default search action
Dan S. Wallach
Person information
- affiliation: Rice University, Houston, Department of Computer Science
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Dan S. Wallach, Bob Lord:
A Viewpoint: A Memory Safety Manifesto. IEEE Secur. Priv. 22(4): 18-21 (2024) - [c71]Josh Benaloh, Michael Naehrig, Olivier Pereira, Dan S. Wallach:
ElectionGuard: a Cryptographic Toolkit to Enable Verifiable Elections. USENIX Security Symposium 2024 - [i30]Josh Benaloh, Michael Naehrig, Olivier Pereira, Dan S. Wallach:
ElectionGuard: a Cryptographic Toolkit to Enable Verifiable Elections. IACR Cryptol. ePrint Arch. 2024: 955 (2024) - 2023
- [c70]Fei Zhao, Chengcui Zhang, Nitesh Saxena, Dan S. Wallach, AKM Shahariar Azad Rabby:
Ballot Tabulation Using Deep Learning. IRI 2023: 107-114 - 2022
- [b1]Matthew Bernhard, Dan S. Wallach:
Election Security: Risk Limiting Audits. ACM TechBrief 5, ACM 2022 - [j29]Claudia Ziegler Acemyan, Philip T. Kortum, Michael D. Byrne, Dan S. Wallach:
Summative Usability Assessments of STAR-Vote: A Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use. Hum. Factors 64(5): 866-889 (2022) - 2021
- [j28]Josh Benaloh, Kammi Foote, Philip B. Stark, Vanessa Teague, Dan S. Wallach:
VAULT-Style Risk-Limiting Audits and the Inyo County Pilot. IEEE Secur. Priv. 19(4): 8-18 (2021) - [j27]Jonathan Sharman, Claudia Z. Acemyan, Philip T. Kortum, Dan S. Wallach:
Bad Tools Hurt: Lessons for teaching computer security skills to undergraduates. Int. J. Comput. Sci. Educ. Sch. 5(2): 74-92 (2021) - [c69]Chris Bronk, Amaury Lendasse, Peggy Lindner, Dan S. Wallach, Barbara Hammer:
Machine Learning for Measuring and Analyzing Online Social Communications. ESANN 2021 - 2020
- [j26]Philip T. Kortum, Robert Stein, Claudia Ziegler Acemyan, Dan S. Wallach, Elizabeth Vann:
How Human Factors Can Help Preserve Democracy in the Age of Pandemics. Hum. Factors 62(7) (2020) - [j25]Thien-Nam Dinh, Florentin Rochet, Olivier Pereira, Dan S. Wallach:
Scaling Up Anonymous Communication with Efficient Nanopayment Channels. Proc. Priv. Enhancing Technol. 2020(3): 175-203 (2020) - [i29]Daniel W. Song, Konstantinos Mamouras, Ang Chen, Nathan Dautenhahn, Dan S. Wallach:
The Design and Implementation of a Verified File System with End-to-End Data Integrity. CoRR abs/2012.07917 (2020)
2010 – 2019
- 2019
- [c68]Matthew Bernhard, Jonathan Sharman, Claudia Ziegler Acemyan, Philip T. Kortum, Dan S. Wallach, J. Alex Halderman:
On the Usability of HTTPS Deployment. CHI 2019: 310 - [c67]Jaeho Lee, Ang Chen, Dan S. Wallach:
Total Recall: Persistence of Passwords in Android. NDSS 2019 - [i28]Dan S. Wallach:
On the security of ballot marking devices. CoRR abs/1908.01897 (2019) - [i27]Clayton Drazner, Nikola Duza, Hugo Jonker, Dan S. Wallach:
Investigating the effectiveness of web adblockers. CoRR abs/1912.06176 (2019) - [i26]M. Sadegh Riazi, Beidi Chen, Anshumali Shrivastava, Dan S. Wallach, Farinaz Koushanfar:
Sub-Linear Privacy-Preserving Near-Neighbor Search. IACR Cryptol. ePrint Arch. 2019: 1222 (2019) - 2018
- [c66]Bumjin Im, Ang Chen, Dan S. Wallach:
An Historical Analysis of the SEAndroid Policy Evolution. ACSAC 2018: 629-640 - [c65]Jaeho Lee, Dan S. Wallach:
Removing Secrets from Android's TLS. NDSS 2018 - [i25]Bumjin Im, Ang Chen, Dan S. Wallach:
An Historical Analysis of the SEAndroid Policy Evolution. CoRR abs/1812.00920 (2018) - 2017
- [j24]Adam Pridgen, Simson L. Garfinkel, Dan S. Wallach:
Picking up the trash: Exploiting generational GC for memory analysis. Digit. Investig. 20 Supplement: S20-S28 (2017) - [c64]Adam Pridgen, Simson L. Garfinkel, Dan S. Wallach:
Present but Unreachable: Reducing Persistentlatent Secrets in HotSpot JVM. HICSS 2017: 1-10 - [c63]Murat Moran, Dan S. Wallach:
Verification of STAR-Vote and Evaluation of FDR and ProVerif. IFM 2017: 422-436 - [c62]Rima S. Tanash, Zhouhan Chen, Dan S. Wallach, Melissa Marschall:
The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup. FOCI @ USENIX Security Symposium 2017 - [c61]Matthew Bernhard, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach:
Public Evidence from Secret Ballots. E-VOTE-ID 2017: 84-109 - [c60]Olivier Pereira, Dan S. Wallach:
Clash Attacks and the STAR-Vote System. E-VOTE-ID 2017: 228-247 - [i24]Murat Moran, Dan S. Wallach:
Verification of STAR-Vote and Evaluation of FDR and ProVerif. CoRR abs/1705.00782 (2017) - [i23]Josh Benaloh, Matthew Bernhard, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach:
Public Evidence from Secret Ballots. CoRR abs/1707.08619 (2017) - 2016
- [e4]Jeremy Clark, Sarah Meiklejohn, Peter Y. A. Ryan, Dan S. Wallach, Michael Brenner, Kurt Rohloff:
Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9604, Springer 2016, ISBN 978-3-662-53356-7 [contents] - [i22]M. Sadegh Riazi, Beidi Chen, Anshumali Shrivastava, Dan S. Wallach, Farinaz Koushanfar:
Sub-linear Privacy-preserving Search with Untrusted Server and Semi-honest Parties. CoRR abs/1612.01835 (2016) - 2015
- [j23]Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable wiretapping - or - I know they can hear you now. J. Comput. Secur. 23(2): 167-195 (2015) - [j22]Yue Liu, David R. Bild, Robert P. Dick, Zhuoqing Morley Mao, Dan S. Wallach:
The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities. IEEE Trans. Mob. Comput. 14(11): 2376-2391 (2015) - [j21]David R. Bild, Yue Liu, Robert P. Dick, Zhuoqing Morley Mao, Dan S. Wallach:
Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph. ACM Trans. Internet Techn. 15(1): 4:1-4:24 (2015) - [c59]Claudia Z. Acemyan, Philip T. Kortum, Michael D. Byrne, Dan S. Wallach:
Users' Mental Models for Three End-to-End Voting Systems: Helios, Prêt à Voter, and Scantegrity II. HCI (22) 2015: 463-474 - [c58]Judson C. Dressler, Christopher Bronk, Daniel S. Wallach:
Exploiting military OpSec through open-source vulnerabilities. MILCOM 2015: 450-458 - [c57]Yue Liu, David R. Bild, David Adrian, Gulshan Singh, Robert P. Dick, Dan S. Wallach, Zhuoqing Morley Mao:
Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication. MobiHoc 2015: 257-266 - [c56]Rima S. Tanash, Zhouhan Chen, Tanmay Thakur, Dan S. Wallach, Devika Subramanian:
Known Unknowns: An Analysis of Twitter Censorship in Turkey. WPES@CCS 2015: 11-20 - [i21]Theodore Book, Dan S. Wallach:
An Empirical Study of Mobile Ad Targeting. CoRR abs/1502.06577 (2015) - [i20]Daniel Song, Jisheng Zhao, Michael G. Burke, Dragos Sbirlea, Dan S. Wallach, Vivek Sarkar:
Finding Tizen security bugs through whole-system static analysis. CoRR abs/1504.05967 (2015) - 2014
- [j20]Dan S. Wallach:
Smartphone security 'taint' what it used to be: technical perspective. Commun. ACM 57(3): 98 (2014) - [j19]Masoud Rostami, Mehrdad Majzoobi, Farinaz Koushanfar, Dan S. Wallach, Srinivas Devadas:
Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching. IEEE Trans. Emerg. Top. Comput. 2(1): 37-49 (2014) - [c55]Michael Dietz, Dan S. Wallach:
Hardening Persona - Improving Federated Web Login. NDSS 2014 - [c54]Claudia Z. Acemyan, Philip T. Kortum, Michael D. Byrne, Dan S. Wallach:
Usability of Voter Verifiable, End-to-end Voting Systems: Baseline Data for Helios, Prêt à Voter, and Scantegrity II. EVT/WOTE 2014 - [i19]David R. Bild, Yue Liu, Robert P. Dick, Zhuoqing Morley Mao, Dan S. Wallach:
Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph. CoRR abs/1402.2671 (2014) - [i18]David R. Bild, Yue Liu, Robert P. Dick, Zhuoqing Morley Mao, Dan S. Wallach:
Performance Analysis of Location Profile Routing. CoRR abs/1403.4677 (2014) - [i17]Yue Liu, David R. Bild, Robert P. Dick, Zhuoqing Morley Mao, Dan S. Wallach:
The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities. CoRR abs/1403.5871 (2014) - [i16]Ardalan Amiri Sani, Lin Zhong, Dan S. Wallach:
Glider: A GPU Library Driver for Improved System Security. CoRR abs/1411.3777 (2014) - 2013
- [c53]Theodore Book, Dan S. Wallach:
A case of collusion: a study of the interface between ad libraries and their apps. SPSM@CCS 2013: 79-86 - [c52]Josh Benaloh, Michael D. Byrne, Bryce Eakin, Philip T. Kortum, Neal McBurnett, Olivier Pereira, Philip B. Stark, Dan S. Wallach, Gail Fisher, Julian Montoya, Michelle Parker, Michael Winn:
STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System. EVT/WOTE 2013 - [c51]Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach:
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions. USENIX Security Symposium 2013: 227-240 - [i15]Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach:
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions. CoRR abs/1303.0597 (2013) - [i14]Theodore Book, Adam Pridgen, Dan S. Wallach:
Longitudinal Analysis of Android Ad Library Permissions. CoRR abs/1303.0857 (2013) - [i13]Theodore Book, Martha Witick, Dan S. Wallach:
Automated generation of web server fingerprints. CoRR abs/1305.0245 (2013) - [i12]Theodore Book, Dan S. Wallach:
A Case of Collusion: A Study of the Interface Between Ad Libraries and their Apps. CoRR abs/1307.6082 (2013) - 2012
- [j18]Shashi Shekhar, Michael Dietz, Dan S. Wallach:
AdSplit: Separating Smartphone Advertising from Applications. login Usenix Mag. 37(6) (2012) - [c50]Alexei Czeskis, Michael Dietz, Tadayoshi Kohno, Dan S. Wallach, Dirk Balfanz:
Strengthening user authentication through opportunistic cryptographic identity assertions. CCS 2012: 404-414 - [c49]Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable Wiretapping -or- I know they can hear you now. NDSS 2012 - [c48]Peiyou Song, Anhei Shu, David Phipps, Mohit Tiwari, Dan S. Wallach, Jedidiah R. Crandall, George F. Luger:
Language without words: A pointillist model for natural language processing. SCIS&ISIS 2012: 11-15 - [c47]Mehrdad Majzoobi, Masoud Rostami, Farinaz Koushanfar, Dan S. Wallach, Srinivas Devadas:
Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching. IEEE Symposium on Security and Privacy Workshops 2012: 33-44 - [c46]Nicholas Aase, Jedidiah R. Crandall, Alvaro Diaz, Jeffrey Knockel, Jorge Ocana Molinero, Jared Saia, Dan S. Wallach, Tao Zhu:
Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations. FOCI 2012 - [c45]Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach:
Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web. USENIX Security Symposium 2012: 317-331 - [c44]Shashi Shekhar, Michael Dietz, Dan S. Wallach:
AdSplit: Separating Smartphone Advertising from Applications. USENIX Security Symposium 2012: 553-567 - [i11]Shashi Shekhar, Michael Dietz, Dan S. Wallach:
AdSplit: Separating smartphone advertising from applications. CoRR abs/1202.4030 (2012) - [i10]Peiyou Song, Anhei Shu, Anyu Zhou, Dan S. Wallach, Jedidiah R. Crandall:
A Pointillism Approach for Natural Language Processing of Social Media. CoRR abs/1206.4958 (2012) - [i9]Josh Benaloh, Mike Byrne, Philip T. Kortum, Neal McBurnett, Olivier Pereira, Philip B. Stark, Dan S. Wallach:
STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System. CoRR abs/1211.1904 (2012) - [i8]Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach:
Tracking and Quantifying Censorship on a Chinese Microblogging Site. CoRR abs/1211.6166 (2012) - [i7]Peiyou Song, Anhei Shu, David Phipps, Dan S. Wallach, Mohit Tiwari, Jedidiah R. Crandall, George F. Luger:
Language Without Words: A Pointillist Model for Natural Language Processing. CoRR abs/1212.3228 (2012) - 2011
- [j17]Dan S. Wallach:
Rebooting the CS publication process. Commun. ACM 54(10): 32-35 (2011) - [j16]Scott A. Crosby, Dan S. Wallach:
Authenticated Dictionaries: Real-World Costs and Trade-Offs. ACM Trans. Inf. Syst. Secur. 14(2): 17:1-17:30 (2011) - [c43]David R. Bild, Yue Liu, Robert P. Dick, Z. Morley Mao, Dan S. Wallach:
Using predictable mobility patterns to support scalable and secure MANETs of handheld devices. MobiArch 2011: 13-18 - [c42]Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach:
QUIRE: Lightweight Provenance for Smart Phone Operating Systems. USENIX Security Symposium 2011 - [r1]Scott A. Crosby, Dan S. Wallach:
Algorithmic DoS. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 32-33 - [i6]Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach:
Quire: Lightweight Provenance for Smart Phone Operating Systems. CoRR abs/1102.2445 (2011) - [i5]Tao Zhu, Christopher Bronk, Dan S. Wallach:
An Analysis of Chinese Search Engine Filtering. CoRR abs/1107.3794 (2011) - [i4]Seth James Nielson, Seth J. Fogarty, Dan S. Wallach:
Attacks on Local Searching Tools. CoRR abs/1108.2704 (2011) - [i3]Seth James Nielson, Caleb E. Spare, Dan S. Wallach:
Building Better Incentives for Robustness in BitTorrent. CoRR abs/1108.2716 (2011) - [i2]Seth James Nielson, Dan S. Wallach:
The BitTorrent Anonymity Marketplace. CoRR abs/1108.2718 (2011) - [i1]Dustin Bachrach, Christopher Nunu, Dan S. Wallach, Matthew K. Wright:
#h00t: Censorship Resistant Microblogging. CoRR abs/1109.6874 (2011) - 2010
- [j15]Dan S. Wallach:
Technical perspective - Native Client: a clever alternative. Commun. ACM 53(1): 90 (2010) - [c41]Tsuen-Wan Ngan, Roger Dingledine, Dan S. Wallach:
Building Incentives into Tor. Financial Cryptography 2010: 238-256 - [e3]Fabio Massacci, Dan S. Wallach, Nicola Zannone:
Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings. Lecture Notes in Computer Science 5965, Springer 2010, ISBN 978-3-642-11746-6 [contents]
2000 – 2009
- 2009
- [j14]Dan S. Wallach:
Technical perspective - Tools for information to flow securely and Swift-ly. Commun. ACM 52(2): 78 (2009) - [j13]Scott A. Crosby, Dan S. Wallach, Rudolf H. Riedi:
Opportunities and Limits of Remote Timing Attacks. ACM Trans. Inf. Syst. Secur. 12(3): 17:1-17:29 (2009) - [c40]Scott A. Crosby, Dan S. Wallach:
Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries. ESORICS 2009: 671-688 - [c39]Daniel Sandler, Dan S. Wallach:
Birds of a FETHR: open, decentralized micropublishing. IPTPS 2009: 1 - [c38]Scott A. Crosby, Dan S. Wallach:
Efficient Data Structures For Tamper-Evident Logging. USENIX Security Symposium 2009: 317-334 - [c37]Ersin Öksüzoglu, Dan S. Wallach:
VoteBox Nano: A Smaller, Stronger FPGA-based Voting Machine. EVT/WOTE 2009 - 2008
- [c36]Sarah P. Everett, Kristen K. Greene, Michael D. Byrne, Dan S. Wallach, Kyle Derr, Daniel Sandler, Ted Torous:
Electronic voting machines versus traditional methods: improved preference, similar performance. CHI 2008: 883-892 - [c35]Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S. Wallach:
Finding the Evidence in Tamper-Evident Logs. SADFE 2008: 69-75 - [c34]Daniel Sandler, Kyle Derr, Dan S. Wallach:
VoteBox: A Tamper-evident, Verifiable Electronic Voting System. USENIX Security Symposium 2008: 349-364 - [c33]Daniel Sandler, Dan S. Wallach:
The Case for Networked Remote Voting Precincts. EVT 2008 - 2007
- [j12]Dan S. Wallach:
Creating the EVT Workshop. login Usenix Mag. 32(5) (2007) - [c32]Daniel Sandler, Dan S. Wallach:
Casting Votes in the Auditorium. EVT 2007 - 2006
- [j11]Cristian Coarfa, Peter Druschel, Dan S. Wallach:
Performance analysis of TLS Web servers. ACM Trans. Comput. Syst. 24(1): 39-69 (2006) - [c31]Atul Singh, Tsuen-Wan Ngan, Peter Druschel, Dan S. Wallach:
Eclipse Attacks on Overlay Networks: Threats and Defenses. INFOCOM 2006 - [e2]Dan S. Wallach, Ronald L. Rivest:
2006 USENIX/ACCURATE Electronic Voting Technology Workshop, EVT'06, Vancouver, BC, Canada, August 1, 2006. USENIX Association 2006 [contents] - 2005
- [j10]Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach:
Managing the Performance Impact of Web Security. Electron. Commer. Res. 5(1): 99-116 (2005) - [j9]Shiuhpyng Shieh, Dan S. Wallach:
Guest Editors' Introduction: Ad Hoc and P2P Security. IEEE Internet Comput. 9(6): 14-15 (2005) - [j8]Eyal de Lara, Yogesh Chopra, Rajnish Kumar, Nilesh Vaghela, Dan S. Wallach, Willy Zwaenepoel:
Iterative Adaptation for Mobile Clients Using Existing APIs. IEEE Trans. Parallel Distributed Syst. 16(10): 966-981 (2005) - [j7]Andrew M. Ladd, Kostas E. Bekris, Algis Rudys, Lydia E. Kavraki, Dan S. Wallach:
Robotics-Based Location Sensing Using Wireless Ethernet. Wirel. Networks 11(1-2): 189-204 (2005) - [c30]Seth James Nielson, Scott A. Crosby, Dan S. Wallach:
A Taxonomy of Rational Attacks. IPTPS 2005: 36-46 - [c29]Animesh Nandi, Tsuen-Wan Ngan, Atul Singh, Peter Druschel, Dan S. Wallach:
Scrivener: Providing Incentives in Cooperative Content Distribution Systems. Middleware 2005: 270-291 - 2004
- [j6]Jonathan Bannet, David W. Price, Algis Rudys, Justin Singer, Dan S. Wallach:
Hack-a-Vote: Security Issues with Electronic Voting Systems. IEEE Secur. Priv. 2(1): 32-37 (2004) - [j5]Andrew M. Ladd, Kostas E. Bekris, Algis Rudys, Dan S. Wallach, Lydia E. Kavraki:
On the feasibility of using wireless ethernet for indoor localization. IEEE Trans. Robotics 20(3): 555-559 (2004) - [c28]Andreas Haeberlen, Eliot Flannery, Andrew M. Ladd, Algis Rudys, Dan S. Wallach, Lydia E. Kavraki:
Practical robust localization over large-scale 802.11 wireless networks. MobiCom 2004: 70-84 - [c27]Alan Mislove, Gaurav Oberoi, Ansley Post, Charles Reis, Peter Druschel, Dan S. Wallach:
AP3: cooperative, decentralized anonymous communication. ACM SIGOPS European Workshop 2004: 30 - [c26]Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach:
Analysis of an Electronic Voting System. S&P 2004: 27- - 2003
- [j4]Y. Charlie Hu, Weimin Yu, Alan L. Cox, Dan S. Wallach, Willy Zwaenepoel:
Run-time support for distributed sharing in safe languages. ACM Trans. Comput. Syst. 21(1): 1-35 (2003) - [c25]Alan Mislove, Ansley Post, Charles Reis, Paul Willmann, Peter Druschel, Dan S. Wallach, Xavier Bonnaire, Pierre Sens, Jean-Michel Busca, Luciana Bezerra Arantes:
POST: A Secure, Resilient, Cooperative Messaging System. HotOS 2003: 61-66 - [c24]Tsuen-Wan Ngan, Dan S. Wallach, Peter Druschel:
Enforcing Fair Sharing of Peer-to-Peer Resources. IPTPS 2003: 149-159 - [c23]Eyal de Lara, Rajnish Kumar, Dan S. Wallach, Willy Zwaenepoel:
Collaboration and Multimedia Authoring on Mobile Devices. MobiSys 2003: 287-301 - [c22]David W. Price, Algis Rudys, Dan S. Wallach:
Garbage Collector Memory Accounting in Language-Based Systems. S&P 2003: 263-274 - [c21]Scott A. Crosby, Dan S. Wallach:
Denial of Service via Algorithmic Complexity Attacks. USENIX Security Symposium 2003 - [c20]Ping Tao, Algis Rudys, Andrew M. Ladd, Dan S. Wallach:
Wireless LAN location-sensing for security applications. Workshop on Wireless Security 2003: 11-20 - 2002
- [j3]Algis Rudys, Dan S. Wallach:
Termination in language-based systems. ACM Trans. Inf. Syst. Secur. 5(2): 138-168 (2002) - [c19]Algis Rudys, Dan S. Wallach:
Transactional Rollback for Language-Based Systems. DSN 2002: 439-448 - [c18]Andrew M. Ladd, Kostas E. Bekris, Guillaume Marceau, Algis Rudys, Dan S. Wallach, Lydia E. Kavraki:
Using wireless Ethernet for localization. IROS 2002: 402-408 - [c17]Dan S. Wallach:
A Survey of Peer-to-Peer Security Issues. ISSS 2002: 42-57 - [c16]Algis Rudys, Dan S. Wallach:
Enforcing Java Run-Time Properties Using Bytecode Rewriting. ISSS 2002: 185-200 - [c15]Andrew M. Ladd, Kostas E. Bekris, Algis Rudys, Lydia E. Kavraki, Dan S. Wallach, Guillaume Marceau:
Robotics-based location sensing using wireless ethernet. MobiCom 2002: 227-238 - [c14]Cristian Coarfa, Peter Druschel, Dan S. Wallach:
Performance Analysis of TLS Web Servers. NDSS 2002 - [c13]Miguel Castro, Peter Druschel, Ayalvadi J. Ganesh, Antony I. T. Rowstron, Dan S. Wallach:
Secure Routing for Structured Peer-to-Peer Overlay Networks. OSDI 2002 - [c12]Yuri Dotsenko, Eyal de Lara, Dan S. Wallach, Willy Zwaenepoel:
Extensible Adaptation via Constraint Solving. WMCSA 2002: 117-127 - 2001
- [j2]Dan S. Wallach:
Copy Protection Technology is Doomed. Computer 34(10): 48-49 (2001) - [c11]Eyal de Lara, Dan S. Wallach, Willy Zwaenepoel:
Architectures for Adaption Systems. HotOS 2001: 167 - [c10]Jason Flinn, Eyal de Lara, Mahadev Satyanarayanan, Dan S. Wallach, Willy Zwaenepoel:
Reducing the Energy Usage of Office Applications. Middleware 2001: 252-272 - [c9]Algis Rudys, John Clements, Dan S. Wallach:
Termination in Language-based Systems. NDSS 2001 - [c8]Eyal de Lara, Dan S. Wallach, Willy Zwaenepoel:
Puppeteer: Component-based Adaptation for Mobile Computing. USITS 2001: 159-170 - [c7]Scott Craver, Min Wu, Bede Liu, Adam Stubblefield, Ben Swartzlander, Dan S. Wallach, Drew Dean, Edward W. Felten:
Reading Between the Lines: Lessons from the SDMI Challenge. USENIX Security Symposium 2001 - [e1]Dan S. Wallach:
10th USENIX Security Symposium, August 13-17, 2001, Washington, D.C., USA. USENIX 2001 [contents] - 2000
- [j1]Dan S. Wallach, Andrew W. Appel, Edward W. Felten:
SAFKASI: a security mechanism for language-based systems. ACM Trans. Softw. Eng. Methodol. 9(4): 341-378 (2000) - [c6]Y. Charlie Hu, Weimin Yu, Alan L. Cox, Dan S. Wallach, Willy Zwaenepoel:
Run-Time Support for Distributed Sharing in Typed Languages. LCR 2000: 192-206
1990 – 1999
- 1998
- [c5]Dan S. Wallach, Edward W. Felten:
Understanding Java Stack Inspection. S&P 1998: 52-63 - 1997
- [c4]Dan S. Wallach, Dirk Balfanz, Drew Dean, Edward W. Felten:
Extensible Security Architecture for Java. SOSP 1997: 116-128 - 1996
- [c3]Dan S. Wallach, Jim A. Roskind, Edward W. Felten:
Flexible, extensible Java security using digital signatures. Network Threats 1996: 59-74 - [c2]Drew Dean, Edward W. Felten, Dan S. Wallach:
Java Security: From HotJava to Netscape and Beyond. S&P 1996: 190-200 - 1994
- [c1]Dan S. Wallach, Sharma Kunapalli, Michael F. Cohen:
Accelerated MPEG compression of dynamic polygonal scenes. SIGGRAPH 1994: 193-196
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 22:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint