K., Charting a Security Landscape in the Clouds: Data Protection and Collaboration in Cloud Storage, Technical Report 1210, MIT Lincoln Laboratory, Lexington, MA, July 2016.
(Report)

Roche, D. S., Apon, D., Choi, S. G., Yerukhimovich, A., POPE: Partial Order Preserving Encoding, ACM Conference on Computer and Communications Security (CCS), p. 1131-1142, Oct 2016.
(Full Paper)

Hamlin, A., Schear, N., Shen, E., Varia, M., Yakoubov, S., Yerukhimovich, A., Cryptography for Big Data Security, Chapter in Big Data: Storage, Sharing, and Security, Fei Hu (editor), Auerbach Publications, May 3, 2016.
(Book Chapter)

Itkis, G., Chandar, V., Fuller, B., Campbell, J., Cunningham, R., Iris Biometric Security Challenges and Possible Solutions: For your eyes only – Using the iris as a key, Signal Processing Magazine, IEEE , vol. 32, no. 5, p. 42-53, Sep 2015.
(Article)

Fuller, B., Hamlin, A., Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy, Information Theoretic Security, Lecture Notes in Computer Science, vol. 9063, p. 69-86, May 2015.
(Full Paper)

Shen, E., Varia, M., Cunningham, R. K., Vesey, W. K., Cryptographically Secure Computation, IEEE Computer, vol. 48, no. 4, pp. 78-81, April 2015.
(Article)

Gordon, S. D., Katz, J., Kumaresan, R., Yerukhimovich, A., Authenticated broadcast with a partially compromised public-key infrastructure, Information and Computation, Volume 234, p. 17-25, 2014.
(Journal Article)

Kepner, J., Gadepally, V., Michaleas, P., Schear, N., Varia, M., Yerukhimovich, A., Computing on masked data: a high performance method for improving big data veracity, High Performance Extreme Computing Conference (HPEC), p. 1-6, 2014.
(Full Paper)

Choi, S.G., Katz, J., Schröder, D., Yerukhimovich, A., Zhou H.S., (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens, Theory of Cryptography (TCC) 2014, San Diego, CA, February 24, 2014.
(Full Paper)

Choi, S.G., Katz, J., Schröder, D., Yerukhimovich, A., Zhou H.S., Impossibility of Blind Signatures from One-Way Permutations, Theory of Cryptography (TCC) 2014, San Diego, CA, February 24, 2014.
(Full Paper)

Fuller, B., Meng, X., Reyzin, L., Computational Fuzzy Extractors, Advances in Cryptology, ASIACRYPT 2013, p. 174-193, December 2013.
(Full Paper)

Prout, A., Arcand, W., Bestor, D., Byun, C., Bergeron, W., Hubbell, M., Kepner, J., McCabe, A., Michaleas, P., Mullen, J., Reuther, A., Rosa, A., Scalable Cryptographic Authentication for High Performance Computing, HPEC 2012 Conference, Waltham, MA, September 2012.
(Full Paper)

Pickard, G., Khazan, R., Fuller, B., Cooley, J., DSKE: Dynamic Set Key Encryption, 7th LCN Workshop on Security in Communications Networks, 2012.
(Full Paper)

Fuller, B. W., O'Neill, A., Reyzin, L., A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy, Theory of Cryptography 2012, Taormina, Italy, March 21, 2012.
(Full Paper)

Blumenthal, U., Haines, J., Streilein, W., O'Leary, J., Information Security for Situational Awareness, chapter of the book Situational Awareness for Computer Network Defense, IGI Global, January 31, 2012.

Khazan, R., Herzog, J., Petcher, A., Utin, D., O'Melia, S., A Comprehensive Key Management Architecture for Small Unmanned Aircraft Systems, in Military Communications Conference (MILCOM), Classified Track, 2011.

Yuditskaya, S., O'Melia, S., Herzog, J., Khazan, R., Usable Identity Management for Tactical Devices, in Military Communications Conference (MILCOM), Classified Track, 2011.

Herzog, J., Khazan, R., Use of Static-Static Elliptic Curve Diffie-Hellman Key Agreement in Cryptographic Message Syntax, IETF Request for Comments Standard (RFC #6278), 2011.
(Full paper)

Petcher, A., Khazan, R., Utin, D., A usable interface for location-based access control and Over-The-Air Keying in tactical environments, Military Communications Conference (MILCOM), Baltimore, MD, November 2011.
(Full Paper)

O'Melia, S., Khazan, R., and Utin, D., Efficient Transmission of DoD PKI Certificates in Tactical Networks, Military Communications Conference (MILCOM), Baltimore, MD, November 2011.
(Full Paper)

Fuller, B., Reyzin, L., Computational Entropy and Information Leakage, BU CS Thesis, Boston, MA, Boston University, January 7 2011.
(Full Paper)

Cooley, J. A., Khazan, R. I., McVeety, S., Secure channel establishment in disadvantaged networks : Optimizing TLS using intercepting proxies, Military Communications Conference (MILCOM), 31 Oct–3 Nov 2010.
(Full Paper)

Fuller, B. W., Khazan, R. I., Cooley, J. A., Pickard, G. E., Utin, D., ASE: Authenticated Statement Exchange, IEEE Network Computing and Applications 2010, Cambridge, Massachusetts, June 15, 2010.
(Full Paper)

Cooley, J. A., Khazan, R. I., Fuller, B. W., Pickard, G.E., GROK: A Practical System for Securing Group Communications, IEEE Network Computing and Applications 2010, Cambridge, Massachusetts, June 15, 2010.
(Full Paper)

Okano, S., Khazan, R., Fuller, B., Cooley, J., Optimizing Secure Communication Standards for Disadvantaged Networks, MIT EECS Thesis, Cambridge, MA, Aug. 31, 2009.
(Full Paper)

McVeety, S., Khazan, R., Cooley, J., Secure Channel Establishment in Disadvantaged Networks: TLS Optimization Using Intercepting Proxies, MIT EECS Thesis, Cambridge, MA, Aug. 18, 2009.
(Full Paper)

Maddi, S., McLain, C. D., Cunningham, R. K., Lippmann, R. P., IPsec with Two Encryption Zones and its Security Benefits to Disadvantaged Networks, MILCOM 2008, San Diego, CA. Nov. 17-19, 2008.
(Abstract)

Khazan, R., Cooley, J. A., Pickard, G. E., Fuller, B., GROK Secure Multi-User Chat at Red Flag 2007-03, MILCOM 2008, San Diego, CA. Nov. 17-19, 2008.
(Full Paper)

Studer, A. McLain, C. D., Lippmann, R. P., Tuning Intrusion Detection to Work With a Two Encryption Key Version of IPSEC, MILCOM 2007, Orlando, FL. Oct. 29-31, 2007.
(Full Paper)

Wu, B. C., Khazan, R. I., An Identity and Certificate Manager, Department of Electrical Engineering and Computer Science MIT, Massachusetts Institute of Technology, Cambridge, MA. September 4, 2007.
(Full Paper)

Kannan, S. K., Khazan, R. I., Cooley, J., Securing Voice Over IP Conferencing with Decentralized Group Encryption, Department of EE and Computer Science Massachusetts Institute of Technology, Cambridge, MA. September 4, 2007.
(Full Paper)

McLain, C. D., Studer, A., Lippmann, R. P., Making Network Intrusion Detection Work with IPSEC, MIT Lincoln Laboratory Technical Report 1121, Lexington, MA. March 9, 2007.
(Full Paper)

Khazan, R., Figueriredo, R., McLain, C., Cunningham, R., Securing Communication of Dynamic Groups in Dynamic Network-Centric Environments, MILCOM 2006, Washington, DC, 23 October 2006.
(Full Paper)

Schechter, S., Ozment, A., Bootstrapping the Adoption of Internet Security Protocols, 5th Workshop Economics of Information Security, Cambridge, England, 26 June 2006.
(Full Paper)

Khazan, R., McLain, C., Cunningham, R., Securing Communication of Dynamic Groups in Dynamic Network-Centric Environments, Tactical Networking Workshop, MIT Lincoln Laboratory, 14 June 2006.
(Full Paper)

Schechter, S., McLain, C., Stockwell, W., Inoculating SSH Against Address Harvesting Network and Distributed System Security (NDSS), San Diego, CA, 2 February 2006.
(Full Paper)

Khazan, R., Yuditskaya, S., A Wide Area Network Simulation of Single-Round Group Membership Algorithms. IEEE NCA, Cambridge, Massachusetts, 27–29 July 2005.
(Full Paper)

Khazan, R., Yuditskaya, S. Using Leader-Based Communication to Improve the Scalability of Single-Round Group Membership Algorithms, 10th Annual Workshop on Dependable Parallel, Distributed and Network-Centric Systems (DPDNS) 2005.
(Full Paper)

Khazan, R. I., Lewandowski, S. M., Weinstein, C. J., Goulet, S. A., Rak, S. J., Ramanan, P., Parks, T. M., Hamler, M. C., Robust Collaborative Multicast Service for Airborne Command and Control Environment, MILCOM 2004, November 2004.
(Full Paper)

Khazan, R. I., Group Membership: A Novel Approach and the First Single-Round Algorithm, 23rd ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC), Canada, pp. 347–356, July 2004.
(Full Paper)

Epstein, B., Weinstein, C. J., Cunningham, R. K., System Adaptation as a Trust Response in Tactical Ad Hoc Networks, Proceedings MILCOM 2003, pp. 209–214, October 2003.
(Full Paper)

Parks, T. M., Weinstein, C. J., Information Survivability for Mobile Wireless Systems, Lincoln Laboratory Journal, Vol. 12, No. 1, pp. 65–80. 2000.
(Abstract)

Parks, T. M., Kassay, D. A., and Weinstein, C. J., Security Implications of Adaptive Multimedia Distribution, ICC'99 Proceedings, June 1999.
(Full Paper)

Parks, T. M., Kassay, D. A., and Weinstein, C. J., Vulnerabilities of Reliable Multicast Protocols, MILCOM'98 Proceedings, October 1998.
(Full Paper)

Sthanu, S. R., Parks, T. M., Lerman, S. R., Survivability Through Dynamic Reconfiguration, Advanced Telecommunications and Information Distribution Research Program Conference, February 1998.
(Full Paper) (Postscript File)

top of page