BibTeX records: David Molnar

download as .bib file

@inproceedings{DBLP:conf/psd/SarcevicMM20,
  author       = {Tanja Sarcevic and
                  David Molnar and
                  Rudolf Mayer},
  editor       = {Josep Domingo{-}Ferrer and
                  Krishnamurty Muralidhar},
  title        = {An Analysis of Different Notions of Effectiveness in k-Anonymity},
  booktitle    = {Privacy in Statistical Databases - {UNESCO} Chair in Data Privacy,
                  International Conference, {PSD} 2020, Tarragona, Spain, September
                  23-25, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12276},
  pages        = {121--135},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57521-2\_9},
  doi          = {10.1007/978-3-030-57521-2\_9},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/psd/SarcevicMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isie/SauterTDMLKDSW18,
  author       = {Thilo Sauter and
                  Albert Treytl and
                  Konrad Diwold and
                  David Molnar and
                  Daniel Lechner and
                  Lukas Krammer and
                  Bernhard Derler and
                  Christian Seidl and
                  Florian Wenig},
  title        = {Getting Fit for the Future: Optimizing Energy Usage in Existing Buildings
                  by Adding Non-Invasive Sensor Networks},
  booktitle    = {27th {IEEE} International Symposium on Industrial Electronics, {ISIE}
                  2018, Cairns, Australia, June 13-15, 2018},
  pages        = {963--968},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISIE.2018.8433768},
  doi          = {10.1109/ISIE.2018.8433768},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isie/SauterTDMLKDSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/FigueiredoMVL17,
  author       = {Lucas Silva Figueiredo and
                  David Molnar and
                  Margus Veanes and
                  Benjamin Livshits},
  title        = {Prepose: Privacy, Security, and Reliability for Gesture-Based Programming},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {2},
  pages        = {14--23},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.44},
  doi          = {10.1109/MSP.2017.44},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/FigueiredoMVL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/miipop/SodermanJVNMMSM16,
  author       = {Christina S{\"{o}}derman and
                  {\AA}se Johnsson and
                  Jenny Vikgren and
                  Rauni Rossi Norrlund and
                  David Molnar and
                  Maral Mirzai and
                  Angelica Svalkvist and
                  Lars Gunnar M{\aa}nsson and
                  Magnus B{\aa}th},
  editor       = {Craig K. Abbey and
                  Matthew A. Kupinski},
  title        = {Detection of pulmonary nodule growth with dose reduced chest tomosynthesis:
                  a human observer study using simulated nodules},
  booktitle    = {Medical Imaging 2016: Image Perception, Observer Performance, and
                  Technology Assessment, San Diego, California, United States, 27 February
                  - 3 March 2016},
  series       = {{SPIE} Proceedings},
  volume       = {9787},
  pages        = {97870P},
  publisher    = {{SPIE}},
  year         = {2016},
  url          = {https://doi.org/10.1117/12.2216950},
  doi          = {10.1117/12.2216950},
  timestamp    = {Wed, 09 May 2018 18:47:54 +0200},
  biburl       = {https://dblp.org/rec/conf/miipop/SodermanJVNMMSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FigueiredoLMV16,
  author       = {Lucas Silva Figueiredo and
                  Benjamin Livshits and
                  David Molnar and
                  Margus Veanes},
  title        = {Prepose: Privacy, Security, and Reliability for Gesture-Based Programming},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {122--137},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.16},
  doi          = {10.1109/SP.2016.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/FigueiredoLMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/DAntoniVLM15,
  author       = {Loris D'Antoni and
                  Margus Veanes and
                  Benjamin Livshits and
                  David Molnar},
  title        = {Fast: {A} Transducer-Based Language for Tree Manipulation},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {38},
  number       = {1},
  pages        = {1:1--1:32},
  year         = {2015},
  url          = {https://doi.org/10.1145/2791292},
  doi          = {10.1145/2791292},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toplas/DAntoniVLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscw/RaeVTM15,
  author       = {Irene Rae and
                  Gina Venolia and
                  John C. Tang and
                  David Molnar},
  editor       = {Dan Cosley and
                  Andrea Forte and
                  Luigina Ciolfi and
                  David McDonald},
  title        = {A Framework for Understanding and Designing Telepresence},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer Supported Cooperative
                  Work {\&} Social Computing, {CSCW} 2015, Vancouver, BC, Canada,
                  March 14 - 18, 2015},
  pages        = {1552--1566},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2675133.2675141},
  doi          = {10.1145/2675133.2675141},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscw/RaeVTM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/VeanesMML15,
  author       = {Margus Veanes and
                  Todd Mytkowicz and
                  David Molnar and
                  Benjamin Livshits},
  editor       = {Sriram K. Rajamani and
                  David Walker},
  title        = {Data-Parallel String-Manipulating Programs},
  booktitle    = {Proceedings of the 42nd Annual {ACM} {SIGPLAN-SIGACT} Symposium on
                  Principles of Programming Languages, {POPL} 2015, Mumbai, India, January
                  15-17, 2015},
  pages        = {139--152},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2676726.2677014},
  doi          = {10.1145/2676726.2677014},
  timestamp    = {Mon, 08 Apr 2024 08:19:10 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/VeanesMML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/CochranDLMV15,
  author       = {Robert A. Cochran and
                  Loris D'Antoni and
                  Benjamin Livshits and
                  David Molnar and
                  Margus Veanes},
  editor       = {Sriram K. Rajamani and
                  David Walker},
  title        = {Program Boosting: Program Synthesis via Crowd-Sourcing},
  booktitle    = {Proceedings of the 42nd Annual {ACM} {SIGPLAN-SIGACT} Symposium on
                  Principles of Programming Languages, {POPL} 2015, Mumbai, India, January
                  15-17, 2015},
  pages        = {677--688},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2676726.2676973},
  doi          = {10.1145/2676726.2676973},
  timestamp    = {Wed, 23 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/CochranDLMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/VilkMLORMWG15,
  author       = {John Vilk and
                  David Molnar and
                  Benjamin Livshits and
                  Eyal Ofek and
                  Christopher J. Rossbach and
                  Alexander Moshchuk and
                  Helen J. Wang and
                  Ran Gal},
  title        = {SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {431--446},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.33},
  doi          = {10.1109/SP.2015.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/VilkMLORMWG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/KoscherKM15,
  author       = {Karl Koscher and
                  Tadayoshi Kohno and
                  David Molnar},
  editor       = {Aur{\'{e}}lien Francillon and
                  Thomas Ptacek},
  title        = {{SURROGATES:} Enabling Near-Real-Time Dynamic Analyses of Embedded
                  Systems},
  booktitle    = {9th {USENIX} Workshop on Offensive Technologies, {WOOT} '15, Washington,
                  DC, USA, August 10-11, 2015},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/woot15/workshop-program/presentation/koscher},
  timestamp    = {Mon, 01 Feb 2021 08:41:51 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/KoscherKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/RoesnerKM14,
  author       = {Franziska Roesner and
                  Tadayoshi Kohno and
                  David Molnar},
  title        = {Security and privacy for augmented reality systems},
  journal      = {Commun. {ACM}},
  volume       = {57},
  number       = {4},
  pages        = {88--96},
  year         = {2014},
  url          = {https://doi.org/10.1145/2580723.2580730},
  doi          = {10.1145/2580723.2580730},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/RoesnerKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RoesnerMMKW14,
  author       = {Franziska Roesner and
                  David Molnar and
                  Alexander Moshchuk and
                  Tadayoshi Kohno and
                  Helen J. Wang},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {World-Driven Access Control for Continuous Sensing},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1169--1181},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660319},
  doi          = {10.1145/2660267.2660319},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RoesnerMMKW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/WeissKMS14,
  author       = {Andreas Wei{\ss} and
                  Dimka Karastoyanova and
                  David Molnar and
                  Siegfried Schmauder},
  editor       = {Erhard Pl{\"{o}}dereder and
                  Lars Grunske and
                  Eric Schneider and
                  Dominik Ull},
  title        = {Coupling of Existing Simulations using Bottom-up Modeling of Choreographies},
  booktitle    = {44. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Big Data
                  - Komplexit{\"{a}}t meistern, {INFORMATIK} 2014, Stuttgart, Germany,
                  September 22-26, 2014},
  series       = {{LNI}},
  volume       = {{P-232}},
  pages        = {101--112},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/2770},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/WeissKMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/SmowtonLMSW14,
  author       = {Christopher Smowton and
                  Jacob R. Lorch and
                  David Molnar and
                  Stefan Saroiu and
                  Alec Wolman},
  editor       = {A. J. Brush and
                  Adrian Friday and
                  Julie A. Kientz and
                  James Scott and
                  Junehwa Song},
  title        = {Zero-effort payments: design, deployment, and lessons},
  booktitle    = {Proceedings of the 2014 {ACM} International Joint Conference on Pervasive
                  and Ubiquitous Computing, UbiComp '14, Seattle, WA, USA, September
                  13-17, 2014},
  pages        = {763--774},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2632048.2632067},
  doi          = {10.1145/2632048.2632067},
  timestamp    = {Tue, 26 Mar 2024 11:01:21 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/SmowtonLMSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/DAntoniVLM14,
  author       = {Loris D'Antoni and
                  Margus Veanes and
                  Benjamin Livshits and
                  David Molnar},
  editor       = {Michael F. P. O'Boyle and
                  Keshav Pingali},
  title        = {Fast: a transducer-based language for tree manipulation},
  booktitle    = {{ACM} {SIGPLAN} Conference on Programming Language Design and Implementation,
                  {PLDI} '14, Edinburgh, United Kingdom - June 09 - 11, 2014},
  pages        = {384--394},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2594291.2594309},
  doi          = {10.1145/2594291.2594309},
  timestamp    = {Thu, 24 Jun 2021 16:19:30 +0200},
  biburl       = {https://dblp.org/rec/conf/pldi/DAntoniVLM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotos/DAntoniDJKLMMORSVW13,
  author       = {Loris D'Antoni and
                  Alan M. Dunn and
                  Suman Jana and
                  Tadayoshi Kohno and
                  Benjamin Livshits and
                  David Molnar and
                  Alexander Moshchuk and
                  Eyal Ofek and
                  Franziska Roesner and
                  T. Scott Saponas and
                  Margus Veanes and
                  Helen J. Wang},
  editor       = {Petros Maniatis},
  title        = {Operating System Support for Augmented Reality Applications},
  booktitle    = {14th Workshop on Hot Topics in Operating Systems, HotOS XIV, Santa
                  Ana Pueblo, New Mexico, USA, May 13-15, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/hotos13/session/d\%27antoni},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/hotos/DAntoniDJKLMMORSVW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JanaMMDLWO13,
  author       = {Suman Jana and
                  David Molnar and
                  Alexander Moshchuk and
                  Alan M. Dunn and
                  Benjamin Livshits and
                  Helen J. Wang and
                  Eyal Ofek},
  editor       = {Samuel T. King},
  title        = {Enabling Fine-Grained Permissions for Augmented Reality Applications
                  with Recognizers},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {415--430},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/jana},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JanaMMDLWO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/VeanesHLMB12,
  author       = {Margus Veanes and
                  Pieter Hooimeijer and
                  Benjamin Livshits and
                  David Molnar and
                  Nikolaj S. Bj{\o}rner},
  editor       = {John Field and
                  Michael Hicks},
  title        = {Symbolic finite state transducers: algorithms and applications},
  booktitle    = {Proceedings of the 39th {ACM} {SIGPLAN-SIGACT} Symposium on Principles
                  of Programming Languages, {POPL} 2012, Philadelphia, Pennsylvania,
                  USA, January 22-28, 2012},
  pages        = {137--150},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2103656.2103674},
  doi          = {10.1145/2103656.2103674},
  timestamp    = {Thu, 14 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/VeanesHLMB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SaxenaML11,
  author       = {Prateek Saxena and
                  David Molnar and
                  Benjamin Livshits},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {{SCRIPTGARD:} automatic context-sensitive sanitization for large-scale
                  legacy web applications},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {601--614},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046776},
  doi          = {10.1145/2046707.2046776},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SaxenaML11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoft/SonntagHKMS11,
  author       = {Mirko Sonntag and
                  Sven Hotta and
                  Dimka Karastoyanova and
                  David Molnar and
                  Siegfried Schmauder},
  editor       = {Mar{\'{\i}}a Jos{\'{e}} Escalona Cuaresma and
                  Boris Shishkov and
                  Jos{\'{e}} Cordeiro},
  title        = {Workflow-based Distributed Environment for Legacy Simulation Applications},
  booktitle    = {{ICSOFT} 2011 - Proceedings of the 6th International Conference on
                  Software and Data Technologies, Volume 1, Seville, Spain, 18-21 July,
                  2011},
  pages        = {91--94},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Wed, 28 Sep 2011 18:26:31 +0200},
  biburl       = {https://dblp.org/rec/conf/icsoft/SonntagHKMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/servicewave/SonntagHKMS11,
  author       = {Mirko Sonntag and
                  Sven Hotta and
                  Dimka Karastoyanova and
                  David Molnar and
                  Siegfried Schmauder},
  editor       = {Witold Abramowicz and
                  Ignacio Mart{\'{\i}}n Llorente and
                  Mike Surridge and
                  Andrea Zisman and
                  Julien Vayssi{\`{e}}re},
  title        = {Using Services and Service Compositions to Enable the Distributed
                  Execution of Legacy Simulation Applications},
  booktitle    = {Towards a Service-Based Internet - 4th European Conference, ServiceWave
                  2011, Poznan, Poland, October 26-28, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6994},
  pages        = {242--253},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24755-2\_23},
  doi          = {10.1007/978-3-642-24755-2\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/servicewave/SonntagHKMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/PopaLMWZ11,
  author       = {Raluca Ada Popa and
                  Jacob R. Lorch and
                  David Molnar and
                  Helen J. Wang and
                  Li Zhuang},
  editor       = {Jason Nieh and
                  Carl A. Waldspurger},
  title        = {Enabling Security in Cloud Storage SLAs with CloudProof},
  booktitle    = {2011 {USENIX} Annual Technical Conference, Portland, OR, USA, June
                  15-17, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/usenixatc11/enabling-security-cloud-storage-slas-cloudproof},
  timestamp    = {Mon, 01 Feb 2021 08:43:25 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/PopaLMWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HooimeijerLMSV11,
  author       = {Pieter Hooimeijer and
                  Benjamin Livshits and
                  David Molnar and
                  Prateek Saxena and
                  Margus Veanes},
  title        = {Fast and Precise Sanitizer Analysis with {BEK}},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Hooimeijer.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HooimeijerLMSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MolnarEC10,
  author       = {David Molnar and
                  Serge Egelman and
                  Nicolas Christin},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {This is your data on drugs: lessons computer security can learn from
                  the drug war},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {143--149},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900566},
  doi          = {10.1145/1900546.1900566},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/MolnarEC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/EgelmanMCAHK10,
  author       = {Serge Egelman and
                  David Molnar and
                  Nicolas Christin and
                  Alessandro Acquisti and
                  Cormac Herley and
                  Shriram Krishnamurthi},
  title        = {Please Continue to Hold: An Empirical Study on User Tolerance of Security
                  Delays},
  booktitle    = {9th Annual Workshop on the Economics of Information Security, {WEIS}
                  2010, Harvard University, Cambridge, MA, USA, June 7-8, 2010},
  year         = {2010},
  url          = {http://weis2010.econinfosec.org/papers/session3/weis2010\_egelman.pdf},
  timestamp    = {Thu, 22 Jul 2021 16:15:46 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/EgelmanMCAHK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/MolnarS10,
  author       = {David Molnar and
                  Stuart E. Schechter},
  title        = {Self Hosting vs. Cloud Hosting: Accounting for the Security Impact
                  of Hosting in the Cloud},
  booktitle    = {9th Annual Workshop on the Economics of Information Security, {WEIS}
                  2010, Harvard University, Cambridge, MA, USA, June 7-8, 2010},
  year         = {2010},
  url          = {http://weis2010.econinfosec.org/papers/session5/weis2010\_schechter.pdf},
  timestamp    = {Thu, 22 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/MolnarS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/StevensSALMOW09,
  author       = {Marc Stevens and
                  Alexander Sotirov and
                  Jacob Appelbaum and
                  Arjen K. Lenstra and
                  David Molnar and
                  Dag Arne Osvik and
                  Benne de Weger},
  editor       = {Shai Halevi},
  title        = {Short Chosen-Prefix Collisions for {MD5} and the Creation of a Rogue
                  {CA} Certificate},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {55--69},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_4},
  doi          = {10.1007/978-3-642-03356-8\_4},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/StevensSALMOW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MolnarLW09,
  author       = {David Molnar and
                  Xue Cong Li and
                  David A. Wagner},
  editor       = {Fabian Monrose},
  title        = {Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs},
  booktitle    = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14,
                  2009, Proceedings},
  pages        = {67--82},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {http://www.usenix.org/events/sec09/tech/full\_papers/molnar.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MolnarLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StevensSALMOW09,
  author       = {Marc Stevens and
                  Alexander Sotirov and
                  Jacob Appelbaum and
                  Arjen K. Lenstra and
                  David Molnar and
                  Dag Arne Osvik and
                  Benne de Weger},
  title        = {Short Chosen-Prefix Collisions for {MD5} and the Creation of a Rogue
                  {CA} Certificate},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/111},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/StevensSALMOW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TsudikBJKMPR08,
  author       = {Gene Tsudik and
                  Mike Burmester and
                  Ari Juels and
                  Alfred Kobsa and
                  David Molnar and
                  Roberto Di Pietro and
                  Melanie R. Rieback},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {{RFID} security and privacy: long-term research or short-term tinkering?},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {160},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352560},
  doi          = {10.1145/1352533.1352560},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/TsudikBJKMPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HopperMW07,
  author       = {Nicholas Hopper and
                  David Molnar and
                  David A. Wagner},
  editor       = {Salil P. Vadhan},
  title        = {From Weak to Strong Watermarking},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {362--382},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_20},
  doi          = {10.1007/978-3-540-70936-7\_20},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HopperMW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CrutchfieldMTW06,
  author       = {Chris Crutchfield and
                  David Molnar and
                  David Turner and
                  David A. Wagner},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Generic On-Line/Off-Line Threshold Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {58--74},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_5},
  doi          = {10.1007/11745853\_5},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CrutchfieldMTW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MolnarKSW06,
  author       = {David Molnar and
                  Tadayoshi Kohno and
                  Naveen Sastry and
                  David A. Wagner},
  title        = {Tamper-Evident, History-Independent, Subliminal-Free Data Structures
                  on {PROM} Storage-or-How to Store Ballots on a Voting Machine (Extended
                  Abstract)},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {365--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.39},
  doi          = {10.1109/SP.2006.39},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MolnarKSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KissnerM06,
  author       = {Lea Kissner and
                  David Molnar},
  title        = {Provably Secure Subsitution of Cryptographic Tools},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KissnerM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MolnarKSW06,
  author       = {David Molnar and
                  Tadayoshi Kohno and
                  Naveen Sastry and
                  David A. Wagner},
  title        = {Tamper-Evident, History-Independent, Subliminal-Free Data Structures
                  on {PROM} Storage -or- How to Store Ballots on a Voting Machine},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MolnarKSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HopperMW06,
  author       = {Nicholas Hopper and
                  David Molnar and
                  David A. Wagner},
  title        = {From Weak to Strong Watermarking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HopperMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GentryMR05,
  author       = {Craig Gentry and
                  David Molnar and
                  Zulfikar Ramzan},
  editor       = {Bimal K. Roy},
  title        = {Efficient Designated Confirmer Signatures Without Random Oracles or
                  General Zero-Knowledge Proofs},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Chennai, India, December 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3788},
  pages        = {662--681},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593447\_36},
  doi          = {10.1007/11593447\_36},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GentryMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dialm/JainMR05,
  author       = {Ravi Jain and
                  David Molnar and
                  Zulfikar Ramzan},
  editor       = {Suman Banerjee and
                  Samrat Ganguly},
  title        = {Towards understanding algorithmic factors affecting energy consumption:
                  switching complexity, randomness, and preliminary experiments},
  booktitle    = {Proceedings of the {DIALM-POMC} Joint Workshop on Foundations of Mobile
                  Computing, Cologne, Germany, September 2, 2005},
  pages        = {70--79},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1080810.1080823},
  doi          = {10.1145/1080810.1080823},
  timestamp    = {Thu, 27 Apr 2023 08:33:19 +0200},
  biburl       = {https://dblp.org/rec/conf/dialm/JainMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MolnarPSW05,
  author       = {David Molnar and
                  Matt Piotrowski and
                  David Schultz and
                  David A. Wagner},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {The Program Counter Security Model: Automatic Detection and Removal
                  of Control-Flow Side Channel Attacks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {156--168},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_14},
  doi          = {10.1007/11734727\_14},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MolnarPSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DraperIMPRSW05,
  author       = {Stark C. Draper and
                  Prakash Ishwar and
                  David Molnar and
                  Vinod M. Prabhakaran and
                  Kannan Ramchandran and
                  Daniel Schonberg and
                  David A. Wagner},
  editor       = {Mauro Barni and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Stefan Katzenbeisser and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {An Analysis of Empirical {PMF} Based Tests for Least Significant Bit
                  Image Steganography},
  booktitle    = {Information Hiding, 7th International Workshop, {IH} 2005, Barcelona,
                  Spain, June 6-8, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3727},
  pages        = {327--341},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11558859\_24},
  doi          = {10.1007/11558859\_24},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DraperIMPRSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/MolnarSW05,
  author       = {David Molnar and
                  Andrea Soppera and
                  David A. Wagner},
  editor       = {Bart Preneel and
                  Stafford E. Tavares},
  title        = {A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer
                  of {RFID} Tags},
  booktitle    = {Selected Areas in Cryptography, 12th International Workshop, {SAC}
                  2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3897},
  pages        = {276--290},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11693383\_19},
  doi          = {10.1007/11693383\_19},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/MolnarSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/JuelsMW05,
  author       = {Ari Juels and
                  David Molnar and
                  David A. Wagner},
  title        = {Security and Privacy Issues in E-passports},
  booktitle    = {First International Conference on Security and Privacy for Emerging
                  Areas in Communications Networks, SecureComm 2005, Athens, Greece,
                  5-9 September, 2005},
  pages        = {74--88},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/SECURECOMM.2005.59},
  doi          = {10.1109/SECURECOMM.2005.59},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/JuelsMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/JainMR05,
  author       = {Ravi Jain and
                  David Molnar and
                  Zulfikar Ramzan},
  title        = {Towards a model of energy complexity for algorithms [mobile wireless
                  applications]},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2005,
                  March 13-17, 2005, New Orleans, Louisiana, {USA}},
  pages        = {1884--1890},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/WCNC.2005.1424799},
  doi          = {10.1109/WCNC.2005.1424799},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/JainMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/MolnarSW05,
  author       = {David Molnar and
                  Andrea Soppera and
                  David A. Wagner},
  editor       = {Vijay Atluri and
                  Sabrina De Capitani di Vimercati and
                  Roger Dingledine},
  title        = {Privacy for {RFID} through trusted computing},
  booktitle    = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005},
  pages        = {31--34},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102199.1102206},
  doi          = {10.1145/1102199.1102206},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/MolnarSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsMW05,
  author       = {Ari Juels and
                  David Molnar and
                  David A. Wagner},
  title        = {Security and Privacy Issues in E-passports},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MolnarSW05,
  author       = {David Molnar and
                  Andrea Soppera and
                  David A. Wagner},
  title        = {A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer
                  of {RFID} Tags},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {315},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/315},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MolnarSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MolnarPSW05,
  author       = {David Molnar and
                  Matt Piotrowski and
                  David Schultz and
                  David A. Wagner},
  title        = {The Program Counter Security Model: Automatic Detection and Removal
                  of Control-Flow Side Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {368},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/368},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MolnarPSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrutchfieldMTW05,
  author       = {Chris Crutchfield and
                  David Molnar and
                  David Turner and
                  David A. Wagner},
  title        = {Generic On-Line/Off-Line Threshold Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CrutchfieldMTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MolnarW04,
  author       = {David Molnar and
                  David A. Wagner},
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {Privacy and security in library {RFID:} issues, practices, and architectures},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages        = {210--219},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1030083.1030112},
  doi          = {10.1145/1030083.1030112},
  timestamp    = {Fri, 13 Nov 2020 16:10:44 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MolnarW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/GoodMUMMQW04,
  author       = {Nathan Good and
                  David Molnar and
                  Jennifer M. Urban and
                  Deirdre K. Mulligan and
                  Elizabeth Miles and
                  Laura Quilter and
                  David A. Wagner},
  editor       = {Vijay Atluri and
                  Paul F. Syverson and
                  Sabrina De Capitani di Vimercati},
  title        = {Radio frequency Id and privacy with information goods},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2004, Washington, DC, USA, October 28, 2004},
  pages        = {41--42},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029179.1029193},
  doi          = {10.1145/1029179.1029193},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/GoodMUMMQW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/VilaGM04,
  author       = {Tony Vila and
                  Rachel Greenstadt and
                  David Molnar},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Why We Can't Be Bothered to Read Privacy Policies - Models of Privacy
                  Economics as a Lemons Market},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {143--153},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_11},
  doi          = {10.1007/1-4020-8090-5\_11},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/VilaGM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMicec/VilaGM03,
  author       = {Tony Vila and
                  Rachel Greenstadt and
                  David Molnar},
  editor       = {Norman M. Sadeh and
                  Mary Jo Dively and
                  Robert J. Kauffman and
                  Yannis Labrou and
                  Onn Shehory and
                  Rahul Telang and
                  Lorrie Faith Cranor},
  title        = {Why we can't be bothered to read privacy policies models of privacy
                  economics as a lemons market},
  booktitle    = {Proceedings of the 5th International Conference on Electronic Commerce,
                  {ICEC} 2003, Pittsburgh, Pennsylvania, USA, September 30 - October
                  03, 2003},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {50},
  pages        = {403--407},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948005.948057},
  doi          = {10.1145/948005.948057},
  timestamp    = {Tue, 06 Apr 2021 12:12:56 +0200},
  biburl       = {https://dblp.org/rec/conf/ACMicec/VilaGM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JohnsonMSW02,
  author       = {Robert Johnson and
                  David Molnar and
                  Dawn Xiaodong Song and
                  David A. Wagner},
  editor       = {Bart Preneel},
  title        = {Homomorphic Signature Schemes},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {244--262},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_17},
  doi          = {10.1007/3-540-45760-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JohnsonMSW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/crossroads/Molnar01,
  author       = {David Molnar},
  title        = {On patrol: resource allocation, proofs of work, and consequences},
  journal      = {{XRDS}},
  volume       = {7},
  number       = {3},
  pages        = {28--31},
  year         = {2001},
  url          = {https://doi.org/10.1145/367884.367899},
  doi          = {10.1145/367884.367899},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/crossroads/Molnar01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DingledineFHM01,
  author       = {Roger Dingledine and
                  Michael J. Freedman and
                  David Hopwood and
                  David Molnar},
  editor       = {Ira S. Moskowitz},
  title        = {A Reputation System to Increase MIX-Net Reliability},
  booktitle    = {Information Hiding, 4th International Workshop, {IHW} 2001, Pittsburgh,
                  PA, USA, April 25-27, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2137},
  pages        = {126--141},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45496-9\_10},
  doi          = {10.1007/3-540-45496-9\_10},
  timestamp    = {Wed, 16 Mar 2022 23:55:28 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/DingledineFHM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/crossroads/Molnar00,
  author       = {David Molnar},
  title        = {Signing electronic contracts},
  journal      = {{XRDS}},
  volume       = {7},
  number       = {1},
  year         = {2000},
  url          = {https://doi.org/10.1145/351092.351096},
  doi          = {10.1145/351092.351096},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/crossroads/Molnar00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/diau/DingledineFM00,
  author       = {Roger Dingledine and
                  Michael J. Freedman and
                  David Molnar},
  editor       = {Hannes Federrath},
  title        = {The Free Haven Project: Distributed Anonymous Storage Service},
  booktitle    = {Designing Privacy Enhancing Technologies, International Workshop on
                  Design Issues in Anonymity and Unobservability, Berkeley, CA, USA,
                  July 25-26, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2009},
  pages        = {67--95},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44702-4\_5},
  doi          = {10.1007/3-540-44702-4\_5},
  timestamp    = {Wed, 16 Mar 2022 23:55:03 +0100},
  biburl       = {https://dblp.org/rec/conf/diau/DingledineFM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics