![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Stephen Farrell
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i30]Stephen Farrell, Farzaneh Badii, Bruce Schneier, Steven M. Bellovin:
Reflections on Ten Years Past the Snowden Revelations. RFC 9446: 1-29 (2023) - 2021
- [c19]Douglas J. Leith
, Stephen Farrell:
Contact Tracing App Privacy: What Data Is Shared By Europe's GAEN Contact Tracing Apps. INFOCOM 2021: 1-10 - [i29]Brian E. Carpenter
, Stephen Farrell:
Additional Criteria for Nominating Committee Eligibility. RFC 8989: 1-10 (2021) - [i28]Kathleen Moriarty, Stephen Farrell:
Deprecating TLS 1.0 and TLS 1.1. RFC 8996: 1-18 (2021) - [i27]Loganaden Velvindron, Stephen Farrell:
Deprecation of TLS 1.1 for Email Submission and Access. RFC 8997: 1-6 (2021) - [i26]Jari Arkko, Stephen Farrell, Mirja Kühlewind, Colin Perkins
:
Report from the IAB COVID-19 Network Impacts Workshop 2020. RFC 9075: 1-20 (2021) - 2020
- [j23]Douglas J. Leith
, Stephen Farrell:
Coronavirus contact tracing: evaluating the potential of using bluetooth received signal strength for proximity detection. Comput. Commun. Rev. 50(4): 66-74 (2020) - [c18]Douglas J. Leith
, Stephen Farrell:
Coronavirus Contact Tracing App Privacy: What Data Is Shared by the Singapore OpenTrace App? SecureComm (1) 2020: 80-96 - [i25]Douglas J. Leith, Stephen Farrell:
Coronavirus Contact Tracing: Evaluating The Potential Of Using Bluetooth Received Signal Strength For Proximity Detection. CoRR abs/2006.06822 (2020) - [i24]Douglas J. Leith, Stephen Farrell:
Measurement-Based Evaluation Of Google/Apple Exposure Notification API For Proximity Detection in a Commuter Bus. CoRR abs/2006.08543 (2020)
2010 – 2019
- 2018
- [i23]Stephen Farrell:
Clusters of Re-used Keys. IACR Cryptol. ePrint Arch. 2018: 299 (2018) - [i22]Stephen Farrell:
Low-Power Wide Area Network (LPWAN) Overview. RFC 8376: 1-43 (2018) - 2017
- [i21]Hannes Tschofenig, Stephen Farrell:
Report from the Internet of Things Software Update (IoTSU) Workshop 2016. RFC 8240: 1-27 (2017) - 2016
- [j22]Stephen Farrell:
Requirements Analysis Required-Otherwise Targeted Monitoring Enables Pervasive Monitoring. Computer 49(3): 34-40 (2016) - 2015
- [i20]Stephen Farrell, Paul E. Hoffman, Michael Thomas:
HTTP Origin-Bound Authentication (HOBA). RFC 7486: 1-28 (2015) - [i19]Stephen Farrell, Rigo Wenning, Bert Bos, Marc Blanchet, Hannes Tschofenig:
Report from the Strengthening the Internet (STRINT) Workshop. RFC 7687: 1-32 (2015) - 2014
- [j21]Stephen Farrell:
Why Pervasive Monitoring Is Bad. IEEE Internet Comput. 18(4): 4-7 (2014) - [i18]Stephen Farrell, Hannes Tschofenig:
Pervasive Monitoring Is an Attack. RFC 7258: 1-6 (2014) - 2013
- [j20]Christian Dannewitz, Dirk Kutscher
, Börje Ohlman, Stephen Farrell, Bengt Ahlgren, Holger Karl:
Network of Information (NetInf) - An information-centric networking architecture. Comput. Commun. 36(7): 721-735 (2013) - [i17]Stephen Farrell, Dirk Kutscher, Christian Dannewitz, Börje Ohlman, Ari Keränen, Phillip M. Hallam-Baker:
Naming Things with Hashes. RFC 6920: 1-23 (2013) - 2012
- [c17]Stephen Farrell:
CRiSIS 2012 security standards tutorial. CRiSIS 2012: 1-4 - 2011
- [j19]Stephen Farrell:
Leaky or Guessable Session Identifiers. IEEE Internet Comput. 15(1): 88-91 (2011) - [j18]Stephen Farrell:
Security in the Wild. IEEE Internet Comput. 15(3): 86-91 (2011) - [j17]Stephen Farrell:
Not Reinventing PKI until We Have Something Better. IEEE Internet Comput. 15(5): 95-98 (2011) - [j16]Carlo Caini
, Haitham S. Cruickshank, Stephen Farrell, Mario Marchese
:
Delay- and Disruption-Tolerant Networking (DTN): An Alternative Solution for Future Satellite Networking Applications. Proc. IEEE 99(11): 1980-1997 (2011) - [j15]Stephen Farrell, Alex McMahon, Eoin Meehan, Stefan Weber
, Kerry Hartnett:
Report on an Arctic summer DTN trial. Wirel. Networks 17(5): 1127-1156 (2011) - [c16]Aidan Lynch, Stephen Farrell, Alex McMahon, Stefan Weber
, Kerry Hartnett:
DTN trials and router updates. ExtremeCom 2011: 11:1-11:5 - [c15]Stephen Farrell, Alex McMahon, Stefan Weber, Kerry Hartnett, Aidan Lynch, Eoin Meehan:
Report on DTN applications during arctic summer 2010 trial. WPMC 2011: 1-5 - [i16]Susan Flynn Symington, Stephen Farrell, Howard S. Weiss, Peter Lovell:
Bundle Security Protocol Specification. RFC 6257: 1-60 (2011) - 2010
- [j14]Stephen Farrell:
Why Didn't We Spot That? IEEE Internet Comput. 14(1): 84-87 (2010) - [j13]Stephen Farrell:
Applications Directly Using Cryptography. IEEE Internet Comput. 14(3): 84-87 (2010) - [i15]Stephen Farrell, Russ Housley, Sean Turner:
An Internet Attribute Certificate Profile for Authorization. RFC 5755: 1-50 (2010)
2000 – 2009
- 2009
- [j12]Vinny Cahill, Stephen Farrell, Jörg Ott:
Special issue of computer communications on delay and disruption tolerant networking. Comput. Commun. 32(16): 1685-1686 (2009) - [j11]Stephen Farrell:
Why Don't We Encrypt Our Email? IEEE Internet Comput. 13(1): 82-85 (2009) - [j10]Stephen Farrell:
Keys Don't Grow in Threes. IEEE Internet Comput. 13(3): 94-96 (2009) - [j9]Stephen Farrell:
API Keys to the Kingdom. IEEE Internet Comput. 13(5): 91-93 (2009) - [j8]Alex McMahon, Stephen Farrell:
Delay- and Disruption-Tolerant Networking. IEEE Internet Comput. 13(6): 82-87 (2009) - [i14]Stephen Farrell:
Other Certificates Extension. RFC 5697: 1-8 (2009) - 2008
- [b2]Stephen Farrell:
A delay and disruption tolerant transport layer protocol. Trinity College Dublin, Ireland, 2008 - [j7]Stephen Farrell:
Security Boundaries. IEEE Internet Comput. 12(1): 93-96 (2008) - [j6]Stephen Farrell:
Portable Storage and Data Loss. IEEE Internet Comput. 12(3): 90-93 (2008) - [j5]Stephen Farrell:
Password Policy Purgatory. IEEE Internet Comput. 12(5): 84-87 (2008) - [j4]Kevin R. Fall, Stephen Farrell:
DTN: an architectural retrospective. IEEE J. Sel. Areas Commun. 26(5): 828-836 (2008) - [c14]Ido Guy, Michal Jacovi, Elad Shahar, Noga Meshulam, Vladimir Soroka, Stephen Farrell:
Harvesting with SONAR: the value of aggregating social network information. CHI 2008: 1017-1026 - [i13]David Cooper, Stefan Santesson, Stephen Farrell, Sharon Boeyen, Russell Housley, W. Timothy Polk:
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280: 1-151 (2008) - [i12]Scott C. Burleigh, Manikantan Ramadas, Stephen Farrell:
Licklider Transmission Protocol - Motivation. RFC 5325: 1-23 (2008) - [i11]Manikantan Ramadas, Scott C. Burleigh, Stephen Farrell:
Licklider Transmission Protocol - Specification. RFC 5326: 1-54 (2008) - [i10]Stephen Farrell, Manikantan Ramadas, Scott C. Burleigh:
Licklider Transmission Protocol - Security Extensions. RFC 5327: 1-11 (2008) - 2007
- [c13]Stephen Farrell, Christian Damsgaard Jensen:
"End-by-Hop" Data Integrity. ESAS 2007: 142-155 - [c12]Paul McDonald, Dermot Geraghty, Ivor Humphreys, Stephen Farrell, Vinny Cahill:
Sensor Network with Delay Tolerance (SeNDT). ICCCN 2007: 1333-1338 - [c11]Stephen Farrell, Tessa A. Lau, Stefan Nusser:
Building Communities with People-Tags. INTERACT (2) 2007: 357-360 - [c10]Stephen Farrell, Tessa A. Lau, Stefan Nusser, Eric Wilcox, Michael J. Muller:
Socially augmenting employee profiles with people-tagging. UIST 2007: 91-100 - 2006
- [b1]Stephen Farrell, Vinny Cahill:
Delay- and disruption-tolerant networking. Artech House 2006, ISBN 978-1-59693-063-6, pp. I-XII, 1-226 - [j3]Alex Cozzi, Stephen Farrell, Tessa A. Lau, Barton A. Smith, Clemens Drews, James Lin, Bob Stachel, Thomas P. Moran:
Activity management as a Web service. IBM Syst. J. 45(4): 695-712 (2006) - [j2]Stephen Farrell, Vinny Cahill, Dermot Geraghty, Ivor Humphreys, Paul McDonald:
When TCP Breaks: Delay- and Disruption- Tolerant Networking. IEEE Internet Comput. 10(4): 72-78 (2006) - [c9]Stephen Farrell:
DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel. EuroPKI 2006: 145-153 - 2005
- [c8]Stephen Farrell, Christopher S. Campbell, Suvda Myagmar:
Relescope: an experiment in accelerating relationships. CHI Extended Abstracts 2005: 1363-1366 - [c7]Stephen Farrell, José Kahan:
Using the XML Key Management Specification (and Breaking X.509 Rules as You Go). Communications and Multimedia Security 2005: 348-357 - [c6]Guillermo Álvaro, Stephen Farrell, Tommy Lindberg, Roland Lockhart, Yunhao Zhang:
XKMS Working Group Interoperability Status Report. EuroPKI 2005: 86-99 - [i9]Carlisle Adams, Stephen Farrell, Tomi Kause, Tero Mononen:
Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP). RFC 4210: 1-95 (2005) - 2004
- [i8]Stephen Farrell:
Securely Available Credentials Protocol. RFC 3767: 1-25 (2004) - 2003
- [c5]Jean-Marc Seigneur, Stephen Farrell, Christian Damsgaard Jensen, Elizabeth Gray, Yong Chen:
End-to-End Trust Starts with Recognition. SPC 2003: 130-142 - [p1]Paul P. Maglio, Rob Barrett, Stephen Farrell:
Web Places: Using Intermediaries to Add People to the Web. Designing Information Spaces 2003: 249-269 - 2002
- [c4]Stephen Farrell, Volkert Buchmann, Christopher S. Campbell, Paul P. Maglio:
Information programming for personal user interfaces. IUI 2002: 190-191 - [i7]Stephen Farrell, Russell Housley:
An Internet Attribute Certificate Profile for Authorization. RFC 3281: 1-40 (2002) - 2001
- [c3]Stephen Farrell:
Social and informational proxies in a fishtank. CHI Extended Abstracts 2001: 365-366 - [c2]Stephen Farrell, Paul P. Maglio, Christopher S. Campbell:
How to Teach a Fish to Swim. HCC 2001: 158-164 - [i6]Alfred Arsenault, Stephen Farrell:
Securely Available Credentials - Requirements. RFC 3157: 1-20 (2001) - [i5]Stephen Farrell, Sean Turner:
Reuse of CMS Content Encryption Keys. RFC 3185: 1-10 (2001) - 2000
- [j1]Stephen Farrell:
The WAP Forum's Wireless Public Key Infrastructure. Inf. Secur. Tech. Rep. 5(3): 23-31 (2000) - [c1]Paul P. Maglio, Stephen Farrell:
LiveInfo: Adapting Web Experience by Customization and Annotation. AH 2000: 144-154 - [i4]John R. Vollbrecht, Pat R. Calhoun, Stephen Farrell, Leon Gommans, George M. Gross, Betty de Bruijn, Cees de Laat, Matt Holdrege, David W. Spence:
AAA Authorization Framework. RFC 2904: 1-35 (2000) - [i3]John R. Vollbrecht, Pat R. Calhoun, Stephen Farrell, Leon Gommans, George M. Gross, Betty de Bruijn, Cees de Laat, Matt Holdrege, David W. Spence:
AAA Authorization Application Examples. RFC 2905: 1-53 (2000) - [i2]Stephen Farrell, John R. Vollbrecht, Pat R. Calhoun, Leon Gommans, George M. Gross, Betty de Bruijn, Cees de Laat, Matt Holdrege, David W. Spence:
AAA Authorization Requirements. RFC 2906: 1-23 (2000)
1990 – 1999
- 1999
- [i1]Carlisle Adams, Stephen Farrell:
Internet X.509 Public Key Infrastructure Certificate Management Protocols. RFC 2510: 1-72 (1999)
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint