| Crowds: Anonymity for web transactions MK Reiter, AD Rubin ACM transactions on information and system security (TISSEC) 1 (1), 66-92, 1998 | 2774 | 1998 |
| Firewalls And Internet Security: Repelling The Wily Hacker, 2/E WR Cheswick Pearson Education India, 2003 | 1832 | 2003 |
| The design and analysis of graphical passwords. IH Jermyn, A Mayer, F Monrose, MK Reiter, AD Rubin USENIX Association, 1999 | 1126 | 1999 |
| Keystroke dynamics as a biometric for authentication F Monrose, AD Rubin Future Generation computer systems 16 (4), 351-359, 2000 | 1026 | 2000 |
| Zerocoin: Anonymous distributed e-cash from bitcoin I Miers, C Garman, M Green, AD Rubin 2013 IEEE Symposium on Security and Privacy, 397-411, 2013 | 1023 | 2013 |
| Analysis of an electronic voting system T Kohno, A Stubblefield, AD Rubin, DS Wallach IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 27-40, 2004 | 778 | 2004 |
| Authentication via keystroke dynamics F Monrose, A Rubin Proceedings of the 4th ACM Conference on Computer and Communications …, 1997 | 683 | 1997 |
| A framework for detection and measurement of phishing attacks S Garera, N Provos, M Chew, AD Rubin Proceedings of the 2007 ACM workshop on Recurring malcode, 1-8, 2007 | 589 | 2007 |
| Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. A Stubblefield, J Ioannidis, AD Rubin NDSS, 2002 | 550 | 2002 |
| Charm: a framework for rapidly prototyping cryptosystems JA Akinyele, C Garman, I Miers, MW Pagano, M Rushanan, M Green, ... Journal of Cryptographic Engineering 3 (2), 111-128, 2013 | 443 | 2013 |
| Anonymous web transactions with crowds MK Reiter, AD Rubin Communications of the ACM 42 (2), 32-48, 1999 | 437 | 1999 |
| Security Analysis of a Cryptographically-Enabled RFID Device. S Bono, M Green, A Stubblefield, A Juels, AD Rubin, M Szydlo USENIX Security Symposium 31, 1-16, 2005 | 382 | 2005 |
| Publius: A robust, tamper-evident, censorship-resistant M Waldman, AD Rubin, LF Cranor web publishing system. In Proc. 9th USENIX Security Symposium, 2000 | 368* | 2000 |
| Method for the secure distribution of electronic files in a distributed environment AD Rubin US Patent 5,638,446, 1997 | 352 | 1997 |
| Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. G Goodell, W Aiello, T Griffin, J Ioannidis, PD McDaniel, AD Rubin NDSS 23, 156, 2003 | 328 | 2003 |
| Modernist primitivism: an introduction W Rubin na, 1984 | 304* | 1984 |
| Risks of the passport single signon protocol DP Kormann, AD Rubin Computer networks 33 (1-6), 51-58, 2000 | 298 | 2000 |
| Sok: Security and privacy in implantable medical devices and body area networks M Rushanan, AD Rubin, DF Kune, CM Swanson 2014 IEEE symposium on security and privacy, 524-539, 2014 | 265 | 2014 |
| Securing electronic medical records using attribute-based encryption on mobile devices JA Akinyele, MW Pagano, MD Green, CU Lehmann, ZNJ Peterson, ... Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011 | 250 | 2011 |
| Off-line generation of limited-use credit card numbers A Rubin, R Wright US Patent App. 09/682,830, 2002 | 214 | 2002 |