2008 |
59 | EE | Edward W. Felten:
Coping with Outside-the-Box Attacks.
CAV 2008: 3-4 |
58 | EE | Joseph A. Calandrino,
J. Alex Halderman,
Edward W. Felten:
In Defense of Pseudorandom Sample Selection.
EVT 2008 |
57 | EE | J. Alex Halderman,
Seth D. Schoen,
Nadia Heninger,
William Clarkson,
William Paul,
Joseph A. Calandrino,
Ariel J. Feldman,
Jacob Appelbaum,
Edward W. Felten:
Lest We Remember: Cold Boot Attacks on Encryption Keys.
USENIX Security Symposium 2008: 45-60 |
2006 |
56 | EE | Shirley Gaw,
Edward W. Felten,
Patricia Fernandez-Kelly:
Secrecy, flagging, and paranoia: adoption criteria in encrypted email.
CHI 2006: 591-600 |
55 | EE | Shirley Gaw,
Edward W. Felten:
Password management strategies for online accounts.
SOUPS 2006: 44-55 |
54 | EE | Edward W. Felten,
J. Alex Halderman:
Digital Rights Management, Spyware, and Security.
IEEE Security & Privacy 4(1): 18-23 (2006) |
2005 |
53 | EE | J. Alex Halderman,
Brent Waters,
Edward W. Felten:
A convenient method for securely managing passwords.
WWW 2005: 471-479 |
52 | EE | Edward W. Felten:
DRM and public policy.
Commun. ACM 48(7): 112 (2005) |
2004 |
51 | EE | Brent Waters,
Ari Juels,
J. Alex Halderman,
Edward W. Felten:
New client puzzle outsourcing techniques for DoS resistance.
ACM Conference on Computer and Communications Security 2004: 246-256 |
50 | EE | J. Alex Halderman,
Brent R. Waters,
Edward W. Felten:
Privacy management for portable recording devices.
WPES 2004: 16-24 |
2003 |
49 | EE | Brent R. Waters,
Edward W. Felten,
Amit Sahai:
Receiver anonymity via incomparable public keys.
ACM Conference on Computer and Communications Security 2003: 112-121 |
48 | EE | Lujo Bauer,
Michael A. Schneider,
Edward W. Felten,
Andrew W. Appel:
Access Control on the Web Using Proof-carrying Authorization.
DISCEX (2) 2003: 117-119 |
47 | EE | Edward W. Felten:
A skeptical view of DRM and fair use.
Commun. ACM 46(4): 56-59 (2003) |
46 | EE | Edward W. Felten:
Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks?
IEEE Security & Privacy 1(3): 60-62 (2003) |
45 | | Lujo Bauer,
Andrew W. Appel,
Edward W. Felten:
Mechanisms for secure modular programming in Java.
Softw., Pract. Exper. 33(5): 461-480 (2003) |
2002 |
44 | EE | Batya Friedman,
W. David Hurley,
Daniel C. Howe,
Helen Nissenbaum,
Edward W. Felten:
Users' conceptions of risks and harms on the web: a comparative study.
CHI Extended Abstracts 2002: 614-615 |
43 | EE | Batya Friedman,
W. David Hurley,
Daniel C. Howe,
Edward W. Felten,
Helen Nissenbaum:
Users' conceptions of web security: a comparative study.
CHI Extended Abstracts 2002: 746-747 |
42 | EE | Matthias Jacob,
Dan Boneh,
Edward W. Felten:
Attacking an Obfuscated Cipher by Injecting Faults.
Digital Rights Management Workshop 2002: 16-31 |
41 | EE | Batya Friedman,
Daniel C. Howe,
Edward W. Felten:
Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design.
HICSS 2002: 247 |
40 | EE | Lujo Bauer,
Michael A. Schneider,
Edward W. Felten:
A General and Flexible Access-Control System for the Web.
USENIX Security Symposium 2002: 93-108 |
2001 |
39 | EE | Lynette I. Millett,
Batya Friedman,
Edward W. Felten:
Cookies and web browser design: toward realizing informed consent online.
CHI 2001: 46-52 |
38 | EE | Helen Nissenbaum,
Batya Friedman,
Edward W. Felten:
Computer Security: Competing Concepts
CoRR cs.CY/0110001: (2001) |
2000 |
37 | EE | Edward W. Felten,
Michael A. Schneider:
Timing attacks on Web privacy.
ACM Conference on Computer and Communications Security 2000: 25-32 |
36 | EE | Michael A. Schneider,
Edward W. Felten:
Efficient Commerce Protocols based on One-Time Pads.
ACSAC 2000: 317- |
35 | | Edward W. Felten:
Dr. Felton Goes to Washington: A Personal View of the Microsoft Antitrust Case.
LISA 2000 |
34 | EE | Dan S. Wallach,
Andrew W. Appel,
Edward W. Felten:
SAFKASI: a security mechanism for language-based systems.
ACM Trans. Softw. Eng. Methodol. 9(4): 341-378 (2000) |
33 | EE | Andrew W. Appel,
Edward W. Felten:
Technological access control interferes with noninfringing scholarship.
Commun. ACM 43(9): 21-23 (2000) |
32 | EE | John Viega,
Tom Mutdosch,
Gary McGraw,
Edward W. Felten:
Statically Scanning Java Code: Finding Security Vulnerabilities.
IEEE Software 17(5): (2000) |
1999 |
31 | EE | Andrew W. Appel,
Edward W. Felten:
Proof-Carrying Authentication.
ACM Conference on Computer and Communications Security 1999: 52-62 |
1998 |
30 | EE | Matthias A. Blumrich,
Kai Li,
Richard Alpert,
Cezary Dubnicki,
Edward W. Felten,
Jonathan Sandberg:
Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer.
25 Years ISCA: Retrospectives and Reprints 1998: 473-484 |
29 | EE | Matthias A. Blumrich,
Kai Li,
Richard Alpert,
Cezary Dubnicki,
Edward W. Felten,
Jonathan Sandberg:
Retrospective: Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer.
25 Years ISCA: Retrospectives and Reprints 1998: 92-94 |
28 | EE | Dan S. Wallach,
Edward W. Felten:
Understanding Java Stack Inspection.
IEEE Symposium on Security and Privacy 1998: 52-63 |
27 | EE | Matthias A. Blumrich,
Richard Alpert,
Yuqun Chen,
Douglas W. Clark,
Stefanos N. Damianakis,
Cezary Dubnicki,
Edward W. Felten,
Liviu Iftode,
Kai Li,
Margaret Martonosi,
Robert A. Shillner:
Design Choices in the SHRIMP System: An Empirical Study.
ISCA 1998: 330-341 |
26 | EE | Minwen Ji,
Edward W. Felten,
Kai Li:
Performance Measurements for Multithreaded Programs.
SIGMETRICS 1998: 161-170 |
25 | | Gary McGraw,
Edward W. Felten:
Mobile Code and Security - Guest Editors' Introduction.
IEEE Internet Computing 2(6): 26-29 (1998) |
1997 |
24 | | Stefanos N. Damianakis,
Cezary Dubnicki,
Edward W. Felten:
Stream Sockets on SHRIMP.
CANPC 1997: 16-30 |
23 | EE | Stefanos N. Damianakis,
Yuqun Chen,
Edward W. Felten:
Reducing Waiting Costs in User-Level Communication.
IPPS 1997: 381-387 |
22 | | Dan S. Wallach,
Dirk Balfanz,
Drew Dean,
Edward W. Felten:
Extensible Security Architecture for Java.
SOSP 1997: 116-128 |
21 | | Edward W. Felten:
Webware Security.
Commun. ACM 40(4): 130 (1997) |
20 | | Angelos Bilas,
Edward W. Felten:
Fast RPC on the SHRIMP Virtual Memory Mapped Network Interface.
J. Parallel Distrib. Comput. 40(1): 138-146 (1997) |
1996 |
19 | EE | Liviu Iftode,
Cezary Dubnicki,
Edward W. Felten,
Kai Li:
Improving Release-Consistent Shared Virtual Memory Using Automatic Update.
HPCA 1996: 14-25 |
18 | EE | Matthias A. Blumrich,
Cezary Dubnicki,
Edward W. Felten,
Kai Li:
Protected, User-Level DMA for the SHRIMP Network Interface.
HPCA 1996: 154-165 |
17 | | Richard Alpert,
Cezary Dubnicki,
Edward W. Felten,
Kai Li:
Design and Implementation of NX Message Passing Using Shrimp Virtual Memory Mapped Communication.
ICPP, Vol. 1 1996: 111-119 |
16 | EE | Drew Dean,
Edward W. Felten,
Dan S. Wallach:
Java Security: From HotJava to Netscape and Beyond.
IEEE Symposium on Security and Privacy 1996: 190-200 |
15 | EE | Cezary Dubnicki,
Liviu Iftode,
Edward W. Felten,
Kai Li:
Software Support for Virtual Memory-Mapped Communication.
IPPS 1996: 372-281 |
14 | EE | Edward W. Felten,
Richard Alpert,
Angelos Bilas,
Matthias A. Blumrich,
Douglas W. Clark,
Stefanos N. Damianakis,
Cezary Dubnicki,
Liviu Iftode,
Kai Li:
Early Experience with Message-Passing on the SHRIMP Multicomputer.
ISCA 1996: 296-307 |
13 | | Tracy Kimbrel,
Andrew Tomkins,
R. Hugo Patterson,
Brian N. Bershad,
Pei Cao,
Edward W. Felten,
Garth A. Gibson,
Anna R. Karlin,
Kai Li:
A Trace-Driven Comparison of Algorithms for Parallel Prefetching and Caching.
OSDI 1996: 19-34 |
12 | | Tracy Kimbrel,
Pei Cao,
Edward W. Felten,
Anna R. Karlin,
Kai Li:
Integrating Parallel Prefetching and Caching.
SIGMETRICS 1996: 262-263 |
11 | EE | Pei Cao,
Edward W. Felten,
Anna R. Karlin,
Kai Li:
Implementation and Performance of Integrated Application-Controlled File Caching, Prefetching, and Disk Scheduling.
ACM Trans. Comput. Syst. 14(4): 311-343 (1996) |
1995 |
10 | EE | Gordon Stoll,
Bin Wei,
Douglas W. Clark,
Edward W. Felten,
Kai Li,
Pat Hanrahan:
Evaluating Multi-Port Frame Buffer Designs for a Mesh-Connected Multicomputer.
ISCA 1995: 96-105 |
9 | | Pei Cao,
Edward W. Felten,
Anna R. Karlin,
Kai Li:
A Study of Integrated Prefetching and Caching Strategies.
SIGMETRICS 1995: 188-197 |
8 | EE | Matthias A. Blumrich,
Cezary Dubnicki,
Edward W. Felten,
Kai Li,
Malena R. Mesarina:
Virtual-Memory-Mapped Network Interfaces.
IEEE Micro 15(1): 21-28 (1995) |
1994 |
7 | | Matthias A. Blumrich,
Kai Li,
Richard Alpert,
Cezary Dubnicki,
Edward W. Felten,
Jonathan Sandberg:
Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer.
ISCA 1994: 142-153 |
6 | | Pei Cao,
Edward W. Felten,
Kai Li:
Implementation and Performance of Application-Controlled File Caching.
OSDI 1994: 165-177 |
5 | | Pei Cao,
Edward W. Felten,
Kai Li:
Application-Controlled File Caching Policies.
USENIX Summer 1994: 171-182 |
1992 |
4 | | Juan Alemany,
Edward W. Felten:
Performance Issues in Non-blocking Synchronization on Shared-memory Multiprocessors.
PODC 1992: 125-134 |
1990 |
3 | | Paul Messina,
Clive F. Baillie,
Edward W. Felten,
Paul Hipes,
Ray Williams,
Arnold Alagar,
Anke Kamrath,
Robert Leary,
Wayne Pfeiffer,
Jack M. Rogers,
David Walker:
Benchmarking Advanced Architecture Computers.
Concurrency - Practice and Experience 2(3): 195-255 (1990) |
1988 |
2 | | Edward W. Felten,
Steve W. Otto:
A Highly Parallel Chess Program.
FGCS 1988: 1001-1009 |
1985 |
1 | | Edward W. Felten,
Steve W. Otto,
Scott Karlin:
The Traveling Salesman Problem on a Hypercubic, MIMD Computer.
ICPP 1985: 6-10 |