Cryptographic Protocols and Network Security

Pickard, G., Khazan, R., Fuller, B., Cooley, J., DSKE: Dynamic Set Key Encryption, 7th LCN Workshop on Security in Communications Networks, 2012.
(Full Paper)

Fuller, B. W., O'Neill, A., Reyzin, L., A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy, Theory of Cryptography 2012, Taormina, Italy, March 21, 2012.
(Full Paper)

Blumenthal, U., Haines, J., Streilein, W., O'Leary, J., Information Security for Situational Awareness, chapter of the book Situational Awareness for Computer Network Defense, IGI Global, January 31, 2012.

Khazan, R., Herzog, J., Petcher, A., Utin, D., O'Melia, S., A Comprehensive Key Management Architecture for Small Unmanned Aircraft Systems, in Military Communications Conference (MILCOM), Classified Track, 2011.

Yuditskaya, S., O'Melia, S., Herzog, J., Khazan, R., Usable Identity Management for Tactical Devices, in Military Communications Conference (MILCOM), Classified Track, 2011.

Herzog, J., Khazan, R., Use of Static-Static Elliptic Curve Diffie-Hellman Key Agreement in Cryptographic Message Syntax, IETF Request for Comments Standard (RFC #6278), 2011.
(Full paper)

Petcher, A., Khazan, R., Utin, D., A usable interface for location-based access control and Over-The-Air Keying in tactical environments, Military Communications Conference (MILCOM), Baltimore, MD, November 2011.
(Full Paper)

O'Melia, S., Khazan, R., and Utin, D., Efficient Transmission of DoD PKI Certificates in Tactical Networks, Military Communications Conference (MILCOM), Baltimore, MD, November 2011.
(Full Paper)

Cooley, J. A., Khazan, R. I., McVeety, S., Secure channel establishment in disadvantaged networks : Optimizing TLS using intercepting proxies, Military Communications Conference (MILCOM), 31 Oct–3 Nov 2010.
(Full Paper)

Fuller, B. W., Khazan, R. I., Cooley, J. A., Pickard, G. E., Utin, D., ASE: Authenticated Statement Exchange, IEEE Network Computing and Applications 2010, Cambridge, Massachusetts, June 15, 2010.
(Full Paper)

Cooley, J. A., Khazan, R. I., Fuller, B. W., Pickard, G.E., GROK: A Practical System for Securing Group Communications, IEEE Network Computing and Applications 2010, Cambridge, Massachusetts, June 15, 2010.
(Full Paper)

Okano, S., Khazan, R., Fuller, B., Cooley, J., Optimizing Secure Communication Standards for Disadvantaged Networks, MIT EECS Thesis, Cambridge, MA, Aug. 31, 2009.
(Full Paper)

McVeety, S., Khazan, R., Cooley, J., Secure Channel Establishment in Disadvantaged Networks: TLS Optimization Using Intercepting Proxies, MIT EECS Thesis, Cambridge, MA, Aug. 18, 2009.
(Full Paper)

Maddi, S., McLain, C. D., Cunningham, R. K., Lippmann, R. P., IPsec with Two Encryption Zones and its Security Benefits to Disadvantaged Networks, MILCOM 2008, San Diego, CA. Nov. 17-19, 2008.
(Abstract)

Khazan, R., Cooley, J. A., Pickard, G. E., Fuller, B., GROK Secure Multi-User Chat at Red Flag 2007-03, MILCOM 2008, San Diego, CA. Nov. 17-19, 2008.
(Full Paper)

Studer, A. McLain, C. D., Lippmann, R. P., Tuning Intrusion Detection to Work With a Two Encryption Key Version of IPSEC, MILCOM 2007, Orlando, FL. Oct. 29-31, 2007.
(Full Paper)

Wu, B. C., Khazan, R. I., An Identity and Certificate Manager, Department of Electrical Engineering and Computer Science MIT, Massachusetts Institute of Technology, Cambridge, MA. September 4, 2007.
(Full Paper)

Kannan, S. K., Khazan, R. I., Cooley, J., Securing Voice Over IP Conferencing with Decentralized Group Encryption, Department of EE and Computer Science Massachusetts Institute of Technology, Cambridge, MA. September 4, 2007.
(Full Paper)

McLain, C. D., Studer, A., Lippmann, R. P., Making Network Intrusion Detection Work with IPSEC, MIT Lincoln Laboratory Technical Report 1121, Lexington, MA. March 9, 2007.
(Full Paper)

Khazan, R., Figueriredo, R., McLain, C., Cunningham, R., Securing Communication of Dynamic Groups in Dynamic Network-Centric Environments, MILCOM 2006, Washington, DC, 23 October 2006.
(Full Paper)

Schechter, S., Ozment, A., Bootstrapping the Adoption of Internet Security Protocols, 5th Workshop Economics of Information Security, Cambridge, England, 26 June 2006.
(Full Paper)

Khazan, R., McLain, C., Cunningham, R., Securing Communication of Dynamic Groups in Dynamic Network-Centric Environments, Tactical Networking Workshop, MIT Lincoln Laboratory, 14 June 2006.
(Full Paper)

Schechter, S., McLain, C., Stockwell, W., Inoculating SSH Against Address Harvesting Network and Distributed System Security (NDSS), San Diego, CA, 2 February 2006.
(Full Paper)

Khazan, R., Yuditskaya, S., A Wide Area Network Simulation of Single-Round Group Membership Algorithms. IEEE NCA, Cambridge, Massachusetts, 27–29 July 2005.
(Full Paper)

Khazan, R., Yuditskaya, S. Using Leader-Based Communication to Improve the Scalability of Single-Round Group Membership Algorithms, 10th Annual Workshop on Dependable Parallel, Distributed and Network-Centric Systems (DPDNS) 2005.
(Full Paper)

Khazan, R. I., Lewandowski, S. M., Weinstein, C. J., Goulet, S. A., Rak, S. J., Ramanan, P., Parks, T. M., Hamler, M. C., Robust Collaborative Multicast Service for Airborne Command and Control Environment, MILCOM 2004, November 2004.
(Full Paper)

Khazan, R. I., Group Membership: A Novel Approach and the First Single-Round Algorithm, 23rd ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC), Canada, pp. 347–356, July 2004.
(Full Paper)

Epstein, B., Weinstein, C. J., Cunningham, R. K., System Adaptation as a Trust Response in Tactical Ad Hoc Networks, Proceedings MILCOM 2003, pp. 209–214, October 2003.
(Full Paper)

Parks, T. M., Weinstein, C. J., Information Survivability for Mobile Wireless Systems, Lincoln Laboratory Journal, Vol. 12, No. 1, pp. 65–80. 2000.
(Abstract)

Parks, T. M., Kassay, D. A., and Weinstein, C. J., Security Implications of Adaptive Multimedia Distribution, ICC'99 Proceedings, June 1999.
(Full Paper)

Parks, T. M., Kassay, D. A., and Weinstein, C. J., Vulnerabilities of Reliable Multicast Protocols, MILCOM'98 Proceedings, October 1998.
(Full Paper)

Sthanu, S. R., Parks, T. M., Lerman, S. R., Survivability Through Dynamic Reconfiguration, Advanced Telecommunications and Information Distribution Research Program Conference, February 1998.
(Full Paper) (Postscript File)

top of page