Building a high-performance, programmable secure coprocessor SW Smith, S Weingart Computer Networks 31 (8), 831-860, 1999 | 505 | 1999 |
Building the IBM 4758 secure coprocessor JG Dyer, M Lindemann, R Perez, R Sailer, L Van Doorn, SW Smith Computer 34 (10), 57-66, 2001 | 403 | 2001 |
Authenticated electronic coupon issuing and redemption CC Palmer, ER Palmer, SW Smith US Patent 6,505,773, 2003 | 249 | 2003 |
Trusted paths for browsers Z Ye, S Smith, D Anthony ACM Transactions on Information and System Security (TISSEC) 8 (2), 153-186, 2005 | 246 | 2005 |
Respiratory epithelial cell invasion by group B streptococci CE Rubens, S Smith, M Hulse, EY Chi, G Van Belle Infection and Immunity 60 (12), 5157-5163, 1992 | 217 | 1992 |
Securely downloading and executing code from mutually suspicious authorities SW Smith, SH Weingart US Patent 6,167,521, 2000 | 206 | 2000 |
Blacklistable anonymous credentials: blocking misbehaving users without TTPs PP Tsang, MH Au, A Kapadia, SW Smith Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 203 | 2007 |
Reputation and reliability in collective goods: The case of the online encyclopedia Wikipedia D Anthony, SW Smith, T Williamson Rationality and society 21 (3), 283-306, 2009 | 201 | 2009 |
Trusted computing platforms: design and applications SW Smith Springer, 2013 | 179 | 2013 |
Attribute-Based Publishing with Hidden Credentials and Hidden Policies. A Kapadia, PP Tsang, SW Smith NDSS 7, 179-192, 2007 | 179 | 2007 |
Adherence of group B streptococci to cultured epithelial cells: roles of environmental factors and bacterial surface components GS Tamura, JM Kuypers, S Smith, H Raff, CE Rubens Infection and immunity 62 (6), 2450-2458, 1994 | 174 | 1994 |
Using a high-performance, programmable secure coprocessor SW Smith, ER Palmer, S Weingart Financial Cryptography, 73-89, 1998 | 171 | 1998 |
Practical server privacy with secure coprocessors SW Smith, D Safford IBM Systems Journal 40 (3), 683-695, 2001 | 157 | 2001 |
Aggregated path authentication for efficient BGP security M Zhao, SW Smith, DM Nicol Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 148 | 2005 |
Smart cards in hostile environments H Gobioff, S Smith, JD Tygar, B Yee Carnegie-Mellon University. Department of Computer Science, 1995 | 132 | 1995 |
Explaining quality in internet collective goods: Zealots and good samaritans in the case of wikipedia D Anthony, SW Smith, T Williamson Hanover: Dartmouth College, 2005 | 123 | 2005 |
Transaction authentication over independent network SE Smith, TL Davis US Patent App. 12/288,660, 2009 | 120 | 2009 |
Nymble: Anonymous IP-address blocking PC Johnson, A Kapadia, PP Tsang, SW Smith Privacy Enhancing Technologies: 7th International Symposium, PET 2007 Ottawa …, 2007 | 120 | 2007 |
Nymble: Blocking misbehaving users in anonymizing networks PP Tsang, A Kapadia, C Cornelius, SW Smith IEEE Transactions on Dependable and Secure Computing 8 (2), 256-269, 2009 | 118 | 2009 |
Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear J Marchesini, S Smith, O Wild, R MacDonald | 118 | 2003 |