Sean Smith
Sean Smith
Professor of Computer Science, Dartmouth College
Verified email at - Homepage
Cited by
Cited by
Building a high-performance, programmable secure coprocessor
SW Smith, S Weingart
Computer Networks 31 (8), 831-860, 1999
Building the IBM 4758 secure coprocessor
JG Dyer, M Lindemann, R Perez, R Sailer, L Van Doorn, SW Smith
Computer 34 (10), 57-66, 2001
Trusted paths for browsers
Z Ye, S Smith, D Anthony
ACM Transactions on Information and System Security (TISSEC) 8 (2), 153-186, 2005
Authenticated electronic coupon issuing and redemption
CC Palmer, ER Palmer, SW Smith
US Patent 6,505,773, 2003
Respiratory epithelial cell invasion by group B streptococci
CE Rubens, S Smith, M Hulse, EY Chi, G Van Belle
Infection and Immunity 60 (12), 5157-5163, 1992
Securely downloading and executing code from mutually suspicious authorities
SW Smith, SH Weingart
US Patent 6,167,521, 2000
Blacklistable anonymous credentials: blocking misbehaving users without TTPs
PP Tsang, MH Au, A Kapadia, SW Smith
Proceedings of the 14th ACM conference on Computer and communications …, 2007
Reputation and reliability in collective goods: The case of the online encyclopedia Wikipedia
D Anthony, SW Smith, T Williamson
Rationality and society 21 (3), 283-306, 2009
Trusted computing platforms: design and applications
SW Smith
Springer, 2013
Adherence of group B streptococci to cultured epithelial cells: roles of environmental factors and bacterial surface components
GS Tamura, JM Kuypers, S Smith, H Raff, CE Rubens
Infection and immunity 62 (6), 2450-2458, 1994
Attribute-Based Publishing with Hidden Credentials and Hidden Policies.
A Kapadia, PP Tsang, SW Smith
NDSS 7, 179-192, 2007
Using a high-performance, programmable secure coprocessor
SW Smith, ER Palmer, S Weingart
International Conference on Financial Cryptography, 73-89, 1998
Practical server privacy with secure coprocessors
SW Smith, D Safford
IBM Systems Journal 40 (3), 683-695, 2001
Aggregated path authentication for efficient BGP security
M Zhao, SW Smith, DM Nicol
Proceedings of the 12th ACM conference on Computer and communications …, 2005
Smart cards in hostile environments
H Gobioff, S Smith, JD Tygar, B Yee
Carnegie-Mellon University. Department of Computer Science, 1995
Explaining quality in internet collective goods: Zealots and good samaritans in the case of wikipedia
D Anthony, SW Smith, T Williamson
Hanover: Dartmouth College, 2005
Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear
J Marchesini, S Smith, O Wild, R MacDonald
Transaction authentication over independent network
SE Smith, TL Davis
US Patent App. 12/288,660, 2009
Nymble: Anonymous IP-address blocking
PC Johnson, A Kapadia, PP Tsang, SW Smith
International Workshop on Privacy Enhancing Technologies, 113-133, 2007
Protecting client privacy with trusted computing at the server
A Iliev, SW Smith
IEEE Security & Privacy 3 (2), 20-28, 2005
The system can't perform the operation now. Try again later.
Articles 1–20