2008 | ||
---|---|---|
59 | EE | Edward W. Felten: Coping with Outside-the-Box Attacks. CAV 2008: 3-4 |
58 | EE | Joseph A. Calandrino, J. Alex Halderman, Edward W. Felten: In Defense of Pseudorandom Sample Selection. EVT 2008 |
57 | EE | J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten: Lest We Remember: Cold Boot Attacks on Encryption Keys. USENIX Security Symposium 2008: 45-60 |
2006 | ||
56 | EE | Shirley Gaw, Edward W. Felten, Patricia Fernandez-Kelly: Secrecy, flagging, and paranoia: adoption criteria in encrypted email. CHI 2006: 591-600 |
55 | EE | Shirley Gaw, Edward W. Felten: Password management strategies for online accounts. SOUPS 2006: 44-55 |
54 | EE | Edward W. Felten, J. Alex Halderman: Digital Rights Management, Spyware, and Security. IEEE Security & Privacy 4(1): 18-23 (2006) |
2005 | ||
53 | EE | J. Alex Halderman, Brent Waters, Edward W. Felten: A convenient method for securely managing passwords. WWW 2005: 471-479 |
52 | EE | Edward W. Felten: DRM and public policy. Commun. ACM 48(7): 112 (2005) |
2004 | ||
51 | EE | Brent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten: New client puzzle outsourcing techniques for DoS resistance. ACM Conference on Computer and Communications Security 2004: 246-256 |
50 | EE | J. Alex Halderman, Brent R. Waters, Edward W. Felten: Privacy management for portable recording devices. WPES 2004: 16-24 |
2003 | ||
49 | EE | Brent R. Waters, Edward W. Felten, Amit Sahai: Receiver anonymity via incomparable public keys. ACM Conference on Computer and Communications Security 2003: 112-121 |
48 | EE | Lujo Bauer, Michael A. Schneider, Edward W. Felten, Andrew W. Appel: Access Control on the Web Using Proof-carrying Authorization. DISCEX (2) 2003: 117-119 |
47 | EE | Edward W. Felten: A skeptical view of DRM and fair use. Commun. ACM 46(4): 56-59 (2003) |
46 | EE | Edward W. Felten: Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks? IEEE Security & Privacy 1(3): 60-62 (2003) |
45 | Lujo Bauer, Andrew W. Appel, Edward W. Felten: Mechanisms for secure modular programming in Java. Softw., Pract. Exper. 33(5): 461-480 (2003) | |
2002 | ||
44 | EE | Batya Friedman, W. David Hurley, Daniel C. Howe, Helen Nissenbaum, Edward W. Felten: Users' conceptions of risks and harms on the web: a comparative study. CHI Extended Abstracts 2002: 614-615 |
43 | EE | Batya Friedman, W. David Hurley, Daniel C. Howe, Edward W. Felten, Helen Nissenbaum: Users' conceptions of web security: a comparative study. CHI Extended Abstracts 2002: 746-747 |
42 | EE | Matthias Jacob, Dan Boneh, Edward W. Felten: Attacking an Obfuscated Cipher by Injecting Faults. Digital Rights Management Workshop 2002: 16-31 |
41 | EE | Batya Friedman, Daniel C. Howe, Edward W. Felten: Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design. HICSS 2002: 247 |
40 | EE | Lujo Bauer, Michael A. Schneider, Edward W. Felten: A General and Flexible Access-Control System for the Web. USENIX Security Symposium 2002: 93-108 |
2001 | ||
39 | EE | Lynette I. Millett, Batya Friedman, Edward W. Felten: Cookies and web browser design: toward realizing informed consent online. CHI 2001: 46-52 |
38 | EE | Helen Nissenbaum, Batya Friedman, Edward W. Felten: Computer Security: Competing Concepts CoRR cs.CY/0110001: (2001) |
2000 | ||
37 | EE | Edward W. Felten, Michael A. Schneider: Timing attacks on Web privacy. ACM Conference on Computer and Communications Security 2000: 25-32 |
36 | EE | Michael A. Schneider, Edward W. Felten: Efficient Commerce Protocols based on One-Time Pads. ACSAC 2000: 317- |
35 | Edward W. Felten: Dr. Felton Goes to Washington: A Personal View of the Microsoft Antitrust Case. LISA 2000 | |
34 | EE | Dan S. Wallach, Andrew W. Appel, Edward W. Felten: SAFKASI: a security mechanism for language-based systems. ACM Trans. Softw. Eng. Methodol. 9(4): 341-378 (2000) |
33 | EE | Andrew W. Appel, Edward W. Felten: Technological access control interferes with noninfringing scholarship. Commun. ACM 43(9): 21-23 (2000) |
32 | EE | John Viega, Tom Mutdosch, Gary McGraw, Edward W. Felten: Statically Scanning Java Code: Finding Security Vulnerabilities. IEEE Software 17(5): (2000) |
1999 | ||
31 | EE | Andrew W. Appel, Edward W. Felten: Proof-Carrying Authentication. ACM Conference on Computer and Communications Security 1999: 52-62 |
1998 | ||
30 | EE | Matthias A. Blumrich, Kai Li, Richard Alpert, Cezary Dubnicki, Edward W. Felten, Jonathan Sandberg: Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer. 25 Years ISCA: Retrospectives and Reprints 1998: 473-484 |
29 | EE | Matthias A. Blumrich, Kai Li, Richard Alpert, Cezary Dubnicki, Edward W. Felten, Jonathan Sandberg: Retrospective: Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer. 25 Years ISCA: Retrospectives and Reprints 1998: 92-94 |
28 | EE | Dan S. Wallach, Edward W. Felten: Understanding Java Stack Inspection. IEEE Symposium on Security and Privacy 1998: 52-63 |
27 | EE | Matthias A. Blumrich, Richard Alpert, Yuqun Chen, Douglas W. Clark, Stefanos N. Damianakis, Cezary Dubnicki, Edward W. Felten, Liviu Iftode, Kai Li, Margaret Martonosi, Robert A. Shillner: Design Choices in the SHRIMP System: An Empirical Study. ISCA 1998: 330-341 |
26 | EE | Minwen Ji, Edward W. Felten, Kai Li: Performance Measurements for Multithreaded Programs. SIGMETRICS 1998: 161-170 |
25 | Gary McGraw, Edward W. Felten: Mobile Code and Security - Guest Editors' Introduction. IEEE Internet Computing 2(6): 26-29 (1998) | |
1997 | ||
24 | Stefanos N. Damianakis, Cezary Dubnicki, Edward W. Felten: Stream Sockets on SHRIMP. CANPC 1997: 16-30 | |
23 | EE | Stefanos N. Damianakis, Yuqun Chen, Edward W. Felten: Reducing Waiting Costs in User-Level Communication. IPPS 1997: 381-387 |
22 | Dan S. Wallach, Dirk Balfanz, Drew Dean, Edward W. Felten: Extensible Security Architecture for Java. SOSP 1997: 116-128 | |
21 | Edward W. Felten: Webware Security. Commun. ACM 40(4): 130 (1997) | |
20 | Angelos Bilas, Edward W. Felten: Fast RPC on the SHRIMP Virtual Memory Mapped Network Interface. J. Parallel Distrib. Comput. 40(1): 138-146 (1997) | |
1996 | ||
19 | EE | Liviu Iftode, Cezary Dubnicki, Edward W. Felten, Kai Li: Improving Release-Consistent Shared Virtual Memory Using Automatic Update. HPCA 1996: 14-25 |
18 | EE | Matthias A. Blumrich, Cezary Dubnicki, Edward W. Felten, Kai Li: Protected, User-Level DMA for the SHRIMP Network Interface. HPCA 1996: 154-165 |
17 | Richard Alpert, Cezary Dubnicki, Edward W. Felten, Kai Li: Design and Implementation of NX Message Passing Using Shrimp Virtual Memory Mapped Communication. ICPP, Vol. 1 1996: 111-119 | |
16 | EE | Drew Dean, Edward W. Felten, Dan S. Wallach: Java Security: From HotJava to Netscape and Beyond. IEEE Symposium on Security and Privacy 1996: 190-200 |
15 | EE | Cezary Dubnicki, Liviu Iftode, Edward W. Felten, Kai Li: Software Support for Virtual Memory-Mapped Communication. IPPS 1996: 372-281 |
14 | EE | Edward W. Felten, Richard Alpert, Angelos Bilas, Matthias A. Blumrich, Douglas W. Clark, Stefanos N. Damianakis, Cezary Dubnicki, Liviu Iftode, Kai Li: Early Experience with Message-Passing on the SHRIMP Multicomputer. ISCA 1996: 296-307 |
13 | Tracy Kimbrel, Andrew Tomkins, R. Hugo Patterson, Brian N. Bershad, Pei Cao, Edward W. Felten, Garth A. Gibson, Anna R. Karlin, Kai Li: A Trace-Driven Comparison of Algorithms for Parallel Prefetching and Caching. OSDI 1996: 19-34 | |
12 | Tracy Kimbrel, Pei Cao, Edward W. Felten, Anna R. Karlin, Kai Li: Integrating Parallel Prefetching and Caching. SIGMETRICS 1996: 262-263 | |
11 | EE | Pei Cao, Edward W. Felten, Anna R. Karlin, Kai Li: Implementation and Performance of Integrated Application-Controlled File Caching, Prefetching, and Disk Scheduling. ACM Trans. Comput. Syst. 14(4): 311-343 (1996) |
1995 | ||
10 | EE | Gordon Stoll, Bin Wei, Douglas W. Clark, Edward W. Felten, Kai Li, Pat Hanrahan: Evaluating Multi-Port Frame Buffer Designs for a Mesh-Connected Multicomputer. ISCA 1995: 96-105 |
9 | Pei Cao, Edward W. Felten, Anna R. Karlin, Kai Li: A Study of Integrated Prefetching and Caching Strategies. SIGMETRICS 1995: 188-197 | |
8 | EE | Matthias A. Blumrich, Cezary Dubnicki, Edward W. Felten, Kai Li, Malena R. Mesarina: Virtual-Memory-Mapped Network Interfaces. IEEE Micro 15(1): 21-28 (1995) |
1994 | ||
7 | Matthias A. Blumrich, Kai Li, Richard Alpert, Cezary Dubnicki, Edward W. Felten, Jonathan Sandberg: Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer. ISCA 1994: 142-153 | |
6 | Pei Cao, Edward W. Felten, Kai Li: Implementation and Performance of Application-Controlled File Caching. OSDI 1994: 165-177 | |
5 | Pei Cao, Edward W. Felten, Kai Li: Application-Controlled File Caching Policies. USENIX Summer 1994: 171-182 | |
1992 | ||
4 | Juan Alemany, Edward W. Felten: Performance Issues in Non-blocking Synchronization on Shared-memory Multiprocessors. PODC 1992: 125-134 | |
1990 | ||
3 | Paul Messina, Clive F. Baillie, Edward W. Felten, Paul Hipes, Ray Williams, Arnold Alagar, Anke Kamrath, Robert Leary, Wayne Pfeiffer, Jack M. Rogers, David Walker: Benchmarking Advanced Architecture Computers. Concurrency - Practice and Experience 2(3): 195-255 (1990) | |
1988 | ||
2 | Edward W. Felten, Steve W. Otto: A Highly Parallel Chess Program. FGCS 1988: 1001-1009 | |
1985 | ||
1 | Edward W. Felten, Steve W. Otto, Scott Karlin: The Traveling Salesman Problem on a Hypercubic, MIMD Computer. ICPP 1985: 6-10 |