BibTeX records: Dan S. Wallach

download as .bib file

@inproceedings{DBLP:conf/iri/ZhaoZSWR23,
  author       = {Fei Zhao and
                  Chengcui Zhang and
                  Nitesh Saxena and
                  Dan S. Wallach and
                  AKM Shahariar Azad Rabby},
  title        = {Ballot Tabulation Using Deep Learning},
  booktitle    = {24th {IEEE} International Conference on Information Reuse and Integration
                  for Data Science, {IRI} 2023, Bellevue, WA, USA, August 4-6, 2023},
  pages        = {107--114},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IRI58017.2023.00026},
  doi          = {10.1109/IRI58017.2023.00026},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/ZhaoZSWR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/acm/22/BW2022,
  author       = {Matthew Bernhard and
                  Dan S. Wallach},
  title        = {Election Security: Risk Limiting Audits},
  series       = {{ACM} TechBrief},
  volume       = {5},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3568005},
  doi          = {10.1145/3568005},
  timestamp    = {Fri, 22 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/acm/22/BW2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hf/AcemyanKBW22,
  author       = {Claudia Ziegler Acemyan and
                  Philip T. Kortum and
                  Michael D. Byrne and
                  Dan S. Wallach},
  title        = {Summative Usability Assessments of STAR-Vote: {A} Cryptographically
                  Secure e2e Voting System That Has Been Empirically Proven to Be Easy
                  to Use},
  journal      = {Hum. Factors},
  volume       = {64},
  number       = {5},
  pages        = {866--889},
  year         = {2022},
  url          = {https://doi.org/10.1177/0018720818812586},
  doi          = {10.1177/0018720818812586},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/hf/AcemyanKBW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BenalohFSTW21,
  author       = {Josh Benaloh and
                  Kammi Foote and
                  Philip B. Stark and
                  Vanessa Teague and
                  Dan S. Wallach},
  title        = {VAULT-Style Risk-Limiting Audits and the Inyo County Pilot},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {4},
  pages        = {8--18},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3075107},
  doi          = {10.1109/MSEC.2021.3075107},
  timestamp    = {Wed, 14 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BenalohFSTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcses/SharmanAKW21,
  author       = {Jonathan Sharman and
                  Claudia Z. Acemyan and
                  Philip T. Kortum and
                  Dan S. Wallach},
  title        = {Bad Tools Hurt: Lessons for teaching computer security skills to undergraduates},
  journal      = {Int. J. Comput. Sci. Educ. Sch.},
  volume       = {5},
  number       = {2},
  pages        = {74--92},
  year         = {2021},
  url          = {https://doi.org/10.21585/ijcses.v5i2.131},
  doi          = {10.21585/IJCSES.V5I2.131},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcses/SharmanAKW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esann/BronkLLWH21,
  author       = {Chris Bronk and
                  Amaury Lendasse and
                  Peggy Lindner and
                  Dan S. Wallach and
                  Barbara Hammer},
  title        = {Machine Learning for Measuring and Analyzing Online Social Communications},
  booktitle    = {29th European Symposium on Artificial Neural Networks, Computational
                  Intelligence and Machine Learning, {ESANN} 2021, Online event (Bruges,
                  Belgium), October 6-8, 2021},
  year         = {2021},
  url          = {https://doi.org/10.14428/esann/2021.ES2021-3},
  doi          = {10.14428/ESANN/2021.ES2021-3},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esann/BronkLLWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hf/KortumSAWV20,
  author       = {Philip T. Kortum and
                  Robert Stein and
                  Claudia Ziegler Acemyan and
                  Dan S. Wallach and
                  Elizabeth Vann},
  title        = {How Human Factors Can Help Preserve Democracy in the Age of Pandemics},
  journal      = {Hum. Factors},
  volume       = {62},
  number       = {7},
  year         = {2020},
  url          = {https://doi.org/10.1177/0018720820946896},
  doi          = {10.1177/0018720820946896},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/hf/KortumSAWV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DinhRPW20,
  author       = {Thien{-}Nam Dinh and
                  Florentin Rochet and
                  Olivier Pereira and
                  Dan S. Wallach},
  title        = {Scaling Up Anonymous Communication with Efficient Nanopayment Channels},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {3},
  pages        = {175--203},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0048},
  doi          = {10.2478/POPETS-2020-0048},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DinhRPW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-07917,
  author       = {Daniel W. Song and
                  Konstantinos Mamouras and
                  Ang Chen and
                  Nathan Dautenhahn and
                  Dan S. Wallach},
  title        = {The Design and Implementation of a Verified File System with End-to-End
                  Data Integrity},
  journal      = {CoRR},
  volume       = {abs/2012.07917},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.07917},
  eprinttype    = {arXiv},
  eprint       = {2012.07917},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-07917.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/BernhardSAKWH19,
  author       = {Matthew Bernhard and
                  Jonathan Sharman and
                  Claudia Ziegler Acemyan and
                  Philip T. Kortum and
                  Dan S. Wallach and
                  J. Alex Halderman},
  editor       = {Stephen A. Brewster and
                  Geraldine Fitzpatrick and
                  Anna L. Cox and
                  Vassilis Kostakos},
  title        = {On the Usability of {HTTPS} Deployment},
  booktitle    = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019},
  pages        = {310},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3290605.3300540},
  doi          = {10.1145/3290605.3300540},
  timestamp    = {Sun, 02 Jun 2019 21:13:35 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/BernhardSAKWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LeeCW19,
  author       = {Jaeho Lee and
                  Ang Chen and
                  Dan S. Wallach},
  title        = {Total Recall: Persistence of Passwords in Android},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/total-recall-persistence-of-passwords-in-android/},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LeeCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-01897,
  author       = {Dan S. Wallach},
  title        = {On the security of ballot marking devices},
  journal      = {CoRR},
  volume       = {abs/1908.01897},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.01897},
  eprinttype    = {arXiv},
  eprint       = {1908.01897},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-01897.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-06176,
  author       = {Clayton Drazner and
                  Nikola Duza and
                  Hugo Jonker and
                  Dan S. Wallach},
  title        = {Investigating the effectiveness of web adblockers},
  journal      = {CoRR},
  volume       = {abs/1912.06176},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.06176},
  eprinttype    = {arXiv},
  eprint       = {1912.06176},
  timestamp    = {Thu, 02 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-06176.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RiaziCSWK19,
  author       = {M. Sadegh Riazi and
                  Beidi Chen and
                  Anshumali Shrivastava and
                  Dan S. Wallach and
                  Farinaz Koushanfar},
  title        = {Sub-Linear Privacy-Preserving Near-Neighbor Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1222},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1222},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RiaziCSWK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ImCW18,
  author       = {Bumjin Im and
                  Ang Chen and
                  Dan S. Wallach},
  title        = {An Historical Analysis of the SEAndroid Policy Evolution},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {629--640},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274709},
  doi          = {10.1145/3274694.3274709},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ImCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LeeW18,
  author       = {Jaeho Lee and
                  Dan S. Wallach},
  title        = {Removing Secrets from Android's {TLS}},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_01B-3\_Lee\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LeeW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-00920,
  author       = {Bumjin Im and
                  Ang Chen and
                  Dan S. Wallach},
  title        = {An Historical Analysis of the SEAndroid Policy Evolution},
  journal      = {CoRR},
  volume       = {abs/1812.00920},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.00920},
  eprinttype    = {arXiv},
  eprint       = {1812.00920},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-00920.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PridgenGW17,
  author       = {Adam Pridgen and
                  Simson L. Garfinkel and
                  Dan S. Wallach},
  title        = {Picking up the trash: Exploiting generational {GC} for memory analysis},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S20--S28},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.01.002},
  doi          = {10.1016/J.DIIN.2017.01.002},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/PridgenGW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/PridgenGW17,
  author       = {Adam Pridgen and
                  Simson L. Garfinkel and
                  Dan S. Wallach},
  editor       = {Tung Bui},
  title        = {Present but Unreachable: Reducing Persistentlatent Secrets in HotSpot
                  {JVM}},
  booktitle    = {50th Hawaii International Conference on System Sciences, {HICSS} 2017,
                  Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017},
  pages        = {1--10},
  publisher    = {ScholarSpace / {AIS} Electronic Library (AISeL)},
  year         = {2017},
  url          = {https://hdl.handle.net/10125/41887},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/PridgenGW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifm/MoranW17,
  author       = {Murat Moran and
                  Dan S. Wallach},
  editor       = {Nadia Polikarpova and
                  Steve A. Schneider},
  title        = {Verification of STAR-Vote and Evaluation of {FDR} and ProVerif},
  booktitle    = {Integrated Formal Methods - 13th International Conference, {IFM} 2017,
                  Turin, Italy, September 20-22, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10510},
  pages        = {422--436},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66845-1\_28},
  doi          = {10.1007/978-3-319-66845-1\_28},
  timestamp    = {Fri, 07 Aug 2020 17:57:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ifm/MoranW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TanashCWM17,
  author       = {Rima S. Tanash and
                  Zhouhan Chen and
                  Dan S. Wallach and
                  Melissa Marschall},
  editor       = {Jon Penney and
                  Nicholas Weaver},
  title        = {The Decline of Social Media Censorship and the Rise of Self-Censorship
                  after the 2016 Failed Turkish Coup},
  booktitle    = {7th {USENIX} Workshop on Free and Open Communications on the Internet,
                  {FOCI} 2017, Vancouver, BC, Canada, August 14, 2017},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/foci17/workshop-program/presentation/tanash},
  timestamp    = {Mon, 01 Feb 2021 08:42:51 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/TanashCWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/BernhardBHRRSTV17,
  author       = {Matthew Bernhard and
                  Josh Benaloh and
                  J. Alex Halderman and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Philip B. Stark and
                  Vanessa Teague and
                  Poorvi L. Vora and
                  Dan S. Wallach},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Nadja Braun Binder and
                  Norbert Kersting and
                  Olivier Pereira and
                  Carsten Sch{\"{u}}rmann},
  title        = {Public Evidence from Secret Ballots},
  booktitle    = {Electronic Voting - Second International Joint Conference, E-Vote-ID
                  2017, Bregenz, Austria, October 24-27, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10615},
  pages        = {84--109},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68687-5\_6},
  doi          = {10.1007/978-3-319-68687-5\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/BernhardBHRRSTV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/PereiraW17,
  author       = {Olivier Pereira and
                  Dan S. Wallach},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Nadja Braun Binder and
                  Norbert Kersting and
                  Olivier Pereira and
                  Carsten Sch{\"{u}}rmann},
  title        = {Clash Attacks and the STAR-Vote System},
  booktitle    = {Electronic Voting - Second International Joint Conference, E-Vote-ID
                  2017, Bregenz, Austria, October 24-27, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10615},
  pages        = {228--247},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68687-5\_14},
  doi          = {10.1007/978-3-319-68687-5\_14},
  timestamp    = {Thu, 19 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/PereiraW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MoranW17,
  author       = {Murat Moran and
                  Dan S. Wallach},
  title        = {Verification of STAR-Vote and Evaluation of {FDR} and ProVerif},
  journal      = {CoRR},
  volume       = {abs/1705.00782},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.00782},
  eprinttype    = {arXiv},
  eprint       = {1705.00782},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MoranW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BenalohBHRRSTVW17,
  author       = {Josh Benaloh and
                  Matthew Bernhard and
                  J. Alex Halderman and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Philip B. Stark and
                  Vanessa Teague and
                  Poorvi L. Vora and
                  Dan S. Wallach},
  title        = {Public Evidence from Secret Ballots},
  journal      = {CoRR},
  volume       = {abs/1707.08619},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.08619},
  eprinttype    = {arXiv},
  eprint       = {1707.08619},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BenalohBHRRSTVW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2016w,
  editor       = {Jeremy Clark and
                  Sarah Meiklejohn and
                  Peter Y. A. Ryan and
                  Dan S. Wallach and
                  Michael Brenner and
                  Kurt Rohloff},
  title        = {Financial Cryptography and Data Security - {FC} 2016 International
                  Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
                  26, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9604},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53357-4},
  doi          = {10.1007/978-3-662-53357-4},
  isbn         = {978-3-662-53356-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2016w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RiaziCSWK16,
  author       = {M. Sadegh Riazi and
                  Beidi Chen and
                  Anshumali Shrivastava and
                  Dan S. Wallach and
                  Farinaz Koushanfar},
  title        = {Sub-linear Privacy-preserving Search with Untrusted Server and Semi-honest
                  Parties},
  journal      = {CoRR},
  volume       = {abs/1612.01835},
  year         = {2016},
  url          = {http://arxiv.org/abs/1612.01835},
  eprinttype    = {arXiv},
  eprint       = {1612.01835},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RiaziCSWK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BatesBSSTW15,
  author       = {Adam Bates and
                  Kevin R. B. Butler and
                  Micah Sherr and
                  Clay Shields and
                  Patrick Traynor and
                  Dan S. Wallach},
  title        = {Accountable wiretapping - or - {I} know they can hear you now},
  journal      = {J. Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {167--195},
  year         = {2015},
  url          = {https://doi.org/10.3233/JCS-140515},
  doi          = {10.3233/JCS-140515},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BatesBSSTW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/LiuBDMW15,
  author       = {Yue Liu and
                  David R. Bild and
                  Robert P. Dick and
                  Zhuoqing Morley Mao and
                  Dan S. Wallach},
  title        = {The Mason Test: {A} Defense Against Sybil Attacks in Wireless Networks
                  Without Trusted Authorities},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {14},
  number       = {11},
  pages        = {2376--2391},
  year         = {2015},
  url          = {https://doi.org/10.1109/TMC.2015.2398425},
  doi          = {10.1109/TMC.2015.2398425},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/LiuBDMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/BildLDMW15,
  author       = {David R. Bild and
                  Yue Liu and
                  Robert P. Dick and
                  Zhuoqing Morley Mao and
                  Dan S. Wallach},
  title        = {Aggregate Characterization of User Behavior in Twitter and Analysis
                  of the Retweet Graph},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {15},
  number       = {1},
  pages        = {4:1--4:24},
  year         = {2015},
  url          = {https://doi.org/10.1145/2700060},
  doi          = {10.1145/2700060},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/BildLDMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/AcemyanKBW15,
  author       = {Claudia Z. Acemyan and
                  Philip T. Kortum and
                  Michael D. Byrne and
                  Dan S. Wallach},
  editor       = {Theo Tryfonas and
                  Ioannis G. Askoxylakis},
  title        = {Users' Mental Models for Three End-to-End Voting Systems: Helios,
                  Pr{\^{e}}t {\`{a}} Voter, and Scantegrity {II}},
  booktitle    = {Human Aspects of Information Security, Privacy, and Trust - Third
                  International Conference, {HAS} 2015, Held as Part of {HCI} International
                  2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9190},
  pages        = {463--474},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20376-8\_41},
  doi          = {10.1007/978-3-319-20376-8\_41},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/AcemyanKBW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/DresslerBW15,
  author       = {Judson C. Dressler and
                  Christopher Bronk and
                  Daniel S. Wallach},
  editor       = {Qinqing Zhang and
                  Jerry Brand and
                  Thomas G. MacDonald and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {Exploiting military OpSec through open-source vulnerabilities},
  booktitle    = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa,
                  FL, USA, October 26-28, 2015},
  pages        = {450--458},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MILCOM.2015.7357484},
  doi          = {10.1109/MILCOM.2015.7357484},
  timestamp    = {Thu, 07 Nov 2019 09:04:27 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/DresslerBW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/LiuBASDWM15,
  author       = {Yue Liu and
                  David R. Bild and
                  David Adrian and
                  Gulshan Singh and
                  Robert P. Dick and
                  Dan S. Wallach and
                  Zhuoqing Morley Mao},
  editor       = {Sherman X. Shen and
                  Youxian Sun and
                  Jiming Chen and
                  Junshan Zhang and
                  Gil Zussman},
  title        = {Performance and Energy Consumption Analysis of a Delay-Tolerant Network
                  for Censorship-Resistant Communication},
  booktitle    = {Proceedings of the 16th {ACM} International Symposium on Mobile Ad
                  Hoc Networking and Computing, MobiHoc 2015, Hangzhou, China, June
                  22-25, 2015},
  pages        = {257--266},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746285.2746320},
  doi          = {10.1145/2746285.2746320},
  timestamp    = {Mon, 24 Aug 2020 18:01:28 +0200},
  biburl       = {https://dblp.org/rec/conf/mobihoc/LiuBASDWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/TanashCTWS15,
  author       = {Rima S. Tanash and
                  Zhouhan Chen and
                  Tanmay Thakur and
                  Dan S. Wallach and
                  Devika Subramanian},
  editor       = {Indrajit Ray and
                  Nicholas Hopper and
                  Rob Jansen},
  title        = {Known Unknowns: An Analysis of Twitter Censorship in Turkey},
  booktitle    = {Proceedings of the 14th {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2015, Denver, Colorado, USA, October 12, 2015},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808138.2808147},
  doi          = {10.1145/2808138.2808147},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/TanashCTWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BookW15,
  author       = {Theodore Book and
                  Dan S. Wallach},
  title        = {An Empirical Study of Mobile Ad Targeting},
  journal      = {CoRR},
  volume       = {abs/1502.06577},
  year         = {2015},
  url          = {http://arxiv.org/abs/1502.06577},
  eprinttype    = {arXiv},
  eprint       = {1502.06577},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BookW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SongZBSWS15,
  author       = {Daniel Song and
                  Jisheng Zhao and
                  Michael G. Burke and
                  Dragos Sbirlea and
                  Dan S. Wallach and
                  Vivek Sarkar},
  title        = {Finding Tizen security bugs through whole-system static analysis},
  journal      = {CoRR},
  volume       = {abs/1504.05967},
  year         = {2015},
  url          = {http://arxiv.org/abs/1504.05967},
  eprinttype    = {arXiv},
  eprint       = {1504.05967},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SongZBSWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Wallach14,
  author       = {Dan S. Wallach},
  title        = {Smartphone security 'taint' what it used to be: technical perspective},
  journal      = {Commun. {ACM}},
  volume       = {57},
  number       = {3},
  pages        = {98},
  year         = {2014},
  url          = {https://doi.org/10.1145/2576234},
  doi          = {10.1145/2576234},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Wallach14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/RostamiMKWD14,
  author       = {Masoud Rostami and
                  Mehrdad Majzoobi and
                  Farinaz Koushanfar and
                  Dan S. Wallach and
                  Srinivas Devadas},
  title        = {Robust and Reverse-Engineering Resilient {PUF} Authentication and
                  Key-Exchange by Substring Matching},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {2},
  number       = {1},
  pages        = {37--49},
  year         = {2014},
  url          = {https://doi.org/10.1109/TETC.2014.2300635},
  doi          = {10.1109/TETC.2014.2300635},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/RostamiMKWD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DietzW14,
  author       = {Michael Dietz and
                  Dan S. Wallach},
  title        = {Hardening Persona - Improving Federated Web Login},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/hardening-persona-improving-federated-web-login},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/DietzW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AcemyanKBW14,
  author       = {Claudia Z. Acemyan and
                  Philip T. Kortum and
                  Michael D. Byrne and
                  Dan S. Wallach},
  title        = {Usability of Voter Verifiable, End-to-end Voting Systems: Baseline
                  Data for Helios, Pr{\^{e}}t {\`{a}} Voter, and Scantegrity {II}},
  booktitle    = {2014 Electronic Voting Technology Workshop/Workshop on Trustworthy
                  Elections, {EVT/WOTE} '14, San Diego, CA, USA, August 18-19, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/evtwote14/workshop-program/presentation/acemyan},
  timestamp    = {Mon, 01 Feb 2021 08:42:52 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AcemyanKBW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BildLDMW14,
  author       = {David R. Bild and
                  Yue Liu and
                  Robert P. Dick and
                  Zhuoqing Morley Mao and
                  Dan S. Wallach},
  title        = {Aggregate Characterization of User Behavior in Twitter and Analysis
                  of the Retweet Graph},
  journal      = {CoRR},
  volume       = {abs/1402.2671},
  year         = {2014},
  url          = {http://arxiv.org/abs/1402.2671},
  eprinttype    = {arXiv},
  eprint       = {1402.2671},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BildLDMW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BildLDMW14a,
  author       = {David R. Bild and
                  Yue Liu and
                  Robert P. Dick and
                  Zhuoqing Morley Mao and
                  Dan S. Wallach},
  title        = {Performance Analysis of Location Profile Routing},
  journal      = {CoRR},
  volume       = {abs/1403.4677},
  year         = {2014},
  url          = {http://arxiv.org/abs/1403.4677},
  eprinttype    = {arXiv},
  eprint       = {1403.4677},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BildLDMW14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiuBDMW14,
  author       = {Yue Liu and
                  David R. Bild and
                  Robert P. Dick and
                  Zhuoqing Morley Mao and
                  Dan S. Wallach},
  title        = {The Mason Test: {A} Defense Against Sybil Attacks in Wireless Networks
                  Without Trusted Authorities},
  journal      = {CoRR},
  volume       = {abs/1403.5871},
  year         = {2014},
  url          = {http://arxiv.org/abs/1403.5871},
  eprinttype    = {arXiv},
  eprint       = {1403.5871},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LiuBDMW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SaniZW14,
  author       = {Ardalan Amiri Sani and
                  Lin Zhong and
                  Dan S. Wallach},
  title        = {Glider: {A} {GPU} Library Driver for Improved System Security},
  journal      = {CoRR},
  volume       = {abs/1411.3777},
  year         = {2014},
  url          = {http://arxiv.org/abs/1411.3777},
  eprinttype    = {arXiv},
  eprint       = {1411.3777},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SaniZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BookW13,
  author       = {Theodore Book and
                  Dan S. Wallach},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {A case of collusion: a study of the interface between ad libraries
                  and their apps},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {79--86},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516762},
  doi          = {10.1145/2516760.2516762},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BookW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BenalohBEKMPSWFMPW13,
  author       = {Josh Benaloh and
                  Michael D. Byrne and
                  Bryce Eakin and
                  Philip T. Kortum and
                  Neal McBurnett and
                  Olivier Pereira and
                  Philip B. Stark and
                  Dan S. Wallach and
                  Gail Fisher and
                  Julian Montoya and
                  Michelle Parker and
                  Michael Winn},
  title        = {STAR-Vote: {A} Secure, Transparent, Auditable, and Reliable Voting
                  System},
  booktitle    = {2013 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '13, Washington, D.C., USA, August 12-13, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/evtwote13/workshop-program/presentation/bell},
  timestamp    = {Mon, 01 Feb 2021 08:42:58 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BenalohBEKMPSWFMPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhuPPCW13,
  author       = {Tao Zhu and
                  David Phipps and
                  Adam Pridgen and
                  Jedidiah R. Crandall and
                  Dan S. Wallach},
  editor       = {Samuel T. King},
  title        = {The Velocity of Censorship: High-Fidelity Detection of Microblog Post
                  Deletions},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {227--240},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/zhu},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhuPPCW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1303-0597,
  author       = {Tao Zhu and
                  David Phipps and
                  Adam Pridgen and
                  Jedidiah R. Crandall and
                  Dan S. Wallach},
  title        = {The Velocity of Censorship: High-Fidelity Detection of Microblog Post
                  Deletions},
  journal      = {CoRR},
  volume       = {abs/1303.0597},
  year         = {2013},
  url          = {http://arxiv.org/abs/1303.0597},
  eprinttype    = {arXiv},
  eprint       = {1303.0597},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1303-0597.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1303-0857,
  author       = {Theodore Book and
                  Adam Pridgen and
                  Dan S. Wallach},
  title        = {Longitudinal Analysis of Android Ad Library Permissions},
  journal      = {CoRR},
  volume       = {abs/1303.0857},
  year         = {2013},
  url          = {http://arxiv.org/abs/1303.0857},
  eprinttype    = {arXiv},
  eprint       = {1303.0857},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1303-0857.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1305-0245,
  author       = {Theodore Book and
                  Martha Witick and
                  Dan S. Wallach},
  title        = {Automated generation of web server fingerprints},
  journal      = {CoRR},
  volume       = {abs/1305.0245},
  year         = {2013},
  url          = {http://arxiv.org/abs/1305.0245},
  eprinttype    = {arXiv},
  eprint       = {1305.0245},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1305-0245.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BookW13,
  author       = {Theodore Book and
                  Dan S. Wallach},
  title        = {A Case of Collusion: {A} Study of the Interface Between Ad Libraries
                  and their Apps},
  journal      = {CoRR},
  volume       = {abs/1307.6082},
  year         = {2013},
  url          = {http://arxiv.org/abs/1307.6082},
  eprinttype    = {arXiv},
  eprint       = {1307.6082},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BookW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/ShekharDW12,
  author       = {Shashi Shekhar and
                  Michael Dietz and
                  Dan S. Wallach},
  title        = {AdSplit: Separating Smartphone Advertising from Applications},
  journal      = {login Usenix Mag.},
  volume       = {37},
  number       = {6},
  year         = {2012},
  url          = {https://www.usenix.org/publications/login/december-2012-volume-37-number-6/adsplit-separating-smartphone-advertising},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/ShekharDW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CzeskisDKWB12,
  author       = {Alexei Czeskis and
                  Michael Dietz and
                  Tadayoshi Kohno and
                  Dan S. Wallach and
                  Dirk Balfanz},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Strengthening user authentication through opportunistic cryptographic
                  identity assertions},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {404--414},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382240},
  doi          = {10.1145/2382196.2382240},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CzeskisDKWB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BatesBSSTW12,
  author       = {Adam Bates and
                  Kevin R. B. Butler and
                  Micah Sherr and
                  Clay Shields and
                  Patrick Traynor and
                  Dan S. Wallach},
  title        = {Accountable Wiretapping -or- {I} know they can hear you now},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/accountable-wiretapping-or-i-know-they-can-hear-you-now},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BatesBSSTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisisis/SongSPTWCL12,
  author       = {Peiyou Song and
                  Anhei Shu and
                  David Phipps and
                  Mohit Tiwari and
                  Dan S. Wallach and
                  Jedidiah R. Crandall and
                  George F. Luger},
  title        = {Language without words: {A} pointillist model for natural language
                  processing},
  booktitle    = {The 6th International Conference on Soft Computing and Intelligent
                  Systems (SCIS), and The 13th International Symposium on Advanced Intelligence
                  Systems (ISIS), Kobe, Japan, November 20-24, 2012},
  pages        = {11--15},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SCIS-ISIS.2012.6505413},
  doi          = {10.1109/SCIS-ISIS.2012.6505413},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisisis/SongSPTWCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MajzoobiRKWD12,
  author       = {Mehrdad Majzoobi and
                  Masoud Rostami and
                  Farinaz Koushanfar and
                  Dan S. Wallach and
                  Srinivas Devadas},
  title        = {Slender {PUF} Protocol: {A} Lightweight, Robust, and Secure Authentication
                  by Substring Matching},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {33--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.30},
  doi          = {10.1109/SPW.2012.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MajzoobiRKWD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AaseCDKMSWZ12,
  author       = {Nicholas Aase and
                  Jedidiah R. Crandall and
                  Alvaro Diaz and
                  Jeffrey Knockel and
                  Jorge Ocana Molinero and
                  Jared Saia and
                  Dan S. Wallach and
                  Tao Zhu},
  editor       = {Roger Dingledine and
                  Joss Wright},
  title        = {Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors'
                  Resources and Motivations},
  booktitle    = {2nd {USENIX} Workshop on Free and Open Communications on the Internet,
                  {FOCI} '12, Bellevue, WA, USA, August 6, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/foci12/workshop-program/presentation/aase},
  timestamp    = {Mon, 01 Feb 2021 08:43:10 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AaseCDKMSWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DietzCBW12,
  author       = {Michael Dietz and
                  Alexei Czeskis and
                  Dirk Balfanz and
                  Dan S. Wallach},
  editor       = {Tadayoshi Kohno},
  title        = {Origin-Bound Certificates: {A} Fresh Approach to Strong Client Authentication
                  for the Web},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {317--331},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/dietz},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DietzCBW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ShekharDW12,
  author       = {Shashi Shekhar and
                  Michael Dietz and
                  Dan S. Wallach},
  editor       = {Tadayoshi Kohno},
  title        = {AdSplit: Separating Smartphone Advertising from Applications},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {553--567},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/shekhar},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ShekharDW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1202-4030,
  author       = {Shashi Shekhar and
                  Michael Dietz and
                  Dan S. Wallach},
  title        = {AdSplit: Separating smartphone advertising from applications},
  journal      = {CoRR},
  volume       = {abs/1202.4030},
  year         = {2012},
  url          = {http://arxiv.org/abs/1202.4030},
  eprinttype    = {arXiv},
  eprint       = {1202.4030},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1202-4030.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1206-4958,
  author       = {Peiyou Song and
                  Anhei Shu and
                  Anyu Zhou and
                  Dan S. Wallach and
                  Jedidiah R. Crandall},
  title        = {A Pointillism Approach for Natural Language Processing of Social Media},
  journal      = {CoRR},
  volume       = {abs/1206.4958},
  year         = {2012},
  url          = {http://arxiv.org/abs/1206.4958},
  eprinttype    = {arXiv},
  eprint       = {1206.4958},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1206-4958.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1211-1904,
  author       = {Josh Benaloh and
                  Mike Byrne and
                  Philip T. Kortum and
                  Neal McBurnett and
                  Olivier Pereira and
                  Philip B. Stark and
                  Dan S. Wallach},
  title        = {STAR-Vote: {A} Secure, Transparent, Auditable, and Reliable Voting
                  System},
  journal      = {CoRR},
  volume       = {abs/1211.1904},
  year         = {2012},
  url          = {http://arxiv.org/abs/1211.1904},
  eprinttype    = {arXiv},
  eprint       = {1211.1904},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1211-1904.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1211-6166,
  author       = {Tao Zhu and
                  David Phipps and
                  Adam Pridgen and
                  Jedidiah R. Crandall and
                  Dan S. Wallach},
  title        = {Tracking and Quantifying Censorship on a Chinese Microblogging Site},
  journal      = {CoRR},
  volume       = {abs/1211.6166},
  year         = {2012},
  url          = {http://arxiv.org/abs/1211.6166},
  eprinttype    = {arXiv},
  eprint       = {1211.6166},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1211-6166.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1212-3228,
  author       = {Peiyou Song and
                  Anhei Shu and
                  David Phipps and
                  Dan S. Wallach and
                  Mohit Tiwari and
                  Jedidiah R. Crandall and
                  George F. Luger},
  title        = {Language Without Words: {A} Pointillist Model for Natural Language
                  Processing},
  journal      = {CoRR},
  volume       = {abs/1212.3228},
  year         = {2012},
  url          = {http://arxiv.org/abs/1212.3228},
  eprinttype    = {arXiv},
  eprint       = {1212.3228},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1212-3228.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Wallach11,
  author       = {Dan S. Wallach},
  title        = {Rebooting the {CS} publication process},
  journal      = {Commun. {ACM}},
  volume       = {54},
  number       = {10},
  pages        = {32--35},
  year         = {2011},
  url          = {https://doi.org/10.1145/2001269.2001283},
  doi          = {10.1145/2001269.2001283},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Wallach11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CrosbyW11,
  author       = {Scott A. Crosby and
                  Dan S. Wallach},
  title        = {Authenticated Dictionaries: Real-World Costs and Trade-Offs},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {17:1--17:30},
  year         = {2011},
  url          = {https://doi.org/10.1145/2019599.2019602},
  doi          = {10.1145/2019599.2019602},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CrosbyW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiarch/BildLDMW11,
  author       = {David R. Bild and
                  Yue Liu and
                  Robert P. Dick and
                  Z. Morley Mao and
                  Dan S. Wallach},
  editor       = {Kyle Jamieson and
                  Ratul Mahajan},
  title        = {Using predictable mobility patterns to support scalable and secure
                  MANETs of handheld devices},
  booktitle    = {Proceedings of the sixth international workshop on MobiArch, MobiArch
                  '11, Bethesda, Maryland, USA, June 28, 2011},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1999916.1999921},
  doi          = {10.1145/1999916.1999921},
  timestamp    = {Fri, 10 Dec 2021 09:31:29 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiarch/BildLDMW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DietzSPSW11,
  author       = {Michael Dietz and
                  Shashi Shekhar and
                  Yuliy Pisetsky and
                  Anhei Shu and
                  Dan S. Wallach},
  title        = {{QUIRE:} Lightweight Provenance for Smart Phone Operating Systems},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Dietz7-26-11.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DietzSPSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/CrosbyW11,
  author       = {Scott A. Crosby and
                  Dan S. Wallach},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Algorithmic DoS},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {32--33},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_261},
  doi          = {10.1007/978-1-4419-5906-5\_261},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/CrosbyW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1102-2445,
  author       = {Michael Dietz and
                  Shashi Shekhar and
                  Yuliy Pisetsky and
                  Anhei Shu and
                  Dan S. Wallach},
  title        = {Quire: Lightweight Provenance for Smart Phone Operating Systems},
  journal      = {CoRR},
  volume       = {abs/1102.2445},
  year         = {2011},
  url          = {http://arxiv.org/abs/1102.2445},
  eprinttype    = {arXiv},
  eprint       = {1102.2445},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1102-2445.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1107-3794,
  author       = {Tao Zhu and
                  Christopher Bronk and
                  Dan S. Wallach},
  title        = {An Analysis of Chinese Search Engine Filtering},
  journal      = {CoRR},
  volume       = {abs/1107.3794},
  year         = {2011},
  url          = {http://arxiv.org/abs/1107.3794},
  eprinttype    = {arXiv},
  eprint       = {1107.3794},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1107-3794.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1108-2704,
  author       = {Seth James Nielson and
                  Seth J. Fogarty and
                  Dan S. Wallach},
  title        = {Attacks on Local Searching Tools},
  journal      = {CoRR},
  volume       = {abs/1108.2704},
  year         = {2011},
  url          = {http://arxiv.org/abs/1108.2704},
  eprinttype    = {arXiv},
  eprint       = {1108.2704},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1108-2704.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1108-2716,
  author       = {Seth James Nielson and
                  Caleb E. Spare and
                  Dan S. Wallach},
  title        = {Building Better Incentives for Robustness in BitTorrent},
  journal      = {CoRR},
  volume       = {abs/1108.2716},
  year         = {2011},
  url          = {http://arxiv.org/abs/1108.2716},
  eprinttype    = {arXiv},
  eprint       = {1108.2716},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1108-2716.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1108-2718,
  author       = {Seth James Nielson and
                  Dan S. Wallach},
  title        = {The BitTorrent Anonymity Marketplace},
  journal      = {CoRR},
  volume       = {abs/1108.2718},
  year         = {2011},
  url          = {http://arxiv.org/abs/1108.2718},
  eprinttype    = {arXiv},
  eprint       = {1108.2718},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1108-2718.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1109-6874,
  author       = {Dustin Bachrach and
                  Christopher Nunu and
                  Dan S. Wallach and
                  Matthew K. Wright},
  title        = {{\#}h00t: Censorship Resistant Microblogging},
  journal      = {CoRR},
  volume       = {abs/1109.6874},
  year         = {2011},
  url          = {http://arxiv.org/abs/1109.6874},
  eprinttype    = {arXiv},
  eprint       = {1109.6874},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1109-6874.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Wallach10,
  author       = {Dan S. Wallach},
  title        = {Technical perspective - Native Client: a clever alternative},
  journal      = {Commun. {ACM}},
  volume       = {53},
  number       = {1},
  pages        = {90},
  year         = {2010},
  url          = {https://doi.org/10.1145/1629175.1629202},
  doi          = {10.1145/1629175.1629202},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Wallach10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/NganDW10,
  author       = {Tsuen{-}Wan Ngan and
                  Roger Dingledine and
                  Dan S. Wallach},
  editor       = {Radu Sion},
  title        = {Building Incentives into Tor},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {238--256},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_19},
  doi          = {10.1007/978-3-642-14577-3\_19},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/NganDW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/essos/2010,
  editor       = {Fabio Massacci and
                  Dan S. Wallach and
                  Nicola Zannone},
  title        = {Engineering Secure Software and Systems, Second International Symposium,
                  ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5965},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11747-3},
  doi          = {10.1007/978-3-642-11747-3},
  isbn         = {978-3-642-11746-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Wallach09,
  author       = {Dan S. Wallach},
  title        = {Technical perspective - Tools for information to flow securely and
                  Swift-ly},
  journal      = {Commun. {ACM}},
  volume       = {52},
  number       = {2},
  pages        = {78},
  year         = {2009},
  url          = {https://doi.org/10.1145/1461928.1461948},
  doi          = {10.1145/1461928.1461948},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Wallach09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CrosbyWR09,
  author       = {Scott A. Crosby and
                  Dan S. Wallach and
                  Rudolf H. Riedi},
  title        = {Opportunities and Limits of Remote Timing Attacks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {17:1--17:29},
  year         = {2009},
  url          = {https://doi.org/10.1145/1455526.1455530},
  doi          = {10.1145/1455526.1455530},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CrosbyWR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CrosbyW09,
  author       = {Scott A. Crosby and
                  Dan S. Wallach},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Super-Efficient Aggregating History-Independent Persistent Authenticated
                  Dictionaries},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {671--688},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_41},
  doi          = {10.1007/978-3-642-04444-1\_41},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CrosbyW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptps/SandlerW09,
  author       = {Daniel Sandler and
                  Dan S. Wallach},
  editor       = {Rodrigo Rodrigues and
                  Keith W. Ross},
  title        = {Birds of a {FETHR:} open, decentralized micropublishing},
  booktitle    = {Proceedings of the 8th international conference on Peer-to-peer systems,
                  IPTPS'09, Boston, MA, USA, April 21, 2009},
  pages        = {1},
  publisher    = {{USENIX}},
  year         = {2009},
  url          = {http://www.iptps.org/papers-2009/sandler.pdf},
  timestamp    = {Thu, 14 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iptps/SandlerW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CrosbyW09,
  author       = {Scott A. Crosby and
                  Dan S. Wallach},
  editor       = {Fabian Monrose},
  title        = {Efficient Data Structures For Tamper-Evident Logging},
  booktitle    = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14,
                  2009, Proceedings},
  pages        = {317--334},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {http://www.usenix.org/events/sec09/tech/full\_papers/crosby.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CrosbyW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OksuzogluW09,
  author       = {Ersin {\"{O}}ks{\"{u}}zoglu and
                  Dan S. Wallach},
  editor       = {David Jefferson and
                  Joseph Lorenzo Hall and
                  Tal Moran},
  title        = {VoteBox Nano: {A} Smaller, Stronger FPGA-based Voting Machine},
  booktitle    = {2009 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '09, Montreal, Canada, August 10-11, 2009},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {https://www.usenix.org/conference/evtwote-09/votebox-nano-smaller-stronger-fpga-based-voting-machine},
  timestamp    = {Mon, 01 Feb 2021 08:43:14 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/OksuzogluW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/EverettGBWDST08,
  author       = {Sarah P. Everett and
                  Kristen K. Greene and
                  Michael D. Byrne and
                  Dan S. Wallach and
                  Kyle Derr and
                  Daniel Sandler and
                  Ted Torous},
  editor       = {Mary Czerwinski and
                  Arnold M. Lund and
                  Desney S. Tan},
  title        = {Electronic voting machines versus traditional methods: improved preference,
                  similar performance},
  booktitle    = {Proceedings of the 2008 Conference on Human Factors in Computing Systems,
                  {CHI} 2008, 2008, Florence, Italy, April 5-10, 2008},
  pages        = {883--892},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1357054.1357195},
  doi          = {10.1145/1357054.1357195},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/EverettGBWDST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sadfe/SandlerDCW08,
  author       = {Daniel Sandler and
                  Kyle Derr and
                  Scott A. Crosby and
                  Dan S. Wallach},
  title        = {Finding the Evidence in Tamper-Evident Logs},
  booktitle    = {Third International Workshop on Systematic Approaches to Digital Forensic
                  Engineering, {SADFE} 2008, Berkeley, California, USA, May 22, 2008},
  pages        = {69--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SADFE.2008.22},
  doi          = {10.1109/SADFE.2008.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sadfe/SandlerDCW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SandlerDW08,
  author       = {Daniel Sandler and
                  Kyle Derr and
                  Dan S. Wallach},
  editor       = {Paul C. van Oorschot},
  title        = {VoteBox: {A} Tamper-evident, Verifiable Electronic Voting System},
  booktitle    = {Proceedings of the 17th {USENIX} Security Symposium, July 28-August
                  1, 2008, San Jose, CA, {USA}},
  pages        = {349--364},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/sec08/tech/full\_papers/sandler/sandler.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SandlerDW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SandlerW08,
  author       = {Daniel Sandler and
                  Dan S. Wallach},
  editor       = {David L. Dill and
                  Tadayoshi Kohno},
  title        = {The Case for Networked Remote Voting Precincts},
  booktitle    = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July
                  28-29, 2008, San Jose, CA, USA, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/evt08/tech/full\_papers/sandler/sandler.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SandlerW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Wallach07,
  author       = {Dan S. Wallach},
  title        = {Creating the {EVT} Workshop},
  journal      = {login Usenix Mag.},
  volume       = {32},
  number       = {5},
  year         = {2007},
  url          = {https://www.usenix.org/publications/login/october-2007-volume-32-number-5/creating-evt-workshop},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Wallach07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SandlerW07,
  author       = {Daniel Sandler and
                  Dan S. Wallach},
  editor       = {Ray Martinez and
                  David A. Wagner},
  title        = {Casting Votes in the Auditorium},
  booktitle    = {2007 {USENIX/ACCURATE} Electronic Voting Technology Workshop, EVT'07,
                  Boston, MA, USA, August 6, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/evt-07/casting-votes-auditorium},
  timestamp    = {Mon, 01 Feb 2021 08:42:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SandlerW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/CoarfaDW06,
  author       = {Cristian Coarfa and
                  Peter Druschel and
                  Dan S. Wallach},
  title        = {Performance analysis of {TLS} Web servers},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {24},
  number       = {1},
  pages        = {39--69},
  year         = {2006},
  url          = {https://doi.org/10.1145/1124153.1124155},
  doi          = {10.1145/1124153.1124155},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/CoarfaDW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/SinghNDW06,
  author       = {Atul Singh and
                  Tsuen{-}Wan Ngan and
                  Peter Druschel and
                  Dan S. Wallach},
  title        = {Eclipse Attacks on Overlay Networks: Threats and Defenses},
  booktitle    = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  23-29 April 2006, Barcelona, Catalunya, Spain},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/INFOCOM.2006.231},
  doi          = {10.1109/INFOCOM.2006.231},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/SinghNDW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2006evt,
  editor       = {Dan S. Wallach and
                  Ronald L. Rivest},
  title        = {2006 {USENIX/ACCURATE} Electronic Voting Technology Workshop, EVT'06,
                  Vancouver, BC, Canada, August 1, 2006},
  publisher    = {{USENIX} Association},
  year         = {2006},
  url          = {https://www.usenix.org/conference/evt06},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2006evt.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecr/StubblefieldRW05,
  author       = {Adam Stubblefield and
                  Aviel D. Rubin and
                  Dan S. Wallach},
  title        = {Managing the Performance Impact of Web Security},
  journal      = {Electron. Commer. Res.},
  volume       = {5},
  number       = {1},
  pages        = {99--116},
  year         = {2005},
  url          = {https://doi.org/10.1023/B:ELEC.0000045975.59531.08},
  doi          = {10.1023/B:ELEC.0000045975.59531.08},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ecr/StubblefieldRW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/ShiehW05,
  author       = {Shiuhpyng Shieh and
                  Dan S. Wallach},
  title        = {Guest Editors' Introduction: Ad Hoc and {P2P} Security},
  journal      = {{IEEE} Internet Comput.},
  volume       = {9},
  number       = {6},
  pages        = {14--15},
  year         = {2005},
  url          = {https://doi.org/10.1109/MIC.2005.128},
  doi          = {10.1109/MIC.2005.128},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/ShiehW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/LaraCKVWZ05,
  author       = {Eyal de Lara and
                  Yogesh Chopra and
                  Rajnish Kumar and
                  Nilesh Vaghela and
                  Dan S. Wallach and
                  Willy Zwaenepoel},
  title        = {Iterative Adaptation for Mobile Clients Using Existing APIs},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {16},
  number       = {10},
  pages        = {966--981},
  year         = {2005},
  url          = {https://doi.org/10.1109/TPDS.2005.124},
  doi          = {10.1109/TPDS.2005.124},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/LaraCKVWZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/LaddBRKW05,
  author       = {Andrew M. Ladd and
                  Kostas E. Bekris and
                  Algis Rudys and
                  Lydia E. Kavraki and
                  Dan S. Wallach},
  title        = {Robotics-Based Location Sensing Using Wireless Ethernet},
  journal      = {Wirel. Networks},
  volume       = {11},
  number       = {1-2},
  pages        = {189--204},
  year         = {2005},
  url          = {https://doi.org/10.1007/s11276-004-4755-8},
  doi          = {10.1007/S11276-004-4755-8},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/LaddBRKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptps/NielsonCW05,
  author       = {Seth James Nielson and
                  Scott A. Crosby and
                  Dan S. Wallach},
  editor       = {Miguel Castro and
                  Robbert van Renesse},
  title        = {A Taxonomy of Rational Attacks},
  booktitle    = {Peer-to-Peer Systems IV, 4th International Workshop, {IPTPS} 2005,
                  Ithaca, NY, USA, February 24-25, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3640},
  pages        = {36--46},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11558989\_4},
  doi          = {10.1007/11558989\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iptps/NielsonCW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/NandiNSDW05,
  author       = {Animesh Nandi and
                  Tsuen{-}Wan Ngan and
                  Atul Singh and
                  Peter Druschel and
                  Dan S. Wallach},
  editor       = {Gustavo Alonso},
  title        = {Scrivener: Providing Incentives in Cooperative Content Distribution
                  Systems},
  booktitle    = {Middleware 2005, ACM/IFIP/USENIX, 6th International Middleware Conference,
                  Grenoble, France, November 28 - December 2, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3790},
  pages        = {270--291},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11587552\_14},
  doi          = {10.1007/11587552\_14},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/middleware/NandiNSDW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BannetPRSW04,
  author       = {Jonathan Bannet and
                  David W. Price and
                  Algis Rudys and
                  Justin Singer and
                  Dan S. Wallach},
  title        = {Hack-a-Vote: Security Issues with Electronic Voting Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {32--37},
  year         = {2004},
  url          = {https://doi.org/10.1109/MSECP.2004.1264851},
  doi          = {10.1109/MSECP.2004.1264851},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BannetPRSW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/trob/LaddBRWK04,
  author       = {Andrew M. Ladd and
                  Kostas E. Bekris and
                  Algis Rudys and
                  Dan S. Wallach and
                  Lydia E. Kavraki},
  title        = {On the feasibility of using wireless ethernet for indoor localization},
  journal      = {{IEEE} Trans. Robotics},
  volume       = {20},
  number       = {3},
  pages        = {555--559},
  year         = {2004},
  url          = {https://doi.org/10.1109/TRA.2004.824948},
  doi          = {10.1109/TRA.2004.824948},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/trob/LaddBRWK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/HaeberlenFLRWK04,
  author       = {Andreas Haeberlen and
                  Eliot Flannery and
                  Andrew M. Ladd and
                  Algis Rudys and
                  Dan S. Wallach and
                  Lydia E. Kavraki},
  editor       = {Zygmunt J. Haas and
                  Samir R. Das and
                  Ravi Jain},
  title        = {Practical robust localization over large-scale 802.11 wireless networks},
  booktitle    = {Proceedings of the 10th Annual International Conference on Mobile
                  Computing and Networking, {MOBICOM} 2004, 2004, Philadelphia, PA,
                  USA, September 26 - October 1, 2004},
  pages        = {70--84},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1023720.1023728},
  doi          = {10.1145/1023720.1023728},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/HaeberlenFLRWK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigopsE/MisloveOPRDW04,
  author       = {Alan Mislove and
                  Gaurav Oberoi and
                  Ansley Post and
                  Charles Reis and
                  Peter Druschel and
                  Dan S. Wallach},
  editor       = {Yolande Berbers and
                  Miguel Castro},
  title        = {{AP3:} cooperative, decentralized anonymous communication},
  booktitle    = {Proceedings of the 11st {ACM} {SIGOPS} European Workshop, Leuven,
                  Belgium, September 19-22, 2004},
  pages        = {30},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1133572.1133578},
  doi          = {10.1145/1133572.1133578},
  timestamp    = {Thu, 07 Nov 2019 10:24:25 +0100},
  biburl       = {https://dblp.org/rec/conf/sigopsE/MisloveOPRDW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KohnoSRW04,
  author       = {Tadayoshi Kohno and
                  Adam Stubblefield and
                  Aviel D. Rubin and
                  Dan S. Wallach},
  title        = {Analysis of an Electronic Voting System},
  booktitle    = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12
                  May 2004, Berkeley, CA, {USA}},
  pages        = {27},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SECPRI.2004.1301313},
  doi          = {10.1109/SECPRI.2004.1301313},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KohnoSRW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/HuYCWZ03,
  author       = {Y. Charlie Hu and
                  Weimin Yu and
                  Alan L. Cox and
                  Dan S. Wallach and
                  Willy Zwaenepoel},
  title        = {Run-time support for distributed sharing in safe languages},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {21},
  number       = {1},
  pages        = {1--35},
  year         = {2003},
  url          = {https://doi.org/10.1145/592637.592638},
  doi          = {10.1145/592637.592638},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/HuYCWZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotos/MislovePRWDWBSBA03,
  author       = {Alan Mislove and
                  Ansley Post and
                  Charles Reis and
                  Paul Willmann and
                  Peter Druschel and
                  Dan S. Wallach and
                  Xavier Bonnaire and
                  Pierre Sens and
                  Jean{-}Michel Busca and
                  Luciana Bezerra Arantes},
  editor       = {Michael B. Jones},
  title        = {{POST:} {A} Secure, Resilient, Cooperative Messaging System},
  booktitle    = {Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems,
                  May 18-21, 2003, Lihue (Kauai), Hawaii, {USA}},
  pages        = {61--66},
  publisher    = {{USENIX}},
  year         = {2003},
  url          = {https://www.usenix.org/conference/hotos-ix/post-secure-resilient-cooperative-messaging-system},
  timestamp    = {Wed, 18 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotos/MislovePRWDWBSBA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptps/NganWD03,
  author       = {Tsuen{-}Wan Ngan and
                  Dan S. Wallach and
                  Peter Druschel},
  editor       = {M. Frans Kaashoek and
                  Ion Stoica},
  title        = {Enforcing Fair Sharing of Peer-to-Peer Resources},
  booktitle    = {Peer-to-Peer Systems II, Second International Workshop, {IPTPS} 2003,
                  Berkeley, CA, USA, February 21-22,2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2735},
  pages        = {149--159},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45172-3\_14},
  doi          = {10.1007/978-3-540-45172-3\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iptps/NganWD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/LaraKWZ03,
  author       = {Eyal de Lara and
                  Rajnish Kumar and
                  Dan S. Wallach and
                  Willy Zwaenepoel},
  editor       = {Daniel P. Siewiorek and
                  Mary Baker and
                  Robert T. Morris},
  title        = {Collaboration and Multimedia Authoring on Mobile Devices},
  booktitle    = {Proceedings of the First International Conference on Mobile Systems,
                  Applications, and Services, MobiSys 2003, San Francisco, CA, USA,
                  May 5-8, 2003},
  pages        = {287--301},
  publisher    = {{USENIX}},
  year         = {2003},
  url          = {https://www.usenix.org/events/mobisys03/tech/delara.html},
  doi          = {10.1145/1066116.1066126},
  timestamp    = {Tue, 10 Aug 2021 14:09:12 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/LaraKWZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PriceRW03,
  author       = {David W. Price and
                  Algis Rudys and
                  Dan S. Wallach},
  title        = {Garbage Collector Memory Accounting in Language-Based Systems},
  booktitle    = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14
                  May 2003, Berkeley, CA, {USA}},
  pages        = {263--274},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199342},
  doi          = {10.1109/SECPRI.2003.1199342},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/PriceRW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CrosbyW03,
  author       = {Scott A. Crosby and
                  Dan S. Wallach},
  title        = {Denial of Service via Algorithmic Complexity Attacks},
  booktitle    = {Proceedings of the 12th {USENIX} Security Symposium, Washington, D.C.,
                  USA, August 4-8, 2003},
  publisher    = {{USENIX} Association},
  year         = {2003},
  url          = {https://www.usenix.org/conference/12th-usenix-security-symposium/denial-service-algorithmic-complexity-attacks},
  timestamp    = {Mon, 01 Feb 2021 08:43:16 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CrosbyW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ws/TaoRLW03,
  author       = {Ping Tao and
                  Algis Rudys and
                  Andrew M. Ladd and
                  Dan S. Wallach},
  editor       = {W. Douglas Maughan and
                  Adrian Perrig},
  title        = {Wireless {LAN} location-sensing for security applications},
  booktitle    = {Proceedings of the 2003 {ACM} Workshop on Wireless Security, San Diego,
                  CA, USA, September 19, 2003},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/941311.941314},
  doi          = {10.1145/941311.941314},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ws/TaoRLW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RudysW02,
  author       = {Algis Rudys and
                  Dan S. Wallach},
  title        = {Termination in language-based systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {138--168},
  year         = {2002},
  url          = {https://doi.org/10.1145/505586.505589},
  doi          = {10.1145/505586.505589},
  timestamp    = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/RudysW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/RudysW02,
  author       = {Algis Rudys and
                  Dan S. Wallach},
  title        = {Transactional Rollback for Language-Based Systems},
  booktitle    = {2002 International Conference on Dependable Systems and Networks {(DSN}
                  2002), 23-26 June 2002, Bethesda, MD, USA, Proceedings},
  pages        = {439--448},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/DSN.2002.1028929},
  doi          = {10.1109/DSN.2002.1028929},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/RudysW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iros/LaddBMRWK02,
  author       = {Andrew M. Ladd and
                  Kostas E. Bekris and
                  Guillaume Marceau and
                  Algis Rudys and
                  Dan S. Wallach and
                  Lydia E. Kavraki},
  title        = {Using wireless Ethernet for localization},
  booktitle    = {{IEEE/RSJ} International Conference on Intelligent Robots and Systems,
                  Lausanne, Switzerland, September 30 - October 4, 2002},
  pages        = {402--408},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/IRDS.2002.1041423},
  doi          = {10.1109/IRDS.2002.1041423},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iros/LaddBMRWK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isss2/Wallach02,
  author       = {Dan S. Wallach},
  editor       = {Mitsuhiro Okada and
                  Benjamin C. Pierce and
                  Andre Scedrov and
                  Hideyuki Tokuda and
                  Akinori Yonezawa},
  title        = {A Survey of Peer-to-Peer Security Issues},
  booktitle    = {Software Security -- Theories and Systems, Mext-NSF-JSPS International
                  Symposium, {ISSS} 2002, Tokyo, Japan, November 8-10, 2002, Revised
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2609},
  pages        = {42--57},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36532-X\_4},
  doi          = {10.1007/3-540-36532-X\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/isss2/Wallach02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isss2/RudysW02,
  author       = {Algis Rudys and
                  Dan S. Wallach},
  editor       = {Mitsuhiro Okada and
                  Benjamin C. Pierce and
                  Andre Scedrov and
                  Hideyuki Tokuda and
                  Akinori Yonezawa},
  title        = {Enforcing Java Run-Time Properties Using Bytecode Rewriting},
  booktitle    = {Software Security -- Theories and Systems, Mext-NSF-JSPS International
                  Symposium, {ISSS} 2002, Tokyo, Japan, November 8-10, 2002, Revised
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2609},
  pages        = {185--200},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36532-X\_12},
  doi          = {10.1007/3-540-36532-X\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isss2/RudysW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/LaddBRKWM02,
  author       = {Andrew M. Ladd and
                  Kostas E. Bekris and
                  Algis Rudys and
                  Lydia E. Kavraki and
                  Dan S. Wallach and
                  Guillaume Marceau},
  editor       = {Ian F. Akyildiz and
                  Jason Yi{-}Bing Lin and
                  Ravi Jain and
                  Vaduvur Bharghavan and
                  Andrew T. Campbell},
  title        = {Robotics-based location sensing using wireless ethernet},
  booktitle    = {Proceedings of the Eighth Annual International Conference on Mobile
                  Computing and Networking, {MOBICOM} 2002, Atlanta, Georgia, USA, September
                  23-28, 2002},
  pages        = {227--238},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/570645.570674},
  doi          = {10.1145/570645.570674},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/LaddBRKWM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CoarfaDW02,
  author       = {Cristian Coarfa and
                  Peter Druschel and
                  Dan S. Wallach},
  title        = {Performance Analysis of {TLS} Web Servers},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2002, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2002},
  url          = {https://www.ndss-symposium.org/ndss2002/performance-analysis-tls-web-servers/},
  timestamp    = {Mon, 01 Feb 2021 08:42:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/CoarfaDW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osdi/CastroDGRW02,
  author       = {Miguel Castro and
                  Peter Druschel and
                  Ayalvadi J. Ganesh and
                  Antony I. T. Rowstron and
                  Dan S. Wallach},
  editor       = {David E. Culler and
                  Peter Druschel},
  title        = {Secure Routing for Structured Peer-to-Peer Overlay Networks},
  booktitle    = {5th Symposium on Operating System Design and Implementation {(OSDI}
                  2002), Boston, Massachusetts, USA, December 9-11, 2002},
  publisher    = {{USENIX} Association},
  year         = {2002},
  url          = {http://www.usenix.org/events/osdi02/tech/castro.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/osdi/CastroDGRW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/DotsenkoLWZ02,
  author       = {Yuri Dotsenko and
                  Eyal de Lara and
                  Dan S. Wallach and
                  Willy Zwaenepoel},
  title        = {Extensible Adaptation via Constraint Solving},
  booktitle    = {4th {IEEE} Workshop on Mobile Computing Systems and Applications {(WMCSA}
                  2002), 20-21 June 2002, Callicoon, NY, {USA}},
  pages        = {117--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/MCSA.2002.1017491},
  doi          = {10.1109/MCSA.2002.1017491},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wmcsa/DotsenkoLWZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Wallach01,
  author       = {Dan S. Wallach},
  title        = {Copy Protection Technology is Doomed},
  journal      = {Computer},
  volume       = {34},
  number       = {10},
  pages        = {48--49},
  year         = {2001},
  url          = {https://doi.org/10.1109/2.955098},
  doi          = {10.1109/2.955098},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Wallach01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotos/LaraWZ01,
  author       = {Eyal de Lara and
                  Dan S. Wallach and
                  Willy Zwaenepoel},
  title        = {Architectures for Adaption Systems},
  booktitle    = {Proceedings of HotOS-VIII: 8th Workshop on Hot Topics in Operating
                  Systems, May 20-23, 2001, Elmau/Oberbayern, Germany},
  pages        = {167},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/HOTOS.2001.990083},
  doi          = {10.1109/HOTOS.2001.990083},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotos/LaraWZ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/FlinnLSWZ01,
  author       = {Jason Flinn and
                  Eyal de Lara and
                  Mahadev Satyanarayanan and
                  Dan S. Wallach and
                  Willy Zwaenepoel},
  editor       = {Rachid Guerraoui},
  title        = {Reducing the Energy Usage of Office Applications},
  booktitle    = {Middleware 2001, {IFIP/ACM} International Conference on Distributed
                  Systems Platforms Heidelberg, Germany, November 12-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2218},
  pages        = {252--272},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45518-3\_14},
  doi          = {10.1007/3-540-45518-3\_14},
  timestamp    = {Wed, 07 Dec 2022 23:12:38 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/FlinnLSWZ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/RudysCW01,
  author       = {Algis Rudys and
                  John Clements and
                  Dan S. Wallach},
  title        = {Termination in Language-based Systems},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2001, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2001},
  url          = {https://www.ndss-symposium.org/ndss2001/termination-language-based-systems/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/RudysCW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usits/LaraWZ01,
  author       = {Eyal de Lara and
                  Dan S. Wallach and
                  Willy Zwaenepoel},
  editor       = {Tom Anderson},
  title        = {Puppeteer: Component-based Adaptation for Mobile Computing},
  booktitle    = {3rd {USENIX} Symposium on Internet Technologies and Systems, USITS'01,
                  San Francisco, California, USA, March 26-28, 2001},
  pages        = {159--170},
  publisher    = {{USENIX}},
  year         = {2001},
  url          = {http://www.usenix.org/events/usits01/delara.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/usits/LaraWZ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CraverWLSSWDF01,
  author       = {Scott Craver and
                  Min Wu and
                  Bede Liu and
                  Adam Stubblefield and
                  Ben Swartzlander and
                  Dan S. Wallach and
                  Drew Dean and
                  Edward W. Felten},
  editor       = {Dan S. Wallach},
  title        = {Reading Between the Lines: Lessons from the {SDMI} Challenge},
  booktitle    = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington,
                  D.C., {USA}},
  publisher    = {{USENIX}},
  year         = {2001},
  url          = {http://www.usenix.org/publications/library/proceedings/sec01/craver.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CraverWLSSWDF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2001,
  editor       = {Dan S. Wallach},
  title        = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington,
                  D.C., {USA}},
  publisher    = {{USENIX}},
  year         = {2001},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/WallachAF00,
  author       = {Dan S. Wallach and
                  Andrew W. Appel and
                  Edward W. Felten},
  title        = {{SAFKASI:} a security mechanism for language-based systems},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {9},
  number       = {4},
  pages        = {341--378},
  year         = {2000},
  url          = {https://doi.org/10.1145/363516.363520},
  doi          = {10.1145/363516.363520},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/WallachAF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcr/HuYCWZ00,
  author       = {Y. Charlie Hu and
                  Weimin Yu and
                  Alan L. Cox and
                  Dan S. Wallach and
                  Willy Zwaenepoel},
  editor       = {Sandhya Dwarkadas},
  title        = {Run-Time Support for Distributed Sharing in Typed Languages},
  booktitle    = {Languages, Compilers, and Run-Time Systems for Scalable Computers,
                  5th International Workshop, {LCR} 2000, Rochester, NY, USA, May 25-27,
                  2000, Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {1915},
  pages        = {192--206},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-40889-4\_15},
  doi          = {10.1007/3-540-40889-4\_15},
  timestamp    = {Sun, 12 Feb 2023 18:48:31 +0100},
  biburl       = {https://dblp.org/rec/conf/lcr/HuYCWZ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WallachF98,
  author       = {Dan S. Wallach and
                  Edward W. Felten},
  title        = {Understanding Java Stack Inspection},
  booktitle    = {Security and Privacy - 1998 {IEEE} Symposium on Security and Privacy,
                  Oakland, CA, USA, May 3-6, 1998, Proceedings},
  pages        = {52--63},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/SECPRI.1998.674823},
  doi          = {10.1109/SECPRI.1998.674823},
  timestamp    = {Thu, 21 Sep 2023 15:57:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WallachF98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/WallachBDF97,
  author       = {Dan S. Wallach and
                  Dirk Balfanz and
                  Drew Dean and
                  Edward W. Felten},
  editor       = {Michel Ban{\^{a}}tre and
                  Henry M. Levy and
                  William M. Waite},
  title        = {Extensible Security Architecture for Java},
  booktitle    = {Proceedings of the Sixteenth {ACM} Symposium on Operating System Principles,
                  {SOSP} 1997, St. Malo, France, October 5-8, 1997},
  pages        = {116--128},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/268998.266668},
  doi          = {10.1145/268998.266668},
  timestamp    = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/WallachBDF97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/WallachRF96,
  author       = {Dan S. Wallach and
                  Jim A. Roskind and
                  Edward W. Felten},
  editor       = {Rebecca N. Wright and
                  Peter G. Neumann},
  title        = {Flexible, extensible Java security using digital signatures},
  booktitle    = {Network Threats, Proceedings of a {DIMACS} Workshop, December 2-4,
                  1996},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {38},
  pages        = {59--74},
  publisher    = {{DIMACS/AMS}},
  year         = {1996},
  url          = {https://doi.org/10.1090/dimacs/038/07},
  doi          = {10.1090/DIMACS/038/07},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/WallachRF96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DeanFW96,
  author       = {Drew Dean and
                  Edward W. Felten and
                  Dan S. Wallach},
  title        = {Java Security: From HotJava to Netscape and Beyond},
  booktitle    = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland,
                  CA, {USA}},
  pages        = {190--200},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/SECPRI.1996.502681},
  doi          = {10.1109/SECPRI.1996.502681},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DeanFW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siggraph/WallachKC94,
  author       = {Dan S. Wallach and
                  Sharma Kunapalli and
                  Michael F. Cohen},
  editor       = {Dino Schweitzer and
                  Andrew S. Glassner and
                  Mike Keeler},
  title        = {Accelerated {MPEG} compression of dynamic polygonal scenes},
  booktitle    = {Proceedings of the 21th Annual Conference on Computer Graphics and
                  Interactive Techniques, {SIGGRAPH} 1994, Orlando, FL, USA, July 24-29,
                  1994},
  pages        = {193--196},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/192161.192198},
  doi          = {10.1145/192161.192198},
  timestamp    = {Tue, 06 Nov 2018 16:59:17 +0100},
  biburl       = {https://dblp.org/rec/conf/siggraph/WallachKC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics