Avi Rubin
#23,741
Most Influential Person Now
American scientist
Avi Rubin's AcademicInfluence.com Rankings
Avi Rubincomputer-science Degrees
Computer Science
#1453
World Rank
#1503
Historical Rank
#716
USA Rank
Network Security
#9
World Rank
#9
Historical Rank
#3
USA Rank
Database
#7266
World Rank
#7518
Historical Rank
#873
USA Rank
Download Badge
Computer Science
Why Is Avi Rubin Influential?
(Suggest an Edit or Addition)According to Wikipedia, Aviel David "Avi" Rubin is an expert in systems and networking security. He is a graduate of the University of Michigan and Professor of Computer Science at Johns Hopkins University, Technical Director of the Information Security Institute at Johns Hopkins, Director of ACCURATE, and President and co-founder of Independent Security Evaluators. In 2002, he was elected to the Board of Directors of the USENIX Association for a two-year term.
Avi Rubin's Published Works
Published Works
- Crowds: anonymity for Web transactions (1998) (2130)
- The Design and Analysis of Graphical Passwords (1999) (979)
- Zerocoin: Anonymous Distributed E-Cash from Bitcoin (2013) (871)
- Keystroke dynamics as a biometric for authentication (2000) (778)
- Analysis of an electronic voting system (2004) (611)
- Authentication via keystroke dynamics (1997) (545)
- Charm: a framework for rapidly prototyping cryptosystems (2013) (491)
- A framework for detection and measurement of phishing attacks (2007) (485)
- Using the Fluhrer, Mantin, and Shamir Attack to Break WEP (2002) (455)
- Publius: a robust, tamper-evident, censorship-resistant web publishing system (2000) (363)
- Security Analysis of a Cryptographically-Enabled RFID Device (2005) (324)
- Anonymous Web transactions with Crowds (1999) (317)
- Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing (2003) (250)
- SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks (2014) (220)
- Risks of the Passport single signon protocol (2000) (216)
- Securing electronic medical records using attribute-based encryption on mobile devices (2011) (162)
- Security considerations for remote electronic voting (2002) (162)
- A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP) (2004) (147)
- Analyzing internet voting security (2004) (131)
- Self-Protecting Electronic Medical Records Using Attribute-Based Encryption (2010) (109)
- Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System (2000) (109)
- Distributed Execution with Remote Audit (1999) (106)
- Session Key Distribution Using Smart Cards (1996) (98)
- Independent One-Time Passwords (1995) (88)
- Web Security Sourcebook (1997) (85)
- A survey of Web security (1998) (82)
- Formal Methods for the Analysis of Authentication Protocols (1993) (80)
- Security Considerations for Remote Electronic Voting over the Internet (2001) (79)
- Secure deletion for a versioning file system (2005) (78)
- A Response to ''Can We Eliminate Certificate Revocation Lists?'' (2000) (64)
- Mobile Code Security (1998) (60)
- Blocking Java applets at the firewall (1997) (55)
- Off-Line Generation of Limited-Use Credit Card Numbers (2002) (53)
- Nonmonotonic cryptographic protocols (1994) (52)
- Defending against an Internet-based attack on the physical world (2002) (48)
- Detecting Code Alteration by Creating a Temporary Memory Bottleneck (2009) (42)
- Security for mobile and cloud frontiers in healthcare (2015) (41)
- Building systems that flexibly control downloaded executable context (1996) (37)
- Efficient Memory Bound Puzzles Using Pattern Databases (2006) (34)
- Trusted distribution of software over the Internet (1995) (31)
- The Business of Electronic Voting (2002) (30)
- Coercion Resistant End-to-end Voting (2009) (29)
- On the Difficulty of Validating Voting Machine Software with Software (2007) (27)
- Defending against an Internet-based attack on the physical world (2004) (22)
- Managing the Performance Impact of Web Security (2005) (22)
- Securing medical records on smart phones (2009) (21)
- Web security (2005) (21)
- Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity (2014) (20)
- White-Hat Security Arsenal: Tackling the Threats (2001) (20)
- Anonymity in Wireless Broadcast Networks (2009) (19)
- Evaluation of voting systems (2004) (19)
- WAR: Wireless Anonymous Routing (2003) (18)
- An independent audit framework for software dependent voting systems (2007) (18)
- Security through legality (2006) (16)
- The architecture of robust publishing systems (2001) (16)
- Secure Remote Access to an Internal Web Server (1999) (15)
- Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing (2006) (14)
- WIRELESS NETWORKING SECURITY (2003) (13)
- An Experience Teaching a Graduate Course in Cryptography (1997) (11)
- Long Running Jobs in an Authenticated Environment (1993) (11)
- Exploiting Multi-Vendor Vulnerabilities as Back-Doors to Counter the Threat of Rogue Small Unmanned Aerial Systems (2018) (10)
- Applications of Secure Location Sensing in Healthcare (2016) (9)
- Brave New Ballot: The Battle to Safeguard Democracy in the Age of Electronic Voting (2006) (9)
- MalloryWorker: Stealthy Computation and Covert Channels Using Web Workers (2016) (9)
- Meteor: Cryptographically Secure Steganography for Realistic Distributions (2021) (9)
- Enforcing Minimum Necessary Access in Healthcare Through Integrated Audit and Access Control (2013) (8)
- Protocols for anonymity in wireless networks (2003) (7)
- Extending NCP for protocols using public keys (1995) (7)
- Preserving integrity in remote file location and retrieval (1996) (7)
- Guest Editors' Introduction: E-Voting Security (2004) (6)
- Using smartcards to secure a personalized gambling device (1999) (5)
- Secure Distribution of Electronic Documents in a Hostile Environment (1995) (5)
- Defending Against Consumer Drone Privacy Attacks: A Blueprint for a Counter Autonomous Drone Tool (2020) (4)
- Guest Editors' Introduction: Securing the High-Speed Internet (2004) (4)
- New Research Results for Electronic Voting (2008) (3)
- Revocation of Unread E-mail in an Untrusted Network (1997) (3)
- Connected Home Automated Security Monitor (CHASM): Protecting IoT Through Application of Machine Learning (2020) (2)
- Trusted Distribution of Software over the Internet Appeared in the Internet Society 1995 Symposium on Network and Distributed System Security (1995) (2)
- Guest editorial: special issue on electronic voting (2009) (2)
- A Black Box Approach to Inferring, Characterizing, and Breaking Native Device Tracking Autonomy (2020) (2)
- A Center for Correct , Usable , Reliable , Auditable , and Transparent Elections ( ACCURATE ) (2005) (2)
- A Research Roadmap for Healthcare IT Security Inspired by the PCAST Health Information Technology Report (2011) (2)
- Don’t Drink the Cyber: Extrapolating the Possibilities of Oldsmar’s Water Treatment Cyberattack (2022) (2)
- Protecting Patient Records from Unwarranted Access (2009) (2)
- Outsourcing Medical Dataset Analysis: A Possible Solution (2017) (2)
- An Extensive Assessment of a Proposed Internet-based Voting System (2004) (2)
- Response: Independent One-Time Passwords (1996) (1)
- Designing for Audit: A Voting Machine with a Tiny TCB (2010) (1)
- Tattle Tail Security: An Intrusion Detection System for Medical Body Area Networks (MBAN) (2019) (1)
- Protecting Against Privacy Compromise and Ballot Stuffing by Eliminating NonDeterminism from End-to-end Voting Schemes (2008) (1)
- Privacy Violating Opensource Intelligence Threat Evaluation Framework: A Security Assessment Framework For Critical Infrastructure Owners (2020) (1)
- Wavelet Selection and Employment for Side-Channel Disassembly (2021) (1)
- Vis-à-vis Cryptography: Private and Trustworthy In-Person Certifications (2012) (1)
- Location-Independent Data/Software Integrity Protocol (1995) (1)
- Classifying Network Protocol Implementation Versions: An OpenSSL Case Study (2013) (1)
- Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems (2018) (1)
- A Containerization-Based Backfit Approach for Industrial Control System Resiliency (2021) (1)
- A FIRST DESIGN OF PHASE II OF DART (1990) (1)
- Measuring and Mitigating Bias in AI-Chatbots (2022) (1)
- Taking two-factor to the next level: protecting online poker, banking, healthcare and other applications (2014) (0)
- Charm: a framework for rapidly prototyping cryptosystems (2013) (0)
- A Practical Implementation of a Multi-Device Split Application for Protecting Online Poker (2016) (0)
- Network Working Group Location-independent Data/software Integrity Protocol (1995) (0)
- A Voice Assistant for IoT Cybersecurity (2021) (0)
- Trusted Virtualization-Based Programmable Logic Controller Resilience Using a Backfit Approach (2022) (0)
- FINDINGS OF AN INDEPENDENT PANEL ON ALLEGATIONS OF STATISTICAL EVIDENCE FOR FRAUD DURING THE 2004 VENEZUELAN PRESIDENTIAL RECALL REFERENDUM 13 (2020) (0)
- Cybersecurity as a Tic-Tac-Toe Game Using Autonomous Forwards (Attacking) And Backwards (Defending) Penetration Testing in a Cyber Adversarial Artificial Intelligence System (2022) (0)
- WAR: Wireless Anonymous Routing. Commentary. Authors' reply (2005) (0)
- From Conversations to Stories: An Analysis of Differences Between Oral and Written Language Comprehension (1977) (0)
- Cerias Tech Report 2006-73 a Scheme for Privacy-preserving Data Dissemination a Scheme for Privacy-preserving Data Dissemination (2003) (0)
- ACCURATE Principal Investigators (2008) (0)
- Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks (2020) (0)
- Implementation Issues for Electronic Commerce: What Every Developer Should Know (1997) (0)
- STEM Outreach Activity with Fitbit Wearable Devices (2018) (0)
- Explainable Autonomic Cybersecurity For Industrial Control Systems (2023) (0)
- Panel: The Security Of Downloadable Past, Present And Future (1997) (0)
- Security for E-Voting in Public Elections (2001) (0)
- Collaborative Global Impact Cloud Computing Risk Assessment Framework (2021) (0)
- A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the Edge (2020) (0)
- Configuration and Collection Factors for Side-Channel Disassembly (2022) (0)
- Cost-Effective Mission Assurance Engineering Through Simulation (2021) (0)
- New techniques to defend against computer security attacks (2009) (0)
- A SURVEY OF SOME EXISTING IVHS SYSTEMS, THEIR FUNCTIONALITY, AND HOW THEY ARE ACHIEVED (1991) (0)
- Panel: The security of downloadable executable content: past, present and future (1999) (0)
- Securing Wireless and Mobile Networks - Is It Possible? (2002) (0)
- Triaging Autonomous Drone Faults By Simultaneously Assuring Autonomy and Security (2021) (0)
- Bio-Inspired, Host-based Firewall (2020) (0)
- CALL FOR PAPERS IEEE Transactions on Information Forensics and Security: Special Issue on Electronic Voting (2009) (0)
- Mission Assurance for Autonomous Undersea Vehicles (2020) (0)
This paper list is powered by the following services:
Other Resources About Avi Rubin
What Schools Are Affiliated With Avi Rubin?
Avi Rubin is affiliated with the following schools: