dblp.uni-trier.dewww.uni-trier.de

Edward W. Felten

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
59EEEdward W. Felten: Coping with Outside-the-Box Attacks. CAV 2008: 3-4
58EEJoseph A. Calandrino, J. Alex Halderman, Edward W. Felten: In Defense of Pseudorandom Sample Selection. EVT 2008
57EEJ. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten: Lest We Remember: Cold Boot Attacks on Encryption Keys. USENIX Security Symposium 2008: 45-60
2006
56EEShirley Gaw, Edward W. Felten, Patricia Fernandez-Kelly: Secrecy, flagging, and paranoia: adoption criteria in encrypted email. CHI 2006: 591-600
55EEShirley Gaw, Edward W. Felten: Password management strategies for online accounts. SOUPS 2006: 44-55
54EEEdward W. Felten, J. Alex Halderman: Digital Rights Management, Spyware, and Security. IEEE Security & Privacy 4(1): 18-23 (2006)
2005
53EEJ. Alex Halderman, Brent Waters, Edward W. Felten: A convenient method for securely managing passwords. WWW 2005: 471-479
52EEEdward W. Felten: DRM and public policy. Commun. ACM 48(7): 112 (2005)
2004
51EEBrent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten: New client puzzle outsourcing techniques for DoS resistance. ACM Conference on Computer and Communications Security 2004: 246-256
50EEJ. Alex Halderman, Brent R. Waters, Edward W. Felten: Privacy management for portable recording devices. WPES 2004: 16-24
2003
49EEBrent R. Waters, Edward W. Felten, Amit Sahai: Receiver anonymity via incomparable public keys. ACM Conference on Computer and Communications Security 2003: 112-121
48EELujo Bauer, Michael A. Schneider, Edward W. Felten, Andrew W. Appel: Access Control on the Web Using Proof-carrying Authorization. DISCEX (2) 2003: 117-119
47EEEdward W. Felten: A skeptical view of DRM and fair use. Commun. ACM 46(4): 56-59 (2003)
46EEEdward W. Felten: Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks? IEEE Security & Privacy 1(3): 60-62 (2003)
45 Lujo Bauer, Andrew W. Appel, Edward W. Felten: Mechanisms for secure modular programming in Java. Softw., Pract. Exper. 33(5): 461-480 (2003)
2002
44EEBatya Friedman, W. David Hurley, Daniel C. Howe, Helen Nissenbaum, Edward W. Felten: Users' conceptions of risks and harms on the web: a comparative study. CHI Extended Abstracts 2002: 614-615
43EEBatya Friedman, W. David Hurley, Daniel C. Howe, Edward W. Felten, Helen Nissenbaum: Users' conceptions of web security: a comparative study. CHI Extended Abstracts 2002: 746-747
42EEMatthias Jacob, Dan Boneh, Edward W. Felten: Attacking an Obfuscated Cipher by Injecting Faults. Digital Rights Management Workshop 2002: 16-31
41EEBatya Friedman, Daniel C. Howe, Edward W. Felten: Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design. HICSS 2002: 247
40EELujo Bauer, Michael A. Schneider, Edward W. Felten: A General and Flexible Access-Control System for the Web. USENIX Security Symposium 2002: 93-108
2001
39EELynette I. Millett, Batya Friedman, Edward W. Felten: Cookies and web browser design: toward realizing informed consent online. CHI 2001: 46-52
38EEHelen Nissenbaum, Batya Friedman, Edward W. Felten: Computer Security: Competing Concepts CoRR cs.CY/0110001: (2001)
2000
37EEEdward W. Felten, Michael A. Schneider: Timing attacks on Web privacy. ACM Conference on Computer and Communications Security 2000: 25-32
36EEMichael A. Schneider, Edward W. Felten: Efficient Commerce Protocols based on One-Time Pads. ACSAC 2000: 317-
35 Edward W. Felten: Dr. Felton Goes to Washington: A Personal View of the Microsoft Antitrust Case. LISA 2000
34EEDan S. Wallach, Andrew W. Appel, Edward W. Felten: SAFKASI: a security mechanism for language-based systems. ACM Trans. Softw. Eng. Methodol. 9(4): 341-378 (2000)
33EEAndrew W. Appel, Edward W. Felten: Technological access control interferes with noninfringing scholarship. Commun. ACM 43(9): 21-23 (2000)
32EEJohn Viega, Tom Mutdosch, Gary McGraw, Edward W. Felten: Statically Scanning Java Code: Finding Security Vulnerabilities. IEEE Software 17(5): (2000)
1999
31EEAndrew W. Appel, Edward W. Felten: Proof-Carrying Authentication. ACM Conference on Computer and Communications Security 1999: 52-62
1998
30EEMatthias A. Blumrich, Kai Li, Richard Alpert, Cezary Dubnicki, Edward W. Felten, Jonathan Sandberg: Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer. 25 Years ISCA: Retrospectives and Reprints 1998: 473-484
29EEMatthias A. Blumrich, Kai Li, Richard Alpert, Cezary Dubnicki, Edward W. Felten, Jonathan Sandberg: Retrospective: Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer. 25 Years ISCA: Retrospectives and Reprints 1998: 92-94
28EEDan S. Wallach, Edward W. Felten: Understanding Java Stack Inspection. IEEE Symposium on Security and Privacy 1998: 52-63
27EEMatthias A. Blumrich, Richard Alpert, Yuqun Chen, Douglas W. Clark, Stefanos N. Damianakis, Cezary Dubnicki, Edward W. Felten, Liviu Iftode, Kai Li, Margaret Martonosi, Robert A. Shillner: Design Choices in the SHRIMP System: An Empirical Study. ISCA 1998: 330-341
26EEMinwen Ji, Edward W. Felten, Kai Li: Performance Measurements for Multithreaded Programs. SIGMETRICS 1998: 161-170
25 Gary McGraw, Edward W. Felten: Mobile Code and Security - Guest Editors' Introduction. IEEE Internet Computing 2(6): 26-29 (1998)
1997
24 Stefanos N. Damianakis, Cezary Dubnicki, Edward W. Felten: Stream Sockets on SHRIMP. CANPC 1997: 16-30
23EEStefanos N. Damianakis, Yuqun Chen, Edward W. Felten: Reducing Waiting Costs in User-Level Communication. IPPS 1997: 381-387
22 Dan S. Wallach, Dirk Balfanz, Drew Dean, Edward W. Felten: Extensible Security Architecture for Java. SOSP 1997: 116-128
21 Edward W. Felten: Webware Security. Commun. ACM 40(4): 130 (1997)
20 Angelos Bilas, Edward W. Felten: Fast RPC on the SHRIMP Virtual Memory Mapped Network Interface. J. Parallel Distrib. Comput. 40(1): 138-146 (1997)
1996
19EELiviu Iftode, Cezary Dubnicki, Edward W. Felten, Kai Li: Improving Release-Consistent Shared Virtual Memory Using Automatic Update. HPCA 1996: 14-25
18EEMatthias A. Blumrich, Cezary Dubnicki, Edward W. Felten, Kai Li: Protected, User-Level DMA for the SHRIMP Network Interface. HPCA 1996: 154-165
17 Richard Alpert, Cezary Dubnicki, Edward W. Felten, Kai Li: Design and Implementation of NX Message Passing Using Shrimp Virtual Memory Mapped Communication. ICPP, Vol. 1 1996: 111-119
16EEDrew Dean, Edward W. Felten, Dan S. Wallach: Java Security: From HotJava to Netscape and Beyond. IEEE Symposium on Security and Privacy 1996: 190-200
15EECezary Dubnicki, Liviu Iftode, Edward W. Felten, Kai Li: Software Support for Virtual Memory-Mapped Communication. IPPS 1996: 372-281
14EEEdward W. Felten, Richard Alpert, Angelos Bilas, Matthias A. Blumrich, Douglas W. Clark, Stefanos N. Damianakis, Cezary Dubnicki, Liviu Iftode, Kai Li: Early Experience with Message-Passing on the SHRIMP Multicomputer. ISCA 1996: 296-307
13 Tracy Kimbrel, Andrew Tomkins, R. Hugo Patterson, Brian N. Bershad, Pei Cao, Edward W. Felten, Garth A. Gibson, Anna R. Karlin, Kai Li: A Trace-Driven Comparison of Algorithms for Parallel Prefetching and Caching. OSDI 1996: 19-34
12 Tracy Kimbrel, Pei Cao, Edward W. Felten, Anna R. Karlin, Kai Li: Integrating Parallel Prefetching and Caching. SIGMETRICS 1996: 262-263
11EEPei Cao, Edward W. Felten, Anna R. Karlin, Kai Li: Implementation and Performance of Integrated Application-Controlled File Caching, Prefetching, and Disk Scheduling. ACM Trans. Comput. Syst. 14(4): 311-343 (1996)
1995
10EEGordon Stoll, Bin Wei, Douglas W. Clark, Edward W. Felten, Kai Li, Pat Hanrahan: Evaluating Multi-Port Frame Buffer Designs for a Mesh-Connected Multicomputer. ISCA 1995: 96-105
9 Pei Cao, Edward W. Felten, Anna R. Karlin, Kai Li: A Study of Integrated Prefetching and Caching Strategies. SIGMETRICS 1995: 188-197
8EEMatthias A. Blumrich, Cezary Dubnicki, Edward W. Felten, Kai Li, Malena R. Mesarina: Virtual-Memory-Mapped Network Interfaces. IEEE Micro 15(1): 21-28 (1995)
1994
7 Matthias A. Blumrich, Kai Li, Richard Alpert, Cezary Dubnicki, Edward W. Felten, Jonathan Sandberg: Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer. ISCA 1994: 142-153
6 Pei Cao, Edward W. Felten, Kai Li: Implementation and Performance of Application-Controlled File Caching. OSDI 1994: 165-177
5 Pei Cao, Edward W. Felten, Kai Li: Application-Controlled File Caching Policies. USENIX Summer 1994: 171-182
1992
4 Juan Alemany, Edward W. Felten: Performance Issues in Non-blocking Synchronization on Shared-memory Multiprocessors. PODC 1992: 125-134
1990
3 Paul Messina, Clive F. Baillie, Edward W. Felten, Paul Hipes, Ray Williams, Arnold Alagar, Anke Kamrath, Robert Leary, Wayne Pfeiffer, Jack M. Rogers, David Walker: Benchmarking Advanced Architecture Computers. Concurrency - Practice and Experience 2(3): 195-255 (1990)
1988
2 Edward W. Felten, Steve W. Otto: A Highly Parallel Chess Program. FGCS 1988: 1001-1009
1985
1 Edward W. Felten, Steve W. Otto, Scott Karlin: The Traveling Salesman Problem on a Hypercubic, MIMD Computer. ICPP 1985: 6-10

Coauthor Index

1Arnold Alagar [3]
2Juan Alemany [4]
3Richard Alpert [7] [14] [17] [27] [29] [30]
4Andrew W. Appel [31] [33] [34] [45] [48]
5Jacob Appelbaum [57]
6Clive F. Baillie [3]
7Dirk Balfanz [22]
8Lujo Bauer [40] [45] [48]
9Brian N. Bershad [13]
10Angelos Bilas [14] [20]
11Matthias A. Blumrich [7] [8] [14] [18] [27] [29] [30]
12Dan Boneh [42]
13Joseph A. Calandrino [57] [58]
14Pei Cao [5] [6] [9] [11] [12] [13]
15Yuqun Chen [23] [27]
16Douglas W. Clark [10] [14] [27]
17William Clarkson [57]
18Stefanos N. Damianakis [14] [23] [24] [27]
19Drew Dean [16] [22]
20Cezary Dubnicki [7] [8] [14] [15] [17] [18] [19] [24] [27] [29] [30]
21Ariel J. Feldman [57]
22Patricia Fernandez-Kelly [56]
23Batya Friedman [38] [39] [41] [43] [44]
24Shirley Gaw [55] [56]
25Garth A. Gibson [13]
26J. Alex Halderman (John A. Halderman) [50] [51] [53] [54] [57] [58]
27Pat Hanrahan [10]
28Nadia Heninger [57]
29Paul Hipes [3]
30Daniel C. Howe [41] [43] [44]
31W. David Hurley [43] [44]
32Liviu Iftode [14] [15] [19] [27]
33Matthias Jacob [42]
34Minwen Ji [26]
35Ari Juels [51]
36Anke Kamrath [3]
37Anna R. Karlin [9] [11] [12] [13]
38Scott Karlin [1]
39Tracy Kimbrel [12] [13]
40Robert Leary [3]
41Kai Li [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [17] [18] [19] [26] [27] [29] [30]
42Margaret Martonosi [27]
43Gary McGraw [25] [32]
44Malena R. Mesarina [8]
45Paul Messina [3]
46Lynette I. Millett [39]
47Tom Mutdosch [32]
48Helen Nissenbaum [38] [43] [44]
49Steve W. Otto [1] [2]
50R. Hugo Patterson [13]
51William Paul [57]
52Wayne Pfeiffer [3]
53Jack M. Rogers [3]
54Amit Sahai [49]
55Jonathan Sandberg [7] [29] [30]
56Michael A. Schneider [36] [37] [40] [48]
57Seth D. Schoen [57]
58Robert A. Shillner [27]
59Gordon Stoll [10]
60Andrew Tomkins [13]
61John Viega [32]
62David Walker [3]
63Dan S. Wallach [16] [22] [28] [34]
64Brent Waters (Brent R. Waters) [49] [50] [51] [53]
65Bin Wei [10]
66Ray Williams [3]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)