Len Sassaman
#23,168
Most Influential Person Now
US computer systems engineer
Len Sassaman's AcademicInfluence.com Rankings
Len Sassamancomputer-science Degrees
Computer Science
#1765
World Rank
#1829
Historical Rank
#841
USA Rank
Database
#2755
World Rank
#2879
Historical Rank
#563
USA Rank
Download Badge
Computer Science
Why Is Len Sassaman Influential?
(Suggest an Edit or Addition)According to Wikipedia, Leonard Harris Sassaman was an American technologist, information privacy advocate, and the maintainer of the Mixmaster anonymous remailer code and operator of the randseed remailer. Much of his career gravitated towards cryptography and protocol development.
Len Sassaman's Published Works
Published Works
- Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation (2011) (93)
- The pynchon gate: a secure method of pseudonymous mail retrieval (2005) (76)
- PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure (2010) (64)
- Security Applications of Formal Language Theory (2013) (62)
- Heartbeat traffic to counter (n-1) attacks: red-green-black mixes (2003) (56)
- Comparison Between Two Practical Mix Designs (2004) (55)
- The Halting Problems of Network Stack Insecurity (2011) (36)
- A Patch for Postel's Robustness Principle (2012) (17)
- How to Bypass Two Anonymity Revocation Schemes (2008) (10)
- The Promise of Privacy (2002) (6)
- The Byzantine Postman Problem A Trivial Attack Against PIR-based Nym Servers (2007) (6)
- Attacks on Anonymity Systems: Theory and Practice (2003) (5)
- Ethical Guidelines for Computer Security Researchers: "Be Reasonable" (2010) (5)
- Exploiting the Forest with Trees (2010) (4)
- The Faithless Endpoint How Tor puts certain users at greater risk (2007) (4)
- Solving the Byzantine Postman Problem (2007) (3)
- Echolot and Leuchtfeuer Measuring the Reliability of Unreliable Mixes (2006) (2)
- Subliminal Channels in the Private Information Retrieval Protocols (2014) (2)
- Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model (2008) (2)
- Towards a Theory of Computer Insecurity: a Formal Language-Theoretic Approach (2011) (1)
- Toward an Information Theoretic Secure Anonymous Communication Service The Pynchon Gate Pseudonymous Mail System (2007) (1)
- The rise of Distributed, Decentralized, Amateur/Citizen Science and Do It Yourself Biology: Safety and Security Concerns (2010) (1)
- A Secure Method of Pseudonymous Mail Retrieval (2005) (1)
- Panel: Experiences Deploying Anonymous Communication Systems (2003) (0)
- Breaking Web Security: Practical Attacks on X.509 (2009) (0)
- The Byzantine Postman Problem (2008) (0)
- Panel: How can Independent Researchers be adequately compensated for the valuable service they provide to vendors and customers while encouraging responsible reporting? (2003) (0)
- Towards a Code of Ethics for Computer Security Research (2010) (0)
- Panel: Future Anonymity Systems (2005) (0)
- Exploiting Computational Slack in Protocol Grammars (2010) (0)
- Behind the Remailers: The Operators and Developers of Anonymity Services (2003) (0)
This paper list is powered by the following services:
Other Resources About Len Sassaman
What Schools Are Affiliated With Len Sassaman?
Len Sassaman is affiliated with the following schools: