Tom Berson's Professional Bibliography


REPRESENTATIVE PUBLICATIONS, PRESENTATIONS AND PATENTS

David Clark, Thomas Berson, and Herbert S. Lin, editors, At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues. The National Academies Press, Washington, DC, 2014.

Sensor with signature of data relating to sensor (with Bryan Olson, Michael E. Fein, Paul D. Mannheimer, Charles E. Porges, and David Schloemer) U.S. Patent 8,190,226, May, 2012.

Thomas A. Berson and Dorothy E. Denning, Eds., Special Issue on Cyberwarfare. IEEE Security & Privacy, September/October, 2011.

Special Issue on Cyberwarfare, Guest Editors' Introduction (with Dorothy Denning). IEEE Security & Privacy. September/October, 2011. pp. 13-15.

William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors, Committee on Offensive Information Warfare, National Research Council. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. The National Academies Press, Washington, DC, 2009.

Sensor with signature of data relating to sensor (with Bryan Olson, Michael E. Fein, Paul D. Mannheimer, Charles E. Porges, and David Schloemer) U.S. Patent 7,522,949, April, 2009.

[Invited Talk] Trust Issues in Cloud Computing. 5th International Conference on Security Practice and Experience (ISPEC 2009), Xi'an, China (2009).

System, method and article of manufacture for determining a price of cryptographic services based on a computational burden thereof (with R. Drews Dean, Matthew K. Franklin, Teresa F. Lunt, and Diana K. Smetters) U.S. Patent 7,421,583, September, 2008.

Systems and methods for non-interactive session key distribution with revocation (with Jessica N. Staddon, Matthew Franklin, Sara More, Michael Malkin, Ralph C. Merkle, and Dirk Balfanz) U.S. Patent 7,400,732, July, 2008.

Nested strong loader apparatus and method (with Roger R. Schell and Kevin W. Kingdon) U.S. Patent 7,383,442, June 2008.

System, method and article of manufacture for providing cryptographic services utilizing a network (with R. Drews Dean, Matthew K. Franklin, and Diana K. Smetters) U.S. Patent 7,051,199, May 2006.

Secure authentication of users via intermediate parties (with Stephen M. Rudy) U.S. Patent 7,003,668, February 2006.

System, method and article of manufacture for cryptoserver-based auction (with R. Drews Dean, Matthew K. Franklin, Teresa F. Lunt, and Diana K. Smetters) U.S. Patent 6,990,468, January 2006.

Systems and methods for forgery detection and deterrence of printed documents (with Teresa F. Lunt, Matthew K. Franklin, David L. Hecht, Mark J. Stefik, R. Drews Dean, Alan G. Bell, Thomas M. Breuel, Todd A. Cass, Douglas N. Curry, Daniel H. Greene, and Robert T. Krivacic) U.S. Patent 6,970,259, November 2005.

Skype Security Evaluation. ALR-2005-031, Anagram Laboratories, 2005.

System, method, and article of manufacture for a cryptographic key infrastructure for networked devices (with R. Drews Dean, Matthew K. Franklin, Teresa F. Lunt, and Diana K. Smetters) U.S. Patent 6,938,154, August 2005.

System for authenticating access to online content referenced in hardcopy documents (with Daniel H. Greene and R. Drews Dean) U.S. Patent 6,802,000, October 2004.

System, method and article of manufacture for transition state-based cryptography (with R. Drews Dean, Matthew K. Franklin, Teresa F. Lunt, and Diana K. Smetters) U.S. Patent 6,754,821, June 2004.

Apparatus for control of cryptography implementations in third party applications (with Roger R. Schell, Kevin W. Kingdon, and Robert R. Jeuneman) U.S. Patent 6,751,735, June 2004.

Sensor with signature of data relating to sensor (with Bryan Olsen, Michael Fein, Paul Mannheimer, Charles Porges, and David Schloemer) U.S. Patent 6,708,049, March 2004.

Method and apparatus for escrowing properties used for accessing executable modules (with Roger R. Schell, Kevin W. Kingdon, and Robert R. Jeuneman) U.S. Patent 6,701,433, March 2004.

Nested strong loader apparatus and method (with Roger R. Schell and Kevin W. Kingdon) U.S. Patent 6,532,451, March 2003.

Systems and methods for unforgeable document tagging (with Thomas Breuel) U.S. Patent 6,321,648, November 2001.

Cryptography Everywhere (IACR Distinguished Lecture). In T. Okamoto (Ed.), Advances in Cryptology -- Proceedings of Asiacrypt 2000, Lecture Notes in Computer Science, Vol. xxx, pages xx, Springer Verlag, 2000.

Elliptic Curve Pseudorandom Sequence Generators (with Guang Gong and Douglas R. Stinson). Workshop on Selected Areas in Cryptology, Kingston, Ontario, August 1999

Controlled Modular Cryptography Apparatus and Method (with Roger R. Schell and Kevin W. Kingdon) U.S. Patent 5,933,503, August 1999.

[Invited Talk] Sun Tzu in Cyberspace. U.S. Naval Postgraduate School, Monterey, CA (1998).

The Art of Information Warfare. (Book in preparation.)

[Invited Talk] Sun Tzu in Cyberspace. International Conference on Information and Communications Security, Chinese Academy of Sciences, Beijing (1997).

Failure of the McEliece Public-Key Cryptosystem under Message-Resend and Related-Message Conditions. In B. Kaliski (Ed.), Advances in Cryptology -- Proceedings of Crypto '97, Lecture Notes in Computer Science, Vol. 1294, pages 213-220, Springer Verlag, 1997.

Variable Security-Level Encryption (with Seppo Alanärä). U.S. Patent 5,594,797, January 1997.

HMOS: Her Majesty's Orthography Service (as "Sir Norman Bentbyte"). In Ross Anderson (Ed.), Information Hiding, First International Workshop, Lecture Notes in Computer Science, Vol. 1174, page 345, Springer Verlag, 1996

Truncated Differentials of SAFER K-64 (with Lars Knudsen). In D. Gollmann (Ed.), Fast Software Encryption, Lecture Notes in Computer Science, Vol. 1039, pages 15-25, Springer Verlag, 1996

Authentication Analysis: Algorithm and Protocols (with Harold Fredricksen and Catherine Meadows). For Cellular Telecommunications Industry Association. ALR-95010, Anagram Laboratories, 1995.

Cryptography at Novell: The Inside Story. ALR-94049, Anagram Laboratories, 1994.

Software Cryptography at Novell: Issues and Opportunities (with Roger R. Schell). ALR-94057, Anagram Laboratories, 1994.

Secure, Keyed, and Collisionful Hash Functions (with Li Gong and Mark Lomas). SRI-CSL-94-08, SRI International Computer Science Laboratory, Menlo Park, CA, 1994.

Differential Cryptanalysis mod 232 with Applications to MD5. In R. Rueppel (ed.) Advances in Cryptology -- Proceedings of Eurocrypt '92, Lecture Notes in Computer Science, Vol. 658, pages 71-80, Springer Verlag, 1992

Security Analysis of Cryptographic Protocols. Invitational Workshop on Mathematical Concepts of Dependable Systems, Oberwolfach, Germany, 1990.

Local Area Network Security, (editor, with T. Beth). Lecture Notes in Computer Science, Vol. 396, Springer Verlag, 1989.

Formalize and Mechanize Security Analysis of Cryptographic Protocols. Invitational Workshop on Future of Cryptography, Monte Verita, Switzerland, 1989.

Thinking About Computer Viruses: A research paper for the Office of the Auditor General of Canada. ALR-88108, Anagram Laboratories, 1988.

Data Security Letter (with T. Lunt). A newsletter published nine times per year to provide professionals with inside information and knowledgeable analysis of developments in computer and communications security. Publisher, 1988 - 1990.

Multilevel security for knowledge-based systems (with T. Lunt). Proceedings of the 1987 IEEE Symposium on Security and Privacy, pages 235-242, 1987.

Network component security issues. Proceedings of the DoD Computer Security Center Invitational Workshop on Network Security, pages 8-25 to 8-40, 1985.

Polonius: an identity authentication system (with R.J. Feiertag and R.M. Wong). Proceedings of the 1985 IEEE Symposium on Security and Privacy, pages 101-107, 1985.

Local network cryptosystem architecture: access control. In D. Chaum, editor, Advances in Cryptology -- Proceedings of Crypto '82, pages 251-258, Plenum Press, 1983.

Long-key variants of DES. In D. Chaum, editor, Advances in Cryptology -- Proceedings of Crypto '82, pages 311-313, Plenum Press, 1983.

A key distribution protocol using event markers (with R.K. Bauer and R.J. Feiertag). ACM Transactions on Computer Systems 1(3): 249-255, August 1983.

Processor-per-domain guard architecture (with R.K. Bauer and R.J. Feiertag). Proceedings of the 1983 IEEE Symposium on Security and Privacy, page 120, 1983.

Local network cryptosystem architecture (with R.K. Bauer). Proceedings of IEEE COMPCON, February 1982.

KSOS: development methodology for a secure operating system Proceedings of the 1979 NCC, pages 365-372, 1979.


[Home]