Bill Cheswick's Papers Bibtex entries for these. Rethinking Passwords, William Cheswick, ACM Queue Dec 2012, Volume 10, issue 12. Steven M. Bellovin and William R. Cheswick. Privacy-Enhanced Searches Using Encrypted {Bloom} Filters, Technical Report, Department of Computer Science, Columbia University, CUCS-034-07. Johnny Can Obfuscate; Beyond Mother's Maiden Name(PDF). This quarter-baked idea was accepted for discussion at the Usenix HotSec '06 Workshop on Hot Topics in Security. Worm Propagation Strategies in an IPv6 Internet (PDF). Steven M. Bellovin, Bill Cheswick, Angelos D. Keromytis, :LOGIN;, Feb. 2006. Internet Security B. Cheswick, 2003, The Bridge, National Academy of Engineering, Winter 2003, pps. 25--30. What Can You Do with Traceroute? Branigan, S., Burch, H., Cheswick, B., & Wojcik, F., 2001, Internet Computing, September/October 2001, Vol. 5, No. 5, page 96. http://computer.org/internet/v5n5/index.htm Tracing Anonymous Packets to Their Approximate Source. Hal Burch and Bill Cheswick. Given at the 2000 Usenix LISA (New Orleans) conference. Postscript. Mapping and Visualizing the Internet. Bill Cheswick, Hal Burch, and Steve Branigan. Given at the Usenix 2000 general conference (San Diego). Compressed postscript. Cget, Cput, and Stage: Secure File Transport on the Internet. Paper given at the 1997 (Anaheim) Usenix conference. Postscript and Powerpoint slides are available. This software has been approved for on-commercial software release of the authentication-only version. A DNS Filter and Switch for Packet-filtering Gateways, with Steve Bellovin. Given at the 6th Usenix Security Symposium (San Jose). Here are the Powerpoint slides used in the talk. This software is not currently available to the public. An Evening With Berferd, in which a Hacker is Lured, Endured, and Studied given at the Winter 1992 (San Francisco) Usenix, and reprinted in several places elsewhere. PDF version. The Design of a Secure Internet Gateway given at the Summer 1990 (Anaheim) Usenix. I believe this paper contains the first use of the word "proxy" in it current usage. It also contains the oft-repeated comment that perimeter defenses give a crunchy outside with a soft, chewy center. The firewall itself was overdesigned for today's security needs. PDF version. A Permuted Index for TeX and LaTeX in the TeXniques series. It is also a Bell Labs CSTR available by email request. Back to my home page.