Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Dan S. Wallach
@inproceedings{DBLP:conf/iri/ZhaoZSWR23, author = {Fei Zhao and Chengcui Zhang and Nitesh Saxena and Dan S. Wallach and AKM Shahariar Azad Rabby}, title = {Ballot Tabulation Using Deep Learning}, booktitle = {24th {IEEE} International Conference on Information Reuse and Integration for Data Science, {IRI} 2023, Bellevue, WA, USA, August 4-6, 2023}, pages = {107--114}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IRI58017.2023.00026}, doi = {10.1109/IRI58017.2023.00026}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/ZhaoZSWR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/acm/22/BW2022, author = {Matthew Bernhard and Dan S. Wallach}, title = {Election Security: Risk Limiting Audits}, series = {{ACM} TechBrief}, volume = {5}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3568005}, doi = {10.1145/3568005}, timestamp = {Fri, 22 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/acm/22/BW2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hf/AcemyanKBW22, author = {Claudia Ziegler Acemyan and Philip T. Kortum and Michael D. Byrne and Dan S. Wallach}, title = {Summative Usability Assessments of STAR-Vote: {A} Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use}, journal = {Hum. Factors}, volume = {64}, number = {5}, pages = {866--889}, year = {2022}, url = {https://doi.org/10.1177/0018720818812586}, doi = {10.1177/0018720818812586}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/hf/AcemyanKBW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BenalohFSTW21, author = {Josh Benaloh and Kammi Foote and Philip B. Stark and Vanessa Teague and Dan S. Wallach}, title = {VAULT-Style Risk-Limiting Audits and the Inyo County Pilot}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {4}, pages = {8--18}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3075107}, doi = {10.1109/MSEC.2021.3075107}, timestamp = {Wed, 14 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BenalohFSTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcses/SharmanAKW21, author = {Jonathan Sharman and Claudia Z. Acemyan and Philip T. Kortum and Dan S. Wallach}, title = {Bad Tools Hurt: Lessons for teaching computer security skills to undergraduates}, journal = {Int. J. Comput. Sci. Educ. Sch.}, volume = {5}, number = {2}, pages = {74--92}, year = {2021}, url = {https://doi.org/10.21585/ijcses.v5i2.131}, doi = {10.21585/IJCSES.V5I2.131}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcses/SharmanAKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esann/BronkLLWH21, author = {Chris Bronk and Amaury Lendasse and Peggy Lindner and Dan S. Wallach and Barbara Hammer}, title = {Machine Learning for Measuring and Analyzing Online Social Communications}, booktitle = {29th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, {ESANN} 2021, Online event (Bruges, Belgium), October 6-8, 2021}, year = {2021}, url = {https://doi.org/10.14428/esann/2021.ES2021-3}, doi = {10.14428/ESANN/2021.ES2021-3}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esann/BronkLLWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hf/KortumSAWV20, author = {Philip T. Kortum and Robert Stein and Claudia Ziegler Acemyan and Dan S. Wallach and Elizabeth Vann}, title = {How Human Factors Can Help Preserve Democracy in the Age of Pandemics}, journal = {Hum. Factors}, volume = {62}, number = {7}, year = {2020}, url = {https://doi.org/10.1177/0018720820946896}, doi = {10.1177/0018720820946896}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/hf/KortumSAWV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DinhRPW20, author = {Thien{-}Nam Dinh and Florentin Rochet and Olivier Pereira and Dan S. Wallach}, title = {Scaling Up Anonymous Communication with Efficient Nanopayment Channels}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {3}, pages = {175--203}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0048}, doi = {10.2478/POPETS-2020-0048}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DinhRPW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-07917, author = {Daniel W. Song and Konstantinos Mamouras and Ang Chen and Nathan Dautenhahn and Dan S. Wallach}, title = {The Design and Implementation of a Verified File System with End-to-End Data Integrity}, journal = {CoRR}, volume = {abs/2012.07917}, year = {2020}, url = {https://arxiv.org/abs/2012.07917}, eprinttype = {arXiv}, eprint = {2012.07917}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-07917.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/BernhardSAKWH19, author = {Matthew Bernhard and Jonathan Sharman and Claudia Ziegler Acemyan and Philip T. Kortum and Dan S. Wallach and J. Alex Halderman}, editor = {Stephen A. Brewster and Geraldine Fitzpatrick and Anna L. Cox and Vassilis Kostakos}, title = {On the Usability of {HTTPS} Deployment}, booktitle = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019}, pages = {310}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3290605.3300540}, doi = {10.1145/3290605.3300540}, timestamp = {Sun, 02 Jun 2019 21:13:35 +0200}, biburl = {https://dblp.org/rec/conf/chi/BernhardSAKWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LeeCW19, author = {Jaeho Lee and Ang Chen and Dan S. Wallach}, title = {Total Recall: Persistence of Passwords in Android}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/total-recall-persistence-of-passwords-in-android/}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LeeCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-01897, author = {Dan S. Wallach}, title = {On the security of ballot marking devices}, journal = {CoRR}, volume = {abs/1908.01897}, year = {2019}, url = {http://arxiv.org/abs/1908.01897}, eprinttype = {arXiv}, eprint = {1908.01897}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-01897.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-06176, author = {Clayton Drazner and Nikola Duza and Hugo Jonker and Dan S. Wallach}, title = {Investigating the effectiveness of web adblockers}, journal = {CoRR}, volume = {abs/1912.06176}, year = {2019}, url = {http://arxiv.org/abs/1912.06176}, eprinttype = {arXiv}, eprint = {1912.06176}, timestamp = {Thu, 02 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-06176.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RiaziCSWK19, author = {M. Sadegh Riazi and Beidi Chen and Anshumali Shrivastava and Dan S. Wallach and Farinaz Koushanfar}, title = {Sub-Linear Privacy-Preserving Near-Neighbor Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1222}, year = {2019}, url = {https://eprint.iacr.org/2019/1222}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RiaziCSWK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ImCW18, author = {Bumjin Im and Ang Chen and Dan S. Wallach}, title = {An Historical Analysis of the SEAndroid Policy Evolution}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {629--640}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274709}, doi = {10.1145/3274694.3274709}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ImCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LeeW18, author = {Jaeho Lee and Dan S. Wallach}, title = {Removing Secrets from Android's {TLS}}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_01B-3\_Lee\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LeeW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-00920, author = {Bumjin Im and Ang Chen and Dan S. Wallach}, title = {An Historical Analysis of the SEAndroid Policy Evolution}, journal = {CoRR}, volume = {abs/1812.00920}, year = {2018}, url = {http://arxiv.org/abs/1812.00920}, eprinttype = {arXiv}, eprint = {1812.00920}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-00920.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PridgenGW17, author = {Adam Pridgen and Simson L. Garfinkel and Dan S. Wallach}, title = {Picking up the trash: Exploiting generational {GC} for memory analysis}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S20--S28}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.01.002}, doi = {10.1016/J.DIIN.2017.01.002}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/PridgenGW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/PridgenGW17, author = {Adam Pridgen and Simson L. Garfinkel and Dan S. Wallach}, editor = {Tung Bui}, title = {Present but Unreachable: Reducing Persistentlatent Secrets in HotSpot {JVM}}, booktitle = {50th Hawaii International Conference on System Sciences, {HICSS} 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017}, pages = {1--10}, publisher = {ScholarSpace / {AIS} Electronic Library (AISeL)}, year = {2017}, url = {https://hdl.handle.net/10125/41887}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/PridgenGW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/MoranW17, author = {Murat Moran and Dan S. Wallach}, editor = {Nadia Polikarpova and Steve A. Schneider}, title = {Verification of STAR-Vote and Evaluation of {FDR} and ProVerif}, booktitle = {Integrated Formal Methods - 13th International Conference, {IFM} 2017, Turin, Italy, September 20-22, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10510}, pages = {422--436}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66845-1\_28}, doi = {10.1007/978-3-319-66845-1\_28}, timestamp = {Fri, 07 Aug 2020 17:57:32 +0200}, biburl = {https://dblp.org/rec/conf/ifm/MoranW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TanashCWM17, author = {Rima S. Tanash and Zhouhan Chen and Dan S. Wallach and Melissa Marschall}, editor = {Jon Penney and Nicholas Weaver}, title = {The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup}, booktitle = {7th {USENIX} Workshop on Free and Open Communications on the Internet, {FOCI} 2017, Vancouver, BC, Canada, August 14, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/foci17/workshop-program/presentation/tanash}, timestamp = {Mon, 01 Feb 2021 08:42:51 +0100}, biburl = {https://dblp.org/rec/conf/uss/TanashCWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/BernhardBHRRSTV17, author = {Matthew Bernhard and Josh Benaloh and J. Alex Halderman and Ronald L. Rivest and Peter Y. A. Ryan and Philip B. Stark and Vanessa Teague and Poorvi L. Vora and Dan S. Wallach}, editor = {Robert Krimmer and Melanie Volkamer and Nadja Braun Binder and Norbert Kersting and Olivier Pereira and Carsten Sch{\"{u}}rmann}, title = {Public Evidence from Secret Ballots}, booktitle = {Electronic Voting - Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10615}, pages = {84--109}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68687-5\_6}, doi = {10.1007/978-3-319-68687-5\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/BernhardBHRRSTV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/PereiraW17, author = {Olivier Pereira and Dan S. Wallach}, editor = {Robert Krimmer and Melanie Volkamer and Nadja Braun Binder and Norbert Kersting and Olivier Pereira and Carsten Sch{\"{u}}rmann}, title = {Clash Attacks and the STAR-Vote System}, booktitle = {Electronic Voting - Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10615}, pages = {228--247}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68687-5\_14}, doi = {10.1007/978-3-319-68687-5\_14}, timestamp = {Thu, 19 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/PereiraW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MoranW17, author = {Murat Moran and Dan S. Wallach}, title = {Verification of STAR-Vote and Evaluation of {FDR} and ProVerif}, journal = {CoRR}, volume = {abs/1705.00782}, year = {2017}, url = {http://arxiv.org/abs/1705.00782}, eprinttype = {arXiv}, eprint = {1705.00782}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MoranW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BenalohBHRRSTVW17, author = {Josh Benaloh and Matthew Bernhard and J. Alex Halderman and Ronald L. Rivest and Peter Y. A. Ryan and Philip B. Stark and Vanessa Teague and Poorvi L. Vora and Dan S. Wallach}, title = {Public Evidence from Secret Ballots}, journal = {CoRR}, volume = {abs/1707.08619}, year = {2017}, url = {http://arxiv.org/abs/1707.08619}, eprinttype = {arXiv}, eprint = {1707.08619}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BenalohBHRRSTVW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2016w, editor = {Jeremy Clark and Sarah Meiklejohn and Peter Y. A. Ryan and Dan S. Wallach and Michael Brenner and Kurt Rohloff}, title = {Financial Cryptography and Data Security - {FC} 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9604}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53357-4}, doi = {10.1007/978-3-662-53357-4}, isbn = {978-3-662-53356-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2016w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RiaziCSWK16, author = {M. Sadegh Riazi and Beidi Chen and Anshumali Shrivastava and Dan S. Wallach and Farinaz Koushanfar}, title = {Sub-linear Privacy-preserving Search with Untrusted Server and Semi-honest Parties}, journal = {CoRR}, volume = {abs/1612.01835}, year = {2016}, url = {http://arxiv.org/abs/1612.01835}, eprinttype = {arXiv}, eprint = {1612.01835}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RiaziCSWK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BatesBSSTW15, author = {Adam Bates and Kevin R. B. Butler and Micah Sherr and Clay Shields and Patrick Traynor and Dan S. Wallach}, title = {Accountable wiretapping - or - {I} know they can hear you now}, journal = {J. Comput. Secur.}, volume = {23}, number = {2}, pages = {167--195}, year = {2015}, url = {https://doi.org/10.3233/JCS-140515}, doi = {10.3233/JCS-140515}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BatesBSSTW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/LiuBDMW15, author = {Yue Liu and David R. Bild and Robert P. Dick and Zhuoqing Morley Mao and Dan S. Wallach}, title = {The Mason Test: {A} Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {14}, number = {11}, pages = {2376--2391}, year = {2015}, url = {https://doi.org/10.1109/TMC.2015.2398425}, doi = {10.1109/TMC.2015.2398425}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/LiuBDMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/BildLDMW15, author = {David R. Bild and Yue Liu and Robert P. Dick and Zhuoqing Morley Mao and Dan S. Wallach}, title = {Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph}, journal = {{ACM} Trans. Internet Techn.}, volume = {15}, number = {1}, pages = {4:1--4:24}, year = {2015}, url = {https://doi.org/10.1145/2700060}, doi = {10.1145/2700060}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/BildLDMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/AcemyanKBW15, author = {Claudia Z. Acemyan and Philip T. Kortum and Michael D. Byrne and Dan S. Wallach}, editor = {Theo Tryfonas and Ioannis G. Askoxylakis}, title = {Users' Mental Models for Three End-to-End Voting Systems: Helios, Pr{\^{e}}t {\`{a}} Voter, and Scantegrity {II}}, booktitle = {Human Aspects of Information Security, Privacy, and Trust - Third International Conference, {HAS} 2015, Held as Part of {HCI} International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9190}, pages = {463--474}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20376-8\_41}, doi = {10.1007/978-3-319-20376-8\_41}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/hci/AcemyanKBW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/DresslerBW15, author = {Judson C. Dressler and Christopher Bronk and Daniel S. Wallach}, editor = {Qinqing Zhang and Jerry Brand and Thomas G. MacDonald and Bharat T. Doshi and Bonnie L. Gorsic}, title = {Exploiting military OpSec through open-source vulnerabilities}, booktitle = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa, FL, USA, October 26-28, 2015}, pages = {450--458}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/MILCOM.2015.7357484}, doi = {10.1109/MILCOM.2015.7357484}, timestamp = {Thu, 07 Nov 2019 09:04:27 +0100}, biburl = {https://dblp.org/rec/conf/milcom/DresslerBW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/LiuBASDWM15, author = {Yue Liu and David R. Bild and David Adrian and Gulshan Singh and Robert P. Dick and Dan S. Wallach and Zhuoqing Morley Mao}, editor = {Sherman X. Shen and Youxian Sun and Jiming Chen and Junshan Zhang and Gil Zussman}, title = {Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication}, booktitle = {Proceedings of the 16th {ACM} International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2015, Hangzhou, China, June 22-25, 2015}, pages = {257--266}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2746285.2746320}, doi = {10.1145/2746285.2746320}, timestamp = {Mon, 24 Aug 2020 18:01:28 +0200}, biburl = {https://dblp.org/rec/conf/mobihoc/LiuBASDWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/TanashCTWS15, author = {Rima S. Tanash and Zhouhan Chen and Tanmay Thakur and Dan S. Wallach and Devika Subramanian}, editor = {Indrajit Ray and Nicholas Hopper and Rob Jansen}, title = {Known Unknowns: An Analysis of Twitter Censorship in Turkey}, booktitle = {Proceedings of the 14th {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2015, Denver, Colorado, USA, October 12, 2015}, pages = {11--20}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808138.2808147}, doi = {10.1145/2808138.2808147}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/TanashCTWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BookW15, author = {Theodore Book and Dan S. Wallach}, title = {An Empirical Study of Mobile Ad Targeting}, journal = {CoRR}, volume = {abs/1502.06577}, year = {2015}, url = {http://arxiv.org/abs/1502.06577}, eprinttype = {arXiv}, eprint = {1502.06577}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BookW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SongZBSWS15, author = {Daniel Song and Jisheng Zhao and Michael G. Burke and Dragos Sbirlea and Dan S. Wallach and Vivek Sarkar}, title = {Finding Tizen security bugs through whole-system static analysis}, journal = {CoRR}, volume = {abs/1504.05967}, year = {2015}, url = {http://arxiv.org/abs/1504.05967}, eprinttype = {arXiv}, eprint = {1504.05967}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SongZBSWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Wallach14, author = {Dan S. Wallach}, title = {Smartphone security 'taint' what it used to be: technical perspective}, journal = {Commun. {ACM}}, volume = {57}, number = {3}, pages = {98}, year = {2014}, url = {https://doi.org/10.1145/2576234}, doi = {10.1145/2576234}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Wallach14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/RostamiMKWD14, author = {Masoud Rostami and Mehrdad Majzoobi and Farinaz Koushanfar and Dan S. Wallach and Srinivas Devadas}, title = {Robust and Reverse-Engineering Resilient {PUF} Authentication and Key-Exchange by Substring Matching}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {2}, number = {1}, pages = {37--49}, year = {2014}, url = {https://doi.org/10.1109/TETC.2014.2300635}, doi = {10.1109/TETC.2014.2300635}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/RostamiMKWD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DietzW14, author = {Michael Dietz and Dan S. Wallach}, title = {Hardening Persona - Improving Federated Web Login}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/hardening-persona-improving-federated-web-login}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/DietzW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AcemyanKBW14, author = {Claudia Z. Acemyan and Philip T. Kortum and Michael D. Byrne and Dan S. Wallach}, title = {Usability of Voter Verifiable, End-to-end Voting Systems: Baseline Data for Helios, Pr{\^{e}}t {\`{a}} Voter, and Scantegrity {II}}, booktitle = {2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, {EVT/WOTE} '14, San Diego, CA, USA, August 18-19, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/evtwote14/workshop-program/presentation/acemyan}, timestamp = {Mon, 01 Feb 2021 08:42:52 +0100}, biburl = {https://dblp.org/rec/conf/uss/AcemyanKBW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BildLDMW14, author = {David R. Bild and Yue Liu and Robert P. Dick and Zhuoqing Morley Mao and Dan S. Wallach}, title = {Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph}, journal = {CoRR}, volume = {abs/1402.2671}, year = {2014}, url = {http://arxiv.org/abs/1402.2671}, eprinttype = {arXiv}, eprint = {1402.2671}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BildLDMW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BildLDMW14a, author = {David R. Bild and Yue Liu and Robert P. Dick and Zhuoqing Morley Mao and Dan S. Wallach}, title = {Performance Analysis of Location Profile Routing}, journal = {CoRR}, volume = {abs/1403.4677}, year = {2014}, url = {http://arxiv.org/abs/1403.4677}, eprinttype = {arXiv}, eprint = {1403.4677}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BildLDMW14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LiuBDMW14, author = {Yue Liu and David R. Bild and Robert P. Dick and Zhuoqing Morley Mao and Dan S. Wallach}, title = {The Mason Test: {A} Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities}, journal = {CoRR}, volume = {abs/1403.5871}, year = {2014}, url = {http://arxiv.org/abs/1403.5871}, eprinttype = {arXiv}, eprint = {1403.5871}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LiuBDMW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SaniZW14, author = {Ardalan Amiri Sani and Lin Zhong and Dan S. Wallach}, title = {Glider: {A} {GPU} Library Driver for Improved System Security}, journal = {CoRR}, volume = {abs/1411.3777}, year = {2014}, url = {http://arxiv.org/abs/1411.3777}, eprinttype = {arXiv}, eprint = {1411.3777}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SaniZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BookW13, author = {Theodore Book and Dan S. Wallach}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {A case of collusion: a study of the interface between ad libraries and their apps}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {79--86}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516762}, doi = {10.1145/2516760.2516762}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BookW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BenalohBEKMPSWFMPW13, author = {Josh Benaloh and Michael D. Byrne and Bryce Eakin and Philip T. Kortum and Neal McBurnett and Olivier Pereira and Philip B. Stark and Dan S. Wallach and Gail Fisher and Julian Montoya and Michelle Parker and Michael Winn}, title = {STAR-Vote: {A} Secure, Transparent, Auditable, and Reliable Voting System}, booktitle = {2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '13, Washington, D.C., USA, August 12-13, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/evtwote13/workshop-program/presentation/bell}, timestamp = {Mon, 01 Feb 2021 08:42:58 +0100}, biburl = {https://dblp.org/rec/conf/uss/BenalohBEKMPSWFMPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhuPPCW13, author = {Tao Zhu and David Phipps and Adam Pridgen and Jedidiah R. Crandall and Dan S. Wallach}, editor = {Samuel T. King}, title = {The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {227--240}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/zhu}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhuPPCW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1303-0597, author = {Tao Zhu and David Phipps and Adam Pridgen and Jedidiah R. Crandall and Dan S. Wallach}, title = {The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions}, journal = {CoRR}, volume = {abs/1303.0597}, year = {2013}, url = {http://arxiv.org/abs/1303.0597}, eprinttype = {arXiv}, eprint = {1303.0597}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1303-0597.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1303-0857, author = {Theodore Book and Adam Pridgen and Dan S. Wallach}, title = {Longitudinal Analysis of Android Ad Library Permissions}, journal = {CoRR}, volume = {abs/1303.0857}, year = {2013}, url = {http://arxiv.org/abs/1303.0857}, eprinttype = {arXiv}, eprint = {1303.0857}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1303-0857.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1305-0245, author = {Theodore Book and Martha Witick and Dan S. Wallach}, title = {Automated generation of web server fingerprints}, journal = {CoRR}, volume = {abs/1305.0245}, year = {2013}, url = {http://arxiv.org/abs/1305.0245}, eprinttype = {arXiv}, eprint = {1305.0245}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1305-0245.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BookW13, author = {Theodore Book and Dan S. Wallach}, title = {A Case of Collusion: {A} Study of the Interface Between Ad Libraries and their Apps}, journal = {CoRR}, volume = {abs/1307.6082}, year = {2013}, url = {http://arxiv.org/abs/1307.6082}, eprinttype = {arXiv}, eprint = {1307.6082}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BookW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/ShekharDW12, author = {Shashi Shekhar and Michael Dietz and Dan S. Wallach}, title = {AdSplit: Separating Smartphone Advertising from Applications}, journal = {login Usenix Mag.}, volume = {37}, number = {6}, year = {2012}, url = {https://www.usenix.org/publications/login/december-2012-volume-37-number-6/adsplit-separating-smartphone-advertising}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/ShekharDW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CzeskisDKWB12, author = {Alexei Czeskis and Michael Dietz and Tadayoshi Kohno and Dan S. Wallach and Dirk Balfanz}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Strengthening user authentication through opportunistic cryptographic identity assertions}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {404--414}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382240}, doi = {10.1145/2382196.2382240}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CzeskisDKWB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BatesBSSTW12, author = {Adam Bates and Kevin R. B. Butler and Micah Sherr and Clay Shields and Patrick Traynor and Dan S. Wallach}, title = {Accountable Wiretapping -or- {I} know they can hear you now}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/accountable-wiretapping-or-i-know-they-can-hear-you-now}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BatesBSSTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisisis/SongSPTWCL12, author = {Peiyou Song and Anhei Shu and David Phipps and Mohit Tiwari and Dan S. Wallach and Jedidiah R. Crandall and George F. Luger}, title = {Language without words: {A} pointillist model for natural language processing}, booktitle = {The 6th International Conference on Soft Computing and Intelligent Systems (SCIS), and The 13th International Symposium on Advanced Intelligence Systems (ISIS), Kobe, Japan, November 20-24, 2012}, pages = {11--15}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SCIS-ISIS.2012.6505413}, doi = {10.1109/SCIS-ISIS.2012.6505413}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisisis/SongSPTWCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MajzoobiRKWD12, author = {Mehrdad Majzoobi and Masoud Rostami and Farinaz Koushanfar and Dan S. Wallach and Srinivas Devadas}, title = {Slender {PUF} Protocol: {A} Lightweight, Robust, and Secure Authentication by Substring Matching}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {33--44}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.30}, doi = {10.1109/SPW.2012.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MajzoobiRKWD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AaseCDKMSWZ12, author = {Nicholas Aase and Jedidiah R. Crandall and Alvaro Diaz and Jeffrey Knockel and Jorge Ocana Molinero and Jared Saia and Dan S. Wallach and Tao Zhu}, editor = {Roger Dingledine and Joss Wright}, title = {Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations}, booktitle = {2nd {USENIX} Workshop on Free and Open Communications on the Internet, {FOCI} '12, Bellevue, WA, USA, August 6, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/foci12/workshop-program/presentation/aase}, timestamp = {Mon, 01 Feb 2021 08:43:10 +0100}, biburl = {https://dblp.org/rec/conf/uss/AaseCDKMSWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DietzCBW12, author = {Michael Dietz and Alexei Czeskis and Dirk Balfanz and Dan S. Wallach}, editor = {Tadayoshi Kohno}, title = {Origin-Bound Certificates: {A} Fresh Approach to Strong Client Authentication for the Web}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {317--331}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/dietz}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DietzCBW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShekharDW12, author = {Shashi Shekhar and Michael Dietz and Dan S. Wallach}, editor = {Tadayoshi Kohno}, title = {AdSplit: Separating Smartphone Advertising from Applications}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {553--567}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/shekhar}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ShekharDW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1202-4030, author = {Shashi Shekhar and Michael Dietz and Dan S. Wallach}, title = {AdSplit: Separating smartphone advertising from applications}, journal = {CoRR}, volume = {abs/1202.4030}, year = {2012}, url = {http://arxiv.org/abs/1202.4030}, eprinttype = {arXiv}, eprint = {1202.4030}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1202-4030.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1206-4958, author = {Peiyou Song and Anhei Shu and Anyu Zhou and Dan S. Wallach and Jedidiah R. Crandall}, title = {A Pointillism Approach for Natural Language Processing of Social Media}, journal = {CoRR}, volume = {abs/1206.4958}, year = {2012}, url = {http://arxiv.org/abs/1206.4958}, eprinttype = {arXiv}, eprint = {1206.4958}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1206-4958.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1211-1904, author = {Josh Benaloh and Mike Byrne and Philip T. Kortum and Neal McBurnett and Olivier Pereira and Philip B. Stark and Dan S. Wallach}, title = {STAR-Vote: {A} Secure, Transparent, Auditable, and Reliable Voting System}, journal = {CoRR}, volume = {abs/1211.1904}, year = {2012}, url = {http://arxiv.org/abs/1211.1904}, eprinttype = {arXiv}, eprint = {1211.1904}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1211-1904.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1211-6166, author = {Tao Zhu and David Phipps and Adam Pridgen and Jedidiah R. Crandall and Dan S. Wallach}, title = {Tracking and Quantifying Censorship on a Chinese Microblogging Site}, journal = {CoRR}, volume = {abs/1211.6166}, year = {2012}, url = {http://arxiv.org/abs/1211.6166}, eprinttype = {arXiv}, eprint = {1211.6166}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1211-6166.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1212-3228, author = {Peiyou Song and Anhei Shu and David Phipps and Dan S. Wallach and Mohit Tiwari and Jedidiah R. Crandall and George F. Luger}, title = {Language Without Words: {A} Pointillist Model for Natural Language Processing}, journal = {CoRR}, volume = {abs/1212.3228}, year = {2012}, url = {http://arxiv.org/abs/1212.3228}, eprinttype = {arXiv}, eprint = {1212.3228}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1212-3228.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Wallach11, author = {Dan S. Wallach}, title = {Rebooting the {CS} publication process}, journal = {Commun. {ACM}}, volume = {54}, number = {10}, pages = {32--35}, year = {2011}, url = {https://doi.org/10.1145/2001269.2001283}, doi = {10.1145/2001269.2001283}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Wallach11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CrosbyW11, author = {Scott A. Crosby and Dan S. Wallach}, title = {Authenticated Dictionaries: Real-World Costs and Trade-Offs}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {2}, pages = {17:1--17:30}, year = {2011}, url = {https://doi.org/10.1145/2019599.2019602}, doi = {10.1145/2019599.2019602}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CrosbyW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiarch/BildLDMW11, author = {David R. Bild and Yue Liu and Robert P. Dick and Z. Morley Mao and Dan S. Wallach}, editor = {Kyle Jamieson and Ratul Mahajan}, title = {Using predictable mobility patterns to support scalable and secure MANETs of handheld devices}, booktitle = {Proceedings of the sixth international workshop on MobiArch, MobiArch '11, Bethesda, Maryland, USA, June 28, 2011}, pages = {13--18}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1999916.1999921}, doi = {10.1145/1999916.1999921}, timestamp = {Fri, 10 Dec 2021 09:31:29 +0100}, biburl = {https://dblp.org/rec/conf/mobiarch/BildLDMW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DietzSPSW11, author = {Michael Dietz and Shashi Shekhar and Yuliy Pisetsky and Anhei Shu and Dan S. Wallach}, title = {{QUIRE:} Lightweight Provenance for Smart Phone Operating Systems}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Dietz7-26-11.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DietzSPSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/CrosbyW11, author = {Scott A. Crosby and Dan S. Wallach}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Algorithmic DoS}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {32--33}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_261}, doi = {10.1007/978-1-4419-5906-5\_261}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/CrosbyW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1102-2445, author = {Michael Dietz and Shashi Shekhar and Yuliy Pisetsky and Anhei Shu and Dan S. Wallach}, title = {Quire: Lightweight Provenance for Smart Phone Operating Systems}, journal = {CoRR}, volume = {abs/1102.2445}, year = {2011}, url = {http://arxiv.org/abs/1102.2445}, eprinttype = {arXiv}, eprint = {1102.2445}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1102-2445.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1107-3794, author = {Tao Zhu and Christopher Bronk and Dan S. Wallach}, title = {An Analysis of Chinese Search Engine Filtering}, journal = {CoRR}, volume = {abs/1107.3794}, year = {2011}, url = {http://arxiv.org/abs/1107.3794}, eprinttype = {arXiv}, eprint = {1107.3794}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1107-3794.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1108-2704, author = {Seth James Nielson and Seth J. Fogarty and Dan S. Wallach}, title = {Attacks on Local Searching Tools}, journal = {CoRR}, volume = {abs/1108.2704}, year = {2011}, url = {http://arxiv.org/abs/1108.2704}, eprinttype = {arXiv}, eprint = {1108.2704}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1108-2704.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1108-2716, author = {Seth James Nielson and Caleb E. Spare and Dan S. Wallach}, title = {Building Better Incentives for Robustness in BitTorrent}, journal = {CoRR}, volume = {abs/1108.2716}, year = {2011}, url = {http://arxiv.org/abs/1108.2716}, eprinttype = {arXiv}, eprint = {1108.2716}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1108-2716.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1108-2718, author = {Seth James Nielson and Dan S. Wallach}, title = {The BitTorrent Anonymity Marketplace}, journal = {CoRR}, volume = {abs/1108.2718}, year = {2011}, url = {http://arxiv.org/abs/1108.2718}, eprinttype = {arXiv}, eprint = {1108.2718}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1108-2718.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1109-6874, author = {Dustin Bachrach and Christopher Nunu and Dan S. Wallach and Matthew K. Wright}, title = {{\#}h00t: Censorship Resistant Microblogging}, journal = {CoRR}, volume = {abs/1109.6874}, year = {2011}, url = {http://arxiv.org/abs/1109.6874}, eprinttype = {arXiv}, eprint = {1109.6874}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1109-6874.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Wallach10, author = {Dan S. Wallach}, title = {Technical perspective - Native Client: a clever alternative}, journal = {Commun. {ACM}}, volume = {53}, number = {1}, pages = {90}, year = {2010}, url = {https://doi.org/10.1145/1629175.1629202}, doi = {10.1145/1629175.1629202}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Wallach10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/NganDW10, author = {Tsuen{-}Wan Ngan and Roger Dingledine and Dan S. Wallach}, editor = {Radu Sion}, title = {Building Incentives into Tor}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {238--256}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_19}, doi = {10.1007/978-3-642-14577-3\_19}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/NganDW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/essos/2010, editor = {Fabio Massacci and Dan S. Wallach and Nicola Zannone}, title = {Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5965}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11747-3}, doi = {10.1007/978-3-642-11747-3}, isbn = {978-3-642-11746-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Wallach09, author = {Dan S. Wallach}, title = {Technical perspective - Tools for information to flow securely and Swift-ly}, journal = {Commun. {ACM}}, volume = {52}, number = {2}, pages = {78}, year = {2009}, url = {https://doi.org/10.1145/1461928.1461948}, doi = {10.1145/1461928.1461948}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Wallach09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CrosbyWR09, author = {Scott A. Crosby and Dan S. Wallach and Rudolf H. Riedi}, title = {Opportunities and Limits of Remote Timing Attacks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {3}, pages = {17:1--17:29}, year = {2009}, url = {https://doi.org/10.1145/1455526.1455530}, doi = {10.1145/1455526.1455530}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CrosbyWR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CrosbyW09, author = {Scott A. Crosby and Dan S. Wallach}, editor = {Michael Backes and Peng Ning}, title = {Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {671--688}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_41}, doi = {10.1007/978-3-642-04444-1\_41}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CrosbyW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptps/SandlerW09, author = {Daniel Sandler and Dan S. Wallach}, editor = {Rodrigo Rodrigues and Keith W. Ross}, title = {Birds of a {FETHR:} open, decentralized micropublishing}, booktitle = {Proceedings of the 8th international conference on Peer-to-peer systems, IPTPS'09, Boston, MA, USA, April 21, 2009}, pages = {1}, publisher = {{USENIX}}, year = {2009}, url = {http://www.iptps.org/papers-2009/sandler.pdf}, timestamp = {Thu, 14 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iptps/SandlerW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CrosbyW09, author = {Scott A. Crosby and Dan S. Wallach}, editor = {Fabian Monrose}, title = {Efficient Data Structures For Tamper-Evident Logging}, booktitle = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings}, pages = {317--334}, publisher = {{USENIX} Association}, year = {2009}, url = {http://www.usenix.org/events/sec09/tech/full\_papers/crosby.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CrosbyW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OksuzogluW09, author = {Ersin {\"{O}}ks{\"{u}}zoglu and Dan S. Wallach}, editor = {David Jefferson and Joseph Lorenzo Hall and Tal Moran}, title = {VoteBox Nano: {A} Smaller, Stronger FPGA-based Voting Machine}, booktitle = {2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '09, Montreal, Canada, August 10-11, 2009}, publisher = {{USENIX} Association}, year = {2009}, url = {https://www.usenix.org/conference/evtwote-09/votebox-nano-smaller-stronger-fpga-based-voting-machine}, timestamp = {Mon, 01 Feb 2021 08:43:14 +0100}, biburl = {https://dblp.org/rec/conf/uss/OksuzogluW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/EverettGBWDST08, author = {Sarah P. Everett and Kristen K. Greene and Michael D. Byrne and Dan S. Wallach and Kyle Derr and Daniel Sandler and Ted Torous}, editor = {Mary Czerwinski and Arnold M. Lund and Desney S. Tan}, title = {Electronic voting machines versus traditional methods: improved preference, similar performance}, booktitle = {Proceedings of the 2008 Conference on Human Factors in Computing Systems, {CHI} 2008, 2008, Florence, Italy, April 5-10, 2008}, pages = {883--892}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1357054.1357195}, doi = {10.1145/1357054.1357195}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/EverettGBWDST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sadfe/SandlerDCW08, author = {Daniel Sandler and Kyle Derr and Scott A. Crosby and Dan S. Wallach}, title = {Finding the Evidence in Tamper-Evident Logs}, booktitle = {Third International Workshop on Systematic Approaches to Digital Forensic Engineering, {SADFE} 2008, Berkeley, California, USA, May 22, 2008}, pages = {69--75}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SADFE.2008.22}, doi = {10.1109/SADFE.2008.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sadfe/SandlerDCW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SandlerDW08, author = {Daniel Sandler and Kyle Derr and Dan S. Wallach}, editor = {Paul C. van Oorschot}, title = {VoteBox: {A} Tamper-evident, Verifiable Electronic Voting System}, booktitle = {Proceedings of the 17th {USENIX} Security Symposium, July 28-August 1, 2008, San Jose, CA, {USA}}, pages = {349--364}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/sec08/tech/full\_papers/sandler/sandler.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SandlerDW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SandlerW08, author = {Daniel Sandler and Dan S. Wallach}, editor = {David L. Dill and Tadayoshi Kohno}, title = {The Case for Networked Remote Voting Precincts}, booktitle = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July 28-29, 2008, San Jose, CA, USA, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/evt08/tech/full\_papers/sandler/sandler.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SandlerW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Wallach07, author = {Dan S. Wallach}, title = {Creating the {EVT} Workshop}, journal = {login Usenix Mag.}, volume = {32}, number = {5}, year = {2007}, url = {https://www.usenix.org/publications/login/october-2007-volume-32-number-5/creating-evt-workshop}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Wallach07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SandlerW07, author = {Daniel Sandler and Dan S. Wallach}, editor = {Ray Martinez and David A. Wagner}, title = {Casting Votes in the Auditorium}, booktitle = {2007 {USENIX/ACCURATE} Electronic Voting Technology Workshop, EVT'07, Boston, MA, USA, August 6, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/evt-07/casting-votes-auditorium}, timestamp = {Mon, 01 Feb 2021 08:42:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/SandlerW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocs/CoarfaDW06, author = {Cristian Coarfa and Peter Druschel and Dan S. Wallach}, title = {Performance analysis of {TLS} Web servers}, journal = {{ACM} Trans. Comput. Syst.}, volume = {24}, number = {1}, pages = {39--69}, year = {2006}, url = {https://doi.org/10.1145/1124153.1124155}, doi = {10.1145/1124153.1124155}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocs/CoarfaDW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/SinghNDW06, author = {Atul Singh and Tsuen{-}Wan Ngan and Peter Druschel and Dan S. Wallach}, title = {Eclipse Attacks on Overlay Networks: Threats and Defenses}, booktitle = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/INFOCOM.2006.231}, doi = {10.1109/INFOCOM.2006.231}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/SinghNDW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2006evt, editor = {Dan S. Wallach and Ronald L. Rivest}, title = {2006 {USENIX/ACCURATE} Electronic Voting Technology Workshop, EVT'06, Vancouver, BC, Canada, August 1, 2006}, publisher = {{USENIX} Association}, year = {2006}, url = {https://www.usenix.org/conference/evt06}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2006evt.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecr/StubblefieldRW05, author = {Adam Stubblefield and Aviel D. Rubin and Dan S. Wallach}, title = {Managing the Performance Impact of Web Security}, journal = {Electron. Commer. Res.}, volume = {5}, number = {1}, pages = {99--116}, year = {2005}, url = {https://doi.org/10.1023/B:ELEC.0000045975.59531.08}, doi = {10.1023/B:ELEC.0000045975.59531.08}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ecr/StubblefieldRW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/ShiehW05, author = {Shiuhpyng Shieh and Dan S. Wallach}, title = {Guest Editors' Introduction: Ad Hoc and {P2P} Security}, journal = {{IEEE} Internet Comput.}, volume = {9}, number = {6}, pages = {14--15}, year = {2005}, url = {https://doi.org/10.1109/MIC.2005.128}, doi = {10.1109/MIC.2005.128}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/ShiehW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/LaraCKVWZ05, author = {Eyal de Lara and Yogesh Chopra and Rajnish Kumar and Nilesh Vaghela and Dan S. Wallach and Willy Zwaenepoel}, title = {Iterative Adaptation for Mobile Clients Using Existing APIs}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {16}, number = {10}, pages = {966--981}, year = {2005}, url = {https://doi.org/10.1109/TPDS.2005.124}, doi = {10.1109/TPDS.2005.124}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/LaraCKVWZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/LaddBRKW05, author = {Andrew M. Ladd and Kostas E. Bekris and Algis Rudys and Lydia E. Kavraki and Dan S. Wallach}, title = {Robotics-Based Location Sensing Using Wireless Ethernet}, journal = {Wirel. Networks}, volume = {11}, number = {1-2}, pages = {189--204}, year = {2005}, url = {https://doi.org/10.1007/s11276-004-4755-8}, doi = {10.1007/S11276-004-4755-8}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/LaddBRKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptps/NielsonCW05, author = {Seth James Nielson and Scott A. Crosby and Dan S. Wallach}, editor = {Miguel Castro and Robbert van Renesse}, title = {A Taxonomy of Rational Attacks}, booktitle = {Peer-to-Peer Systems IV, 4th International Workshop, {IPTPS} 2005, Ithaca, NY, USA, February 24-25, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3640}, pages = {36--46}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11558989\_4}, doi = {10.1007/11558989\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/iptps/NielsonCW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/NandiNSDW05, author = {Animesh Nandi and Tsuen{-}Wan Ngan and Atul Singh and Peter Druschel and Dan S. Wallach}, editor = {Gustavo Alonso}, title = {Scrivener: Providing Incentives in Cooperative Content Distribution Systems}, booktitle = {Middleware 2005, ACM/IFIP/USENIX, 6th International Middleware Conference, Grenoble, France, November 28 - December 2, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3790}, pages = {270--291}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11587552\_14}, doi = {10.1007/11587552\_14}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/middleware/NandiNSDW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BannetPRSW04, author = {Jonathan Bannet and David W. Price and Algis Rudys and Justin Singer and Dan S. Wallach}, title = {Hack-a-Vote: Security Issues with Electronic Voting Systems}, journal = {{IEEE} Secur. Priv.}, volume = {2}, number = {1}, pages = {32--37}, year = {2004}, url = {https://doi.org/10.1109/MSECP.2004.1264851}, doi = {10.1109/MSECP.2004.1264851}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BannetPRSW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/trob/LaddBRWK04, author = {Andrew M. Ladd and Kostas E. Bekris and Algis Rudys and Dan S. Wallach and Lydia E. Kavraki}, title = {On the feasibility of using wireless ethernet for indoor localization}, journal = {{IEEE} Trans. Robotics}, volume = {20}, number = {3}, pages = {555--559}, year = {2004}, url = {https://doi.org/10.1109/TRA.2004.824948}, doi = {10.1109/TRA.2004.824948}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/trob/LaddBRWK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/HaeberlenFLRWK04, author = {Andreas Haeberlen and Eliot Flannery and Andrew M. Ladd and Algis Rudys and Dan S. Wallach and Lydia E. Kavraki}, editor = {Zygmunt J. Haas and Samir R. Das and Ravi Jain}, title = {Practical robust localization over large-scale 802.11 wireless networks}, booktitle = {Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, {MOBICOM} 2004, 2004, Philadelphia, PA, USA, September 26 - October 1, 2004}, pages = {70--84}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1023720.1023728}, doi = {10.1145/1023720.1023728}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/HaeberlenFLRWK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigopsE/MisloveOPRDW04, author = {Alan Mislove and Gaurav Oberoi and Ansley Post and Charles Reis and Peter Druschel and Dan S. Wallach}, editor = {Yolande Berbers and Miguel Castro}, title = {{AP3:} cooperative, decentralized anonymous communication}, booktitle = {Proceedings of the 11st {ACM} {SIGOPS} European Workshop, Leuven, Belgium, September 19-22, 2004}, pages = {30}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1133572.1133578}, doi = {10.1145/1133572.1133578}, timestamp = {Thu, 07 Nov 2019 10:24:25 +0100}, biburl = {https://dblp.org/rec/conf/sigopsE/MisloveOPRDW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KohnoSRW04, author = {Tadayoshi Kohno and Adam Stubblefield and Aviel D. Rubin and Dan S. Wallach}, title = {Analysis of an Electronic Voting System}, booktitle = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12 May 2004, Berkeley, CA, {USA}}, pages = {27}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SECPRI.2004.1301313}, doi = {10.1109/SECPRI.2004.1301313}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/KohnoSRW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocs/HuYCWZ03, author = {Y. Charlie Hu and Weimin Yu and Alan L. Cox and Dan S. Wallach and Willy Zwaenepoel}, title = {Run-time support for distributed sharing in safe languages}, journal = {{ACM} Trans. Comput. Syst.}, volume = {21}, number = {1}, pages = {1--35}, year = {2003}, url = {https://doi.org/10.1145/592637.592638}, doi = {10.1145/592637.592638}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocs/HuYCWZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotos/MislovePRWDWBSBA03, author = {Alan Mislove and Ansley Post and Charles Reis and Paul Willmann and Peter Druschel and Dan S. Wallach and Xavier Bonnaire and Pierre Sens and Jean{-}Michel Busca and Luciana Bezerra Arantes}, editor = {Michael B. Jones}, title = {{POST:} {A} Secure, Resilient, Cooperative Messaging System}, booktitle = {Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems, May 18-21, 2003, Lihue (Kauai), Hawaii, {USA}}, pages = {61--66}, publisher = {{USENIX}}, year = {2003}, url = {https://www.usenix.org/conference/hotos-ix/post-secure-resilient-cooperative-messaging-system}, timestamp = {Wed, 18 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotos/MislovePRWDWBSBA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptps/NganWD03, author = {Tsuen{-}Wan Ngan and Dan S. Wallach and Peter Druschel}, editor = {M. Frans Kaashoek and Ion Stoica}, title = {Enforcing Fair Sharing of Peer-to-Peer Resources}, booktitle = {Peer-to-Peer Systems II, Second International Workshop, {IPTPS} 2003, Berkeley, CA, USA, February 21-22,2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2735}, pages = {149--159}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45172-3\_14}, doi = {10.1007/978-3-540-45172-3\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/iptps/NganWD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/LaraKWZ03, author = {Eyal de Lara and Rajnish Kumar and Dan S. Wallach and Willy Zwaenepoel}, editor = {Daniel P. Siewiorek and Mary Baker and Robert T. Morris}, title = {Collaboration and Multimedia Authoring on Mobile Devices}, booktitle = {Proceedings of the First International Conference on Mobile Systems, Applications, and Services, MobiSys 2003, San Francisco, CA, USA, May 5-8, 2003}, pages = {287--301}, publisher = {{USENIX}}, year = {2003}, url = {https://www.usenix.org/events/mobisys03/tech/delara.html}, doi = {10.1145/1066116.1066126}, timestamp = {Tue, 10 Aug 2021 14:09:12 +0200}, biburl = {https://dblp.org/rec/conf/mobisys/LaraKWZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PriceRW03, author = {David W. Price and Algis Rudys and Dan S. Wallach}, title = {Garbage Collector Memory Accounting in Language-Based Systems}, booktitle = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14 May 2003, Berkeley, CA, {USA}}, pages = {263--274}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199342}, doi = {10.1109/SECPRI.2003.1199342}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/PriceRW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CrosbyW03, author = {Scott A. Crosby and Dan S. Wallach}, title = {Denial of Service via Algorithmic Complexity Attacks}, booktitle = {Proceedings of the 12th {USENIX} Security Symposium, Washington, D.C., USA, August 4-8, 2003}, publisher = {{USENIX} Association}, year = {2003}, url = {https://www.usenix.org/conference/12th-usenix-security-symposium/denial-service-algorithmic-complexity-attacks}, timestamp = {Mon, 01 Feb 2021 08:43:16 +0100}, biburl = {https://dblp.org/rec/conf/uss/CrosbyW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ws/TaoRLW03, author = {Ping Tao and Algis Rudys and Andrew M. Ladd and Dan S. Wallach}, editor = {W. Douglas Maughan and Adrian Perrig}, title = {Wireless {LAN} location-sensing for security applications}, booktitle = {Proceedings of the 2003 {ACM} Workshop on Wireless Security, San Diego, CA, USA, September 19, 2003}, pages = {11--20}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/941311.941314}, doi = {10.1145/941311.941314}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ws/TaoRLW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/RudysW02, author = {Algis Rudys and Dan S. Wallach}, title = {Termination in language-based systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {2}, pages = {138--168}, year = {2002}, url = {https://doi.org/10.1145/505586.505589}, doi = {10.1145/505586.505589}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/RudysW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/RudysW02, author = {Algis Rudys and Dan S. Wallach}, title = {Transactional Rollback for Language-Based Systems}, booktitle = {2002 International Conference on Dependable Systems and Networks {(DSN} 2002), 23-26 June 2002, Bethesda, MD, USA, Proceedings}, pages = {439--448}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/DSN.2002.1028929}, doi = {10.1109/DSN.2002.1028929}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/RudysW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iros/LaddBMRWK02, author = {Andrew M. Ladd and Kostas E. Bekris and Guillaume Marceau and Algis Rudys and Dan S. Wallach and Lydia E. Kavraki}, title = {Using wireless Ethernet for localization}, booktitle = {{IEEE/RSJ} International Conference on Intelligent Robots and Systems, Lausanne, Switzerland, September 30 - October 4, 2002}, pages = {402--408}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/IRDS.2002.1041423}, doi = {10.1109/IRDS.2002.1041423}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iros/LaddBMRWK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isss2/Wallach02, author = {Dan S. Wallach}, editor = {Mitsuhiro Okada and Benjamin C. Pierce and Andre Scedrov and Hideyuki Tokuda and Akinori Yonezawa}, title = {A Survey of Peer-to-Peer Security Issues}, booktitle = {Software Security -- Theories and Systems, Mext-NSF-JSPS International Symposium, {ISSS} 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2609}, pages = {42--57}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36532-X\_4}, doi = {10.1007/3-540-36532-X\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/isss2/Wallach02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isss2/RudysW02, author = {Algis Rudys and Dan S. Wallach}, editor = {Mitsuhiro Okada and Benjamin C. Pierce and Andre Scedrov and Hideyuki Tokuda and Akinori Yonezawa}, title = {Enforcing Java Run-Time Properties Using Bytecode Rewriting}, booktitle = {Software Security -- Theories and Systems, Mext-NSF-JSPS International Symposium, {ISSS} 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2609}, pages = {185--200}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36532-X\_12}, doi = {10.1007/3-540-36532-X\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isss2/RudysW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/LaddBRKWM02, author = {Andrew M. Ladd and Kostas E. Bekris and Algis Rudys and Lydia E. Kavraki and Dan S. Wallach and Guillaume Marceau}, editor = {Ian F. Akyildiz and Jason Yi{-}Bing Lin and Ravi Jain and Vaduvur Bharghavan and Andrew T. Campbell}, title = {Robotics-based location sensing using wireless ethernet}, booktitle = {Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking, {MOBICOM} 2002, Atlanta, Georgia, USA, September 23-28, 2002}, pages = {227--238}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/570645.570674}, doi = {10.1145/570645.570674}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/LaddBRKWM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CoarfaDW02, author = {Cristian Coarfa and Peter Druschel and Dan S. Wallach}, title = {Performance Analysis of {TLS} Web Servers}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2002, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2002}, url = {https://www.ndss-symposium.org/ndss2002/performance-analysis-tls-web-servers/}, timestamp = {Mon, 01 Feb 2021 08:42:25 +0100}, biburl = {https://dblp.org/rec/conf/ndss/CoarfaDW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/osdi/CastroDGRW02, author = {Miguel Castro and Peter Druschel and Ayalvadi J. Ganesh and Antony I. T. Rowstron and Dan S. Wallach}, editor = {David E. Culler and Peter Druschel}, title = {Secure Routing for Structured Peer-to-Peer Overlay Networks}, booktitle = {5th Symposium on Operating System Design and Implementation {(OSDI} 2002), Boston, Massachusetts, USA, December 9-11, 2002}, publisher = {{USENIX} Association}, year = {2002}, url = {http://www.usenix.org/events/osdi02/tech/castro.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/osdi/CastroDGRW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/DotsenkoLWZ02, author = {Yuri Dotsenko and Eyal de Lara and Dan S. Wallach and Willy Zwaenepoel}, title = {Extensible Adaptation via Constraint Solving}, booktitle = {4th {IEEE} Workshop on Mobile Computing Systems and Applications {(WMCSA} 2002), 20-21 June 2002, Callicoon, NY, {USA}}, pages = {117--127}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/MCSA.2002.1017491}, doi = {10.1109/MCSA.2002.1017491}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wmcsa/DotsenkoLWZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Wallach01, author = {Dan S. Wallach}, title = {Copy Protection Technology is Doomed}, journal = {Computer}, volume = {34}, number = {10}, pages = {48--49}, year = {2001}, url = {https://doi.org/10.1109/2.955098}, doi = {10.1109/2.955098}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Wallach01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotos/LaraWZ01, author = {Eyal de Lara and Dan S. Wallach and Willy Zwaenepoel}, title = {Architectures for Adaption Systems}, booktitle = {Proceedings of HotOS-VIII: 8th Workshop on Hot Topics in Operating Systems, May 20-23, 2001, Elmau/Oberbayern, Germany}, pages = {167}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/HOTOS.2001.990083}, doi = {10.1109/HOTOS.2001.990083}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotos/LaraWZ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/FlinnLSWZ01, author = {Jason Flinn and Eyal de Lara and Mahadev Satyanarayanan and Dan S. Wallach and Willy Zwaenepoel}, editor = {Rachid Guerraoui}, title = {Reducing the Energy Usage of Office Applications}, booktitle = {Middleware 2001, {IFIP/ACM} International Conference on Distributed Systems Platforms Heidelberg, Germany, November 12-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2218}, pages = {252--272}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45518-3\_14}, doi = {10.1007/3-540-45518-3\_14}, timestamp = {Wed, 07 Dec 2022 23:12:38 +0100}, biburl = {https://dblp.org/rec/conf/middleware/FlinnLSWZ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/RudysCW01, author = {Algis Rudys and John Clements and Dan S. Wallach}, title = {Termination in Language-based Systems}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2001, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2001}, url = {https://www.ndss-symposium.org/ndss2001/termination-language-based-systems/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/RudysCW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usits/LaraWZ01, author = {Eyal de Lara and Dan S. Wallach and Willy Zwaenepoel}, editor = {Tom Anderson}, title = {Puppeteer: Component-based Adaptation for Mobile Computing}, booktitle = {3rd {USENIX} Symposium on Internet Technologies and Systems, USITS'01, San Francisco, California, USA, March 26-28, 2001}, pages = {159--170}, publisher = {{USENIX}}, year = {2001}, url = {http://www.usenix.org/events/usits01/delara.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/usits/LaraWZ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CraverWLSSWDF01, author = {Scott Craver and Min Wu and Bede Liu and Adam Stubblefield and Ben Swartzlander and Dan S. Wallach and Drew Dean and Edward W. Felten}, editor = {Dan S. Wallach}, title = {Reading Between the Lines: Lessons from the {SDMI} Challenge}, booktitle = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington, D.C., {USA}}, publisher = {{USENIX}}, year = {2001}, url = {http://www.usenix.org/publications/library/proceedings/sec01/craver.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CraverWLSSWDF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2001, editor = {Dan S. Wallach}, title = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington, D.C., {USA}}, publisher = {{USENIX}}, year = {2001}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/WallachAF00, author = {Dan S. Wallach and Andrew W. Appel and Edward W. Felten}, title = {{SAFKASI:} a security mechanism for language-based systems}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {9}, number = {4}, pages = {341--378}, year = {2000}, url = {https://doi.org/10.1145/363516.363520}, doi = {10.1145/363516.363520}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/WallachAF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcr/HuYCWZ00, author = {Y. Charlie Hu and Weimin Yu and Alan L. Cox and Dan S. Wallach and Willy Zwaenepoel}, editor = {Sandhya Dwarkadas}, title = {Run-Time Support for Distributed Sharing in Typed Languages}, booktitle = {Languages, Compilers, and Run-Time Systems for Scalable Computers, 5th International Workshop, {LCR} 2000, Rochester, NY, USA, May 25-27, 2000, Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {1915}, pages = {192--206}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-40889-4\_15}, doi = {10.1007/3-540-40889-4\_15}, timestamp = {Sun, 12 Feb 2023 18:48:31 +0100}, biburl = {https://dblp.org/rec/conf/lcr/HuYCWZ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WallachF98, author = {Dan S. Wallach and Edward W. Felten}, title = {Understanding Java Stack Inspection}, booktitle = {Security and Privacy - 1998 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, May 3-6, 1998, Proceedings}, pages = {52--63}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/SECPRI.1998.674823}, doi = {10.1109/SECPRI.1998.674823}, timestamp = {Thu, 21 Sep 2023 15:57:37 +0200}, biburl = {https://dblp.org/rec/conf/sp/WallachF98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/WallachBDF97, author = {Dan S. Wallach and Dirk Balfanz and Drew Dean and Edward W. Felten}, editor = {Michel Ban{\^{a}}tre and Henry M. Levy and William M. Waite}, title = {Extensible Security Architecture for Java}, booktitle = {Proceedings of the Sixteenth {ACM} Symposium on Operating System Principles, {SOSP} 1997, St. Malo, France, October 5-8, 1997}, pages = {116--128}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/268998.266668}, doi = {10.1145/268998.266668}, timestamp = {Tue, 06 Nov 2018 16:59:32 +0100}, biburl = {https://dblp.org/rec/conf/sosp/WallachBDF97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/WallachRF96, author = {Dan S. Wallach and Jim A. Roskind and Edward W. Felten}, editor = {Rebecca N. Wright and Peter G. Neumann}, title = {Flexible, extensible Java security using digital signatures}, booktitle = {Network Threats, Proceedings of a {DIMACS} Workshop, December 2-4, 1996}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {38}, pages = {59--74}, publisher = {{DIMACS/AMS}}, year = {1996}, url = {https://doi.org/10.1090/dimacs/038/07}, doi = {10.1090/DIMACS/038/07}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/WallachRF96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DeanFW96, author = {Drew Dean and Edward W. Felten and Dan S. Wallach}, title = {Java Security: From HotJava to Netscape and Beyond}, booktitle = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, {USA}}, pages = {190--200}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/SECPRI.1996.502681}, doi = {10.1109/SECPRI.1996.502681}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/DeanFW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siggraph/WallachKC94, author = {Dan S. Wallach and Sharma Kunapalli and Michael F. Cohen}, editor = {Dino Schweitzer and Andrew S. Glassner and Mike Keeler}, title = {Accelerated {MPEG} compression of dynamic polygonal scenes}, booktitle = {Proceedings of the 21th Annual Conference on Computer Graphics and Interactive Techniques, {SIGGRAPH} 1994, Orlando, FL, USA, July 24-29, 1994}, pages = {193--196}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/192161.192198}, doi = {10.1145/192161.192198}, timestamp = {Tue, 06 Nov 2018 16:59:17 +0100}, biburl = {https://dblp.org/rec/conf/siggraph/WallachKC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.