Security Papers from the 1990s

This webpage is an attempt to assemble a ranking of top-cited security papers from the 1990s. The ranking has been created based on citations of papers published at top security conferences. More details are available here.

Top-cited papers from 1999 ⌄

  1. 1
    Ari Juels and Martin Wattenberg:
    A Fuzzy Commitment Scheme.
    ACM Conference on Computer and Communications Security (CCS), 1999
    2286 cites at Google Scholar
    1240% above average of year
    Visited: Feb-2025
    Paper: DOI
  2. 2
    Wenke Lee, Salvatore J. Stolfo, and Kui W. Mok:
    A Data Mining Framework for Building Intrusion Detection Models.
    IEEE Symposium on Security and Privacy (S&P), 1999
    2083 cites at Google Scholar
    1121% above average of year
    Visited: Jan-2025
    Paper: DOI
  3. 3
    Alma Whitten and J. Doug Tygar:
    Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0.
    USENIX Security Symposium, 1999
    2052 cites at Google Scholar
    1103% above average of year
    Visited: Feb-2025
    Paper: DOI
  4. 4
    Christina Warrender, Stephanie Forrest, and Barak A. Pearlmutter:
    Detecting Intrusions using System Calls: Alternative Data Models.
    IEEE Symposium on Security and Privacy (S&P), 1999
    1893 cites at Google Scholar
    1009% above average of year
    Visited: Feb-2025
    Paper: DOI
  5. 5
    Richard Lippmann, Robert K. Cunningham, David J. Fried, Isaac Graf, Kris R. Kendall, Seth E. Webster, and Marc A. Zissman:
    Results of the DARPA 1998 Offline Intrusion Detection Evaluation.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 1999
    1500 cites at Google Scholar
    779% above average of year
    Visited: Dec-2024
    Paper: DOI
  6. 6
    Ian Jermyn, Alain J. Mayer, Fabian Monrose, Michael K. Reiter, and Aviel D. Rubin:
    The Design and Analysis of Graphical Passwords.
    USENIX Security Symposium, 1999
    1214 cites at Google Scholar
    611% above average of year
    Visited: Jan-2025
    Paper: DOI
  7. 7
    Ari Juels and John G. Brainard:
    Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks.
    Network and Distributed System Security Symposium (NDSS), 1999
    931 cites at Google Scholar
    446% above average of year
    Visited: Jul-2024
    Paper: DOI
  8. 8
    Fabian Monrose, Michael K. Reiter, and Susanne Wetzel:
    Password Hardening Based on Keystroke Dynamics.
    ACM Conference on Computer and Communications Security (CCS), 1999
    761 cites at Google Scholar
    346% above average of year
    Visited: Feb-2025
    Paper: DOI
  9. 9
    Anup K. Ghosh and Aaron Schwartzbard:
    A Study in Using Neural Networks for Anomaly and Misuse Detection.
    USENIX Security Symposium, 1999
    684 cites at Google Scholar
    301% above average of year
    Visited: Jan-2025
    Paper: DOI
  10. 10
    Ronald Cramer and Victor Shoup:
    Signature Schemes Based on the Strong RSA Assumption.
    ACM Conference on Computer and Communications Security (CCS), 1999
    675 cites at Google Scholar
    296% above average of year
    Visited: Feb-2025
    Paper: DOI

Top-cited papers from 1998 ⌄

  1. 1
    Vern Paxson:
    Bro: A System for Detecting Network Intruders in Real-Time.
    USENIX Security Symposium, 1998
    4119 cites at Google Scholar
    1987% above average of year
    Visited: Jan-2025
    Paper: DOI
  2. 2
    Crispin Cowan, Calton Pu, Dave Maier, Heather Hintony, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, and Qian Zhang:
    StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks.
    USENIX Security Symposium, 1998
    2472 cites at Google Scholar
    1153% above average of year
    Visited: Jan-2025
    Paper: DOI
  3. 3
    Wenke Lee and Salvatore J. Stolfo:
    Data Mining Approaches for Intrusion Detection.
    USENIX Security Symposium, 1998
    2188 cites at Google Scholar
    1009% above average of year
    Visited: Jan-2025
    Paper: DOI
  4. 4
    Ian T. Foster, Carl Kesselman, Gene Tsudik, and Steven Tuecke:
    A Security Architecture for Computational Grids.
    ACM Conference on Computer and Communications Security (CCS), 1998
    2082 cites at Google Scholar
    955% above average of year
    Visited: Jan-2025
    Paper: DOI
  5. 5
    J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, and Diego Zamboni:
    An Architecture for Intrusion Detection Using Autonomous Agents.
    Annual Computer Security Applications Conference (ACSAC), 1998
    884 cites at Google Scholar
    348% above average of year
    Visited: Jan-2025
    Paper: DOI
  6. 6
    Thomas D. Wu:
    The Secure Remote Password Protocol.
    Network and Distributed System Security Symposium (NDSS), 1998
    812 cites at Google Scholar
    311% above average of year
    Visited: Jan-2025
    Paper: DOI
  7. 7
    Terran Lane and Carla E. Brodley:
    Temporal Sequence Learning and Data Reduction for Anomaly Detection.
    ACM Conference on Computer and Communications Security (CCS), 1998
    802 cites at Google Scholar
    306% above average of year
    Visited: Dec-2024
    Paper: DOI
  8. 8
    F. Javier Thayer, Jonathan C. Herzog, and Joshua D. Guttman:
    Strand Spaces: Why is a Security Protocol Correct?
    IEEE Symposium on Security and Privacy (S&P), 1998
    799 cites at Google Scholar
    305% above average of year
    Visited: Dec-2024
    Paper: DOI
  9. 9
    Kobbi Nissim and Moni Naor:
    Certificate Revocation and Certificate Update.
    USENIX Security Symposium, 1998
    788 cites at Google Scholar
    299% above average of year
    Visited: Jan-2025
    Paper: DOI
  10. 10
    George I. Davida, Yair Frankel, and Brian J. Matt:
    On Enabling Secure Applications Through Off-Line Biometric Identification.
    IEEE Symposium on Security and Privacy (S&P), 1998
    685 cites at Google Scholar
    247% above average of year
    Visited: Jan-2025
    Paper: DOI

Top-cited papers from 1997 ⌄

  1. 1
    Martín Abadi and Andrew D. Gordon:
    A Calculus for Cryptographic Protocols: The Spi Calculus.
    ACM Conference on Computer and Communications Security (CCS), 1997
    2135 cites at Google Scholar
    1056% above average of year
    Visited: Jan-2025
    Paper: DOI
  2. 2
    Gavin Lowe:
    A Hierarchy of Authentication Specification.
    IEEE Computer Security Foundations Symposium (CSF), 1997
    1064 cites at Google Scholar
    476% above average of year
    Visited: Jan-2025
    Paper: DOI
  3. 3
    Gavin Lowe:
    Casper: A Compiler for the Analysis of Security Protocols.
    IEEE Computer Security Foundations Symposium (CSF), 1997
    942 cites at Google Scholar
    410% above average of year
    Visited: Feb-2025
    Paper: DOI
  4. 4
    William A. Arbaugh, David J. Farber, and Jonathan M. Smith:
    A Secure and Reliable Bootstrap Architecture.
    IEEE Symposium on Security and Privacy (S&P), 1997
    939 cites at Google Scholar
    409% above average of year
    Visited: Jan-2025
    Paper: DOI
  5. 5
    Paul F. Syverson, David M. Goldschlag, and Michael G. Reed:
    Anonymous Connections and Onion Routing.
    IEEE Symposium on Security and Privacy (S&P), 1997
    847 cites at Google Scholar
    359% above average of year
    Visited: Dec-2024
    Paper: DOI
  6. 6
    Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, and Diego Zamboni:
    Analysis of a Denial of Service Attack on TCP.
    IEEE Symposium on Security and Privacy (S&P), 1997
    847 cites at Google Scholar
    359% above average of year
    Visited: Jan-2025
    Paper: DOI
  7. 7
    John C. Mitchell, Mark Mitchell, and Ulrich Stern:
    Automated analysis of cryptographic protocols using Mur-phi.
    IEEE Symposium on Security and Privacy (S&P), 1997
    787 cites at Google Scholar
    326% above average of year
    Visited: Jan-2025
    Paper: DOI
  8. 8
    Fabian Monrose and Aviel D. Rubin:
    Authentication via Keystroke Dynamics.
    ACM Conference on Computer and Communications Security (CCS), 1997
    754 cites at Google Scholar
    308% above average of year
    Visited: Jan-2025
    Paper: DOI
  9. 9
    N. Asokan, Matthias Schunter, and Michael Waidner:
    Optimistic Protocols for Fair Exchange.
    ACM Conference on Computer and Communications Security (CCS), 1997
    738 cites at Google Scholar
    300% above average of year
    Visited: Feb-2025
    Paper: DOI
  10. 10
    Sushil Jajodia, Pierangela Samarati, and V. S. Subrahmanian:
    A Logical Language for Expressing Authorizations.
    IEEE Symposium on Security and Privacy (S&P), 1997
    692 cites at Google Scholar
    275% above average of year
    Visited: Jan-2025
    Paper: DOI

Top-cited papers from 1996 ⌄

  1. 1
    Matt Blaze, Joan Feigenbaum, and Jack Lacy:
    Decentralized Trust Management.
    IEEE Symposium on Security and Privacy (S&P), 1996
    3471 cites at Google Scholar
    1981% above average of year
    Visited: Dec-2024
    Paper: DOI
  2. 2
    Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, and Thomas A. Longstaff:
    A Sense of Self for Unix Processes.
    IEEE Symposium on Security and Privacy (S&P), 1996
    3106 cites at Google Scholar
    1762% above average of year
    Visited: Jan-2025
    Paper: DOI
  3. 3
    Masahiro Mambo, Keisuke Usuda, and Eiji Okamoto:
    Proxy Signatures for Delegating Signing Operation.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1318 cites at Google Scholar
    690% above average of year
    Visited: Nov-2024
    Paper: DOI
  4. 4
    Michael Steiner, Gene Tsudik, and Michael Waidner:
    Diffie-Hellman Key Distribution Extended to Group Communication.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1208 cites at Google Scholar
    624% above average of year
    Visited: Jan-2025
    Paper: DOI
  5. 5
    Ian Goldberg, David A. Wagner, Randi Thomas, and Eric A. Brewer:
    A Secure Environment for Untrusted Helper Applications.
    USENIX Security Symposium, 1996
    1071 cites at Google Scholar
    542% above average of year
    Visited: Jan-2025
    Paper: DOI
  6. 6
    Jianying Zhou and Dieter Gollmann:
    A Fair Non-repudiation Protocol.
    IEEE Symposium on Security and Privacy (S&P), 1996
    729 cites at Google Scholar
    337% above average of year
    Visited: Dec-2024
    Paper: DOI
  7. 7
    Patrik D'haeseleer, Stephanie Forrest, and Paul Helman:
    An Immunological Approach to Change Detection: Algorithms, Analysis and Implications.
    IEEE Symposium on Security and Privacy (S&P), 1996
    695 cites at Google Scholar
    317% above average of year
    Visited: Dec-2024
    Paper: DOI
  8. 8
    Ueli M. Maurer:
    Modelling a Public-Key Infrastructure.
    European Symposium on Research in Computer Security (ESORICS), 1996
    593 cites at Google Scholar
    255% above average of year
    Visited: Dec-2024
    Paper: DOI
  9. 9
    Drew Dean, Edward W. Felten, and Dan S. Wallach:
    Java Security: From HotJava to Netscape and Beyond.
    IEEE Symposium on Security and Privacy (S&P), 1996
    460 cites at Google Scholar
    176% above average of year
    Visited: Dec-2024
    Paper: DOI
  10. 10
    William M. Farmer, Joshua D. Guttman, and Vipin Swarup:
    Security for Mobile Agents: Authentication and State Appraisal.
    European Symposium on Research in Computer Security (ESORICS), 1996
    430 cites at Google Scholar
    158% above average of year
    Visited: Feb-2025
    Paper: DOI

Top-cited papers from 1995 ⌄

  1. 1
    Matthew K. Franklin and Michael K. Reiter:
    The design and implementation of a secure auction service.
    IEEE Symposium on Security and Privacy (S&P), 1995
    555 cites at Google Scholar
    651% above average of year
    Visited: Feb-2025
    Paper: DOI
  2. 2
    Stuart Staniford-Chen and Todd L. Heberlein:
    Holding intruders accountable on the Internet.
    IEEE Symposium on Security and Privacy (S&P), 1995
    449 cites at Google Scholar
    508% above average of year
    Visited: Jan-2025
    Paper: DOI
  3. 3
    A. W. Roscoe:
    Modelling and verifying key-exchange protocols using CSP and FDR.
    IEEE Computer Security Foundations Symposium (CSF), 1995
    319 cites at Google Scholar
    332% above average of year
    Visited: Feb-2025
    Paper: DOI
  4. 4
    A. W. Roscoe:
    CSP and determinism in security modelling.
    IEEE Symposium on Security and Privacy (S&P), 1995
    304 cites at Google Scholar
    311% above average of year
    Visited: Dec-2024
    Paper: DOI
  5. 5
    Lee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, and Sheila A. Haghighat:
    Practical Domain and Type Enforcement for UNIX.
    IEEE Symposium on Security and Privacy (S&P), 1995
    304 cites at Google Scholar
    311% above average of year
    Visited: Dec-2024
    Paper: DOI
  6. 6
    Lee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, and Sheila A. Haghighat:
    A Domain and Type Enforcement UNIX Prototype.
    USENIX Security Symposium, 1995
    260 cites at Google Scholar
    252% above average of year
    Visited: Jan-2025
    Paper: DOI
  7. 7
    Steven M. Bellovin:
    Using the Domain Name System for System Break-ins.
    USENIX Security Symposium, 1995
    229 cites at Google Scholar
    210% above average of year
    Visited: Jan-2025
    Paper: DOI
  8. 8
    Tony Ballardie and Jon Crowcroft:
    Multicast-specific security threats and counter-measures.
    Network and Distributed System Security Symposium (NDSS), 1995
    207 cites at Google Scholar
    180% above average of year
    Visited: Jan-2025
    Paper: DOI
  9. 9
    Li Gong:
    Optimal authentication protocols resistant to password guessing attacks.
    IEEE Computer Security Foundations Symposium (CSF), 1995
    197 cites at Google Scholar
    167% above average of year
    Visited: Dec-2024
    Paper: DOI
  10. 10
    Laurent Joncheray:
    A Simple Active Attack Against TCP.
    USENIX Security Symposium, 1995
    167 cites at Google Scholar
    126% above average of year
    Visited: Jan-2025
    Paper: DOI

Top-cited papers from 1994 ⌄

  1. 1
    Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman:
    Role-based access control: a multi-dimensional view.
    Annual Computer Security Applications Conference (ACSAC), 1994
    10564 cites at Google Scholar
    5361% above average of year
    Visited: Jan-2025
    Paper: DOI
  2. 2
    Stephanie Forrest, Alan S. Perelson, Lawrence Allen, and Rajesh Cherukuri:
    Self-nonself discrimination in a computer.
    IEEE Symposium on Security and Privacy (S&P), 1994
    3287 cites at Google Scholar
    1599% above average of year
    Visited: Jan-2025
    Paper: DOI
  3. 3
    Thomas Beth, Malte Borcherding, and Birgit Klein:
    Valuation of Trust in Open Networks.
    European Symposium on Research in Computer Security (ESORICS), 1994
    1261 cites at Google Scholar
    552% above average of year
    Visited: Jan-2025
    Paper: DOI
  4. 4
    Martín Abadi and Roger M. Needham:
    Prudent engineering practice for cryptographic protocols.
    IEEE Symposium on Security and Privacy (S&P), 1994
    1048 cites at Google Scholar
    442% above average of year
    Visited: Jan-2025
    Paper: DOI
  5. 5
    Gene H. Kim and Eugene H. Spafford:
    The Design and Implementation of Tripwire: A File System Integrity Checker.
    ACM Conference on Computer and Communications Security (CCS), 1994
    898 cites at Google Scholar
    364% above average of year
    Visited: Feb-2025
    Paper: DOI
  6. 6
    Paul F. Syverson and Paul C. van Oorschot:
    On unifying some cryptographic protocol logics.
    IEEE Symposium on Security and Privacy (S&P), 1994
    511 cites at Google Scholar
    164% above average of year
    Visited: Feb-2025
    Paper: DOI
  7. 7
    John McLean:
    A general theory of composition for trace sets closed under selective interleaving functions.
    IEEE Symposium on Security and Privacy (S&P), 1994
    435 cites at Google Scholar
    125% above average of year
    Visited: Feb-2025
    Paper: DOI
  8. 8
    Michael K. Reiter:
    Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart.
    ACM Conference on Computer and Communications Security (CCS), 1994
    416 cites at Google Scholar
    115% above average of year
    Visited: Jan-2025
    Paper: DOI
  9. 9
    Calvin Ko, George Fink, and Karl N. Levitt:
    Automated detection of vulnerabilities in privileged programs by execution monitoring.
    Annual Computer Security Applications Conference (ACSAC), 1994
    370 cites at Google Scholar
    91% above average of year
    Visited: Dec-2024
    Paper: DOI
  10. 10
    Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, and Michael Waidner:
    The ESPRIT Project CAFE - High Security Digital Payment Systems.
    European Symposium on Research in Computer Security (ESORICS), 1994
    257 cites at Google Scholar
    33% above average of year
    Visited: Jan-2025
    Paper: DOI

Top-cited papers from 1993 ⌄

  1. 1
    Mihir Bellare and Phillip Rogaway:
    Random Oracles are Practical: A Paradigm for Designing Efficient Protocols.
    ACM Conference on Computer and Communications Security (CCS), 1993
    6729 cites at Google Scholar
    4479% above average of year
    Visited: Jan-2025
    Paper: DOI
  2. 2
    Ross J. Anderson:
    Why Cryptosystems Fail.
    ACM Conference on Computer and Communications Security (CCS), 1993
    1000 cites at Google Scholar
    580% above average of year
    Visited: Jan-2025
    Paper: DOI
  3. 3
    Matt Blaze:
    A Cryptographic File System for UNIX.
    ACM Conference on Computer and Communications Security (CCS), 1993
    811 cites at Google Scholar
    452% above average of year
    Visited: Feb-2025
    Paper: DOI
  4. 4
    Steven M. Bellovin and Michael Merritt:
    Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise.
    ACM Conference on Computer and Communications Security (CCS), 1993
    688 cites at Google Scholar
    368% above average of year
    Visited: Dec-2024
    Paper: DOI
  5. 5
    Jeffrey O. Kephart and Steve R. White:
    Measuring and modeling computer virus prevalence.
    IEEE Symposium on Security and Privacy (S&P), 1993
    586 cites at Google Scholar
    299% above average of year
    Visited: Feb-2025
    Paper: DOI
  6. 6
    Thomas Y. C. Woo and Simon S. Lam:
    A semantic model for authentication protocols.
    IEEE Symposium on Security and Privacy (S&P), 1993
    459 cites at Google Scholar
    212% above average of year
    Visited: Jan-2025
    Paper: DOI
  7. 7
    Raphael Yahalom, Birgit Klein, and Thomas Beth:
    Trust relationships in secure systems-a distributed authentication perspective.
    IEEE Symposium on Security and Privacy (S&P), 1993
    424 cites at Google Scholar
    189% above average of year
    Visited: Dec-2024
    Paper: DOI
  8. 8
    Koral Ilgun:
    USTAT: a real-time intrusion detection system for UNIX.
    IEEE Symposium on Security and Privacy (S&P), 1993
    413 cites at Google Scholar
    181% above average of year
    Visited: Jan-2025
    Paper: DOI
  9. 9
    Wenbo Mao and Colin Boyd:
    Towards Formal Analysis of Security Protocols.
    IEEE Computer Security Foundations Symposium (CSF), 1993
    229 cites at Google Scholar
    56% above average of year
    Visited: Jan-2025
    Paper: DOI
  10. 10
    Myong H. Kang and Ira S. Moskowitz:
    A Pump for Rapid, Reliable, Secure Communication.
    ACM Conference on Computer and Communications Security (CCS), 1993
    225 cites at Google Scholar
    53% above average of year
    Visited: Jan-2025
    Paper: DOI

Top-cited papers from 1992 ⌄

  1. 1
    Steven M. Bellovin and Michael Merritt:
    Encrypted key exchange: password-based protocols secure against dictionary attacks.
    IEEE Symposium on Security and Privacy (S&P), 1992
    2264 cites at Google Scholar
    2339% above average of year
    Visited: Jan-2025
    Paper: DOI
  2. 2
    Phillip A. Porras and Richard A. Kemmerer:
    Penetration state transition analysis: A rule-based intrusion detection approach.
    Annual Computer Security Applications Conference (ACSAC), 1992
    1322 cites at Google Scholar
    1324% above average of year
    Visited: Jan-2025
    Paper: DOI
  3. 3
    Hervé Debar, Monique Becker, and Didier Siboni:
    A neural network component for an intrusion detection system.
    IEEE Symposium on Security and Privacy (S&P), 1992
    858 cites at Google Scholar
    824% above average of year
    Visited: Jan-2025
    Paper: DOI
  4. 4
    Ravi S. Sandhu:
    The typed access matrix model.
    IEEE Symposium on Security and Privacy (S&P), 1992
    462 cites at Google Scholar
    398% above average of year
    Visited: Nov-2024
    Paper: DOI
  5. 5
    Charles W. Kurak Jr. and John McHugh:
    A cautionary note on image downgrading.
    Annual Computer Security Applications Conference (ACSAC), 1992
    315 cites at Google Scholar
    239% above average of year
    Visited: Sep-2024
    Paper: DOI
  6. 6
    Naji Habra, Baudouin Le Charlier, Abdelaziz Mounji, and Isabelle Mathieu:
    ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis.
    European Symposium on Research in Computer Security (ESORICS), 1992
    218 cites at Google Scholar
    135% above average of year
    Visited: Jan-2025
    Paper: DOI
  7. 7
    Wei-Ming Hu:
    Lattice scheduling and covert channels.
    IEEE Symposium on Security and Privacy (S&P), 1992
    193 cites at Google Scholar
    108% above average of year
    Visited: Dec-2024
    Paper: DOI
  8. 8
    Refik Molva, Gene Tsudik, Els Van Herreweghen, and Stefano Zatti:
    KryptoKnight Authentication and Key Distribution System.
    European Symposium on Research in Computer Security (ESORICS), 1992
    188 cites at Google Scholar
    102% above average of year
    Visited: Dec-2024
    Paper: DOI
  9. 9
    Stuart G. Stubblebine and Virgil D. Gligor:
    On message integrity in cryptographic protocols.
    IEEE Symposium on Security and Privacy (S&P), 1992
    135 cites at Google Scholar
    45% above average of year
    Visited: Jan-2025
    Paper: DOI
  10. 10
    Jonathan K. Millen:
    A resource allocation model for denial of service.
    IEEE Symposium on Security and Privacy (S&P), 1992
    131 cites at Google Scholar
    41% above average of year
    Visited: Jan-2025
    Paper: DOI

Top-cited papers from 1991 ⌄

  1. 1
    Jeffrey O. Kephart and Steve R. White:
    Directed-Graph Epidemiological Models of Computer Viruses.
    IEEE Symposium on Security and Privacy (S&P), 1991
    1245 cites at Google Scholar
    1595% above average of year
    Visited: Feb-2025
    Paper: DOI
  2. 2
    Harold S. Javitz and Alfonso Valdes:
    The SRI IDES Statistical Anomaly Detector.
    IEEE Symposium on Security and Privacy (S&P), 1991
    509 cites at Google Scholar
    593% above average of year
    Visited: Feb-2025
    Paper: DOI
  3. 3
    Wei-Ming Hu:
    Reducing Timing Channels with Fuzzy Time.
    IEEE Symposium on Security and Privacy (S&P), 1991
    432 cites at Google Scholar
    488% above average of year
    Visited: Dec-2024
    Paper: DOI
  4. 4
    Yves Deswarte, Laurent Blain, and Jean-Charles Fabre:
    Intrusion Tolerance in Distributed Computing Systems.
    IEEE Symposium on Security and Privacy (S&P), 1991
    414 cites at Google Scholar
    464% above average of year
    Visited: Oct-2024
    Paper: DOI
  5. 5
    James W. Gray III:
    Toward a Mathematical Foundation for Information Flow Security.
    IEEE Symposium on Security and Privacy (S&P), 1991
    301 cites at Google Scholar
    310% above average of year
    Visited: Jan-2025
    Paper: DOI
  6. 6
    John C. Wray:
    An Analysis of Covert Timing Channels.
    IEEE Symposium on Security and Privacy (S&P), 1991
    269 cites at Google Scholar
    266% above average of year
    Visited: Dec-2024
    Paper: DOI
  7. 7
    Joseph J. Tardo and Kannan Alagappan:
    SPX: Global Authentication Using Public Key Certificates.
    IEEE Symposium on Security and Privacy (S&P), 1991
    226 cites at Google Scholar
    208% above average of year
    Visited: Feb-2025
    Paper: DOI
  8. 8
    Vijay Varadharajan, Phillip Allen, and Stewart Black:
    An Analysis of the Proxy Problem in Distributed Systems.
    IEEE Symposium on Security and Privacy (S&P), 1991
    191 cites at Google Scholar
    160% above average of year
    Visited: Feb-2025
    Paper: DOI
  9. 9
    Daniel F. Sterne:
    On the Buzzword "Security Policy".
    IEEE Symposium on Security and Privacy (S&P), 1991
    140 cites at Google Scholar
    91% above average of year
    Visited: Jan-2025
    Paper: DOI
  10. 10
    Paul F. Syverson:
    The Use of Logic in the Analysis of Cryptographic Protocols.
    IEEE Symposium on Security and Privacy (S&P), 1991
    131 cites at Google Scholar
    78% above average of year
    Visited: Jan-2025
    Paper: DOI

Top-cited papers from 1990 ⌄

  1. 1
    Li Gong, Roger M. Needham, and Raphael Yahalom:
    Reasoning about Belief in Cryptographic Protocols.
    IEEE Symposium on Security and Privacy (S&P), 1990
    1057 cites at Google Scholar
    1804% above average of year
    Visited: Feb-2025
    Paper: DOI
  2. 2
    John McLean:
    Security Models and Information Flow.
    IEEE Symposium on Security and Privacy (S&P), 1990
    423 cites at Google Scholar
    662% above average of year
    Visited: Jan-2025
    Paper: DOI
  3. 3
    Henry S. Teng, Kaihu Chen, and Stephen C. Y. Lu:
    Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns.
    IEEE Symposium on Security and Privacy (S&P), 1990
    387 cites at Google Scholar
    597% above average of year
    Visited: Nov-2024
    Paper: DOI
  4. 4
    Catherine Meadows:
    Representing Partial Knowledge in an Algebraic Security Model.
    IEEE Computer Security Foundations Symposium (CSF), 1990
    387 cites at Google Scholar
    597% above average of year
    Visited: Jan-2025
    Paper: DOI
  5. 5
    J. Todd Wittbold and Dale M. Johnson:
    Information Flow in Nondeterministic Systems.
    IEEE Symposium on Security and Privacy (S&P), 1990
    315 cites at Google Scholar
    467% above average of year
    Visited: Jan-2025
    Paper: DOI
  6. 6
    Morrie Gasser and Ellen McDermott:
    An Architecture for Practical Delegation in a Distributed System.
    IEEE Symposium on Security and Privacy (S&P), 1990
    296 cites at Google Scholar
    433% above average of year
    Visited: Jan-2025
    Paper: DOI
  7. 7
    Catherine D. McCollum, J. R. Messing, and LouAnna Notargiacomo:
    Beyond the Pale of MAC and DAC-Defining New Forms of Access Control.
    IEEE Symposium on Security and Privacy (S&P), 1990
    230 cites at Google Scholar
    314% above average of year
    Visited: Jan-2025
    Paper: DOI
  8. 8
    Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, and Clifford E. Kahn:
    A VMM Security Kernel for the VAX Architecture.
    IEEE Symposium on Security and Privacy (S&P), 1990
    221 cites at Google Scholar
    298% above average of year
    Visited: Oct-2024
    Paper: DOI
  9. 9
    R. W. Baldwin:
    Naming and Grouping Privileges to Simplify Security Management in Large Databases.
    IEEE Symposium on Security and Privacy (S&P), 1990
    201 cites at Google Scholar
    262% above average of year
    Visited: Feb-2025
    Paper: DOI
  10. 10
    Janice I. Glasgow, Glenn H. MacEwen, and Prakash Panangaden:
    A Logic for Reasoning about Security.
    IEEE Computer Security Foundations Symposium (CSF), 1990
    200 cites at Google Scholar
    260% above average of year
    Visited: Dec-2024
    Paper: DOI