Stephen Kent
American computer scientist and Internet pioneer
Stephen Kent 's AcademicInfluence.com Rankings

Download Badge
Computer Science
Stephen Kent 's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Mathematics University of California, Berkeley
Similar Degrees You Can Earn
Why Is Stephen Kent Influential?
(Suggest an Edit or Addition)According to Wikipedia, Stephen Thomas Kent is an American computer scientist, noted for his contributions to network security. Kent was born in New Orleans, Louisiana. In 1969 he graduated from Ridgewood Preparatory School in Metairie, Louisiana, and in 1973 from Loyola University New Orleans with a B.S. degree in mathematics. From 1973 to 1974 he attended Tulane University as graduate student in mathematics, then moved to the Massachusetts Institute of Technology as a graduate student in computer science from 1974 to 1980. He received his master's degree from MIT in 1976, and his PhD in 1980.
Stephen Kent 's Published Works
Published Works
- Hash-based IP traceback (2001) (920)
- IP Authentication Header (1995) (822)
- Secure Border Gateway Protocol (S-BGP) (2000) (689)
- Single-packet IP traceback (2002) (512)
- Security Mechanisms in High-Level Network Protocols (1983) (350)
- An Infrastructure to Support Secure Internet Routing (2012) (243)
- Secure Border Gateway Protocol (Secure-BGP) (2000) (187)
- Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management (1989) (183)
- Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues (2000) (170)
- Privacy enhancement for Internet electronic mail: Part II - certificate-based key management (1987) (160)
- Internet Privacy Enhanced Mail (1993) (125)
- Security Architecture for the Internet Protocol (1998) (96)
- Protecting externally supplied software in small computers (1981) (73)
- A Profile for Route Origin Authorizations (ROAs) (2012) (70)
- X.509 Extensions for IP Addresses and AS Identifiers (2004) (70)
- The NULL Encryption Algorithm and Its Use With IPsec (1998) (70)
- On the trail of intrusions into information systems (2000) (63)
- Hardware support for a hash-based IP traceback (2001) (62)
- Additional Diffie-Hellman Groups for Use with IETF Standards (2008) (62)
- Securing the Border Gateway Protocol: A Status Update (2003) (44)
- Securing the Nimrod routing architecture (1997) (39)
- A public-key based secure mobile IP (1997) (37)
- ENCRYPTION-BASED PROTECTION PROTOCOLS FOR INTERACTIVE USER-COMPUTER COMMUNICATION (1976) (33)
- Security in high-level network protocols (1985) (33)
- U.S. Department of Defense Security Options for the Internet Protocol (1991) (33)
- A public‐key based secure Mobile IP (1999) (32)
- SKIPJACK review: interim report (1995) (32)
- Encryption-based protection for interactive user/computer communication (1977) (28)
- Security Requirements and Protocols for a Broadcast Scenario (1981) (26)
- IDs -- Not That Easy: Questions About Nationwide Identity Systems (2002) (23)
- Signed Object Template for the Resource Public Key Infrastructure (RPKI) (2012) (22)
- Manifests for the Resource Public Key Infrastructure (RPKI) (2012) (22)
- Traceable Anonymous Certificate (2009) (19)
- Certificate Policy (CP) for the Resource Public Key Infrastructure (RPKI) (2012) (19)
- Certification Authority (CA) Key Rollover in the Resource Public Key Infrastructure (RPKI) (2012) (17)
- Comments on “security problems in the TCP/IP protocol suite” (1989) (17)
- Extended Sequence Number (ESN) Addendum to IPsec Domain of Interpretation (DOI) for Internet Security Association and Key Management Protocol (ISAKMP) (2005) (17)
- IP Authentication Header (AH) (2013) (17)
- Security Mechanisms in a Transport Layer Protocol (1984) (16)
- Resource Public Key Infrastructure (RPKI) Trust Anchor Locator (2019) (14)
- Crypto policy perspectives (1994) (13)
- Resource Public Key Infrastructure (RPKI) Objects Issued by IANA (2012) (13)
- Threat Model for BGP Path Security (2014) (11)
- Algorithm Agility Procedure for the Resource Public Key Infrastructure (RPKI) (2013) (10)
- Resource Certification - A Public Key Infrastructure for IP Addresses and AS's (2009) (8)
- Securing the Border Gateway Protocol (2000) (8)
- An Infrastructure Supporting Secure Internet Routing (2006) (8)
- A Strategic Plan for Deploying an Internet X.500 Directory Service (1993) (7)
- Rethinking PKI: What's Trust Got to Do with It? (2002) (6)
- Further Key Words for Use in RFCs to Indicate Requirement Levels (2013) (4)
- Protocol Design Considerations for Network Security (1979) (3)
- A Profile for BGPsec Router Certificates, Certificate Revocation Lists, and Certification Requests (2017) (3)
- Local Trust Anchor Management for the Resource Public Key Infrastructure (2013) (3)
- Internet security standards: past, present, and future (1994) (3)
- Adverse Actions by a Certification Authority (CA) or Repository Manager in the Resource Public Key Infrastructure (RPKI) (2017) (3)
- Template for a Certification Practice Statement (CPS) for the Resource PKI (RPKI) (2015) (3)
- Technical correspondence: on secure personal computing (1980) (2)
- Cryptography in public: a brief history (1995) (2)
- Additional Methods for Generating Key Identifiers Values (2013) (2)
- Information Assurance and the Transition to IP Version 6 (IPv6) (2007) (2)
- Opportunistic Security as a Countermeasure to Pervasive Monitoring (2014) (1)
- CA Key Rollover in the RPKI (2012) (1)
- Network security: then and now or 20 years in 10 minutes (1999) (1)
- Ipsec Working Group (2001) (1)
- Ipsec Working Group (2001) (1)
- Some Cryptographic Techniques for File Protection (1981) (1)
- INFOSEC Research Council (IRC) (2005) (0)
- RFC 8374 - BGPsec Design Choices (2018) (0)
- Secure Border Gateway Protocol and the External Routing Intrusion Detection System (2000) (0)
- Etag: "2f5425-c219-3438f5ac" Accept-ranges: Bytes Content-length: 49689 Connection: Close Content-type: Text/plain Network Working Group (1997) (0)
- R&D Challenges: Notes from the "Trust in Cyberspace" Report (1999) (0)
- Key Escrow Cryptosystems (1995) (0)
- Utility works in the highway--can we do it better? (2016) (0)
- Ranges : bytes Content-Length : 54053 Connection : close Content-Type : text / plain ^ L Network Working Group (0)
- Template for an Internet Service Provider's Certification Practice Statement (CPS) for the Resource PKI (RPKI) (2010) (0)
- Correction to the Special Section on Computer Network Security of the June 1981 Issue (1981) (0)
- Etag: "2f5429-c219-3434d684" Accept-ranges: Bytes Content-length: 49689 Connection: Close Content-type: Text/plain Network Working Group (1997) (0)
- Transitioning Secure Border Gateway Protocol (S-BGP) Into the Internet (2004) (0)
- Template for an Internet Registry's Certification Practice Statement (CPS) for the Resource PKI (RPKI) (2010) (0)
- Cryptography (From Julius Caesar Through Public Key Cryptosystems) (1995) (0)
- Independent Submission Additional Methods for Generating Key Identifiers Values (0)
- Geosciences research institute and summer workshop for Earth science teachers (2005) (0)
- HEP Science Network Requirements--Final Report (2010) (0)
- Opportunistic Keying as a Countermeasure to Pervasive Monitoring (0)
- Resource Certificate PKI (RPKI) Trust Anchor Locator (2014) (0)
- Correction to "Security Requirements and Protocols for a Broadcast Scenario" (1981) (0)
- Requirements for Resource Public Key Infrastructure (RPKI) Relying Parties (2020) (0)
This paper list is powered by the following services:
Other Resources About Stephen Kent
What Schools Are Affiliated With Stephen Kent ?
Stephen Kent is affiliated with the following schools: