dblp.uni-trier.dewww.uni-trier.de

Collin Jackson

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
10EECollin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh: Protecting browsers from DNS rebinding attacks. TWEB 3(1): 2 (2009)
2008
9EEAdam Barth, Collin Jackson, John C. Mitchell: Robust defenses for cross-site request forgery. ACM Conference on Computer and Communications Security 2008: 75-88
8EEAdam Barth, Collin Jackson, John C. Mitchell: Securing Frame Communication in Browsers. USENIX Security Symposium 2008: 17-30
7EECollin Jackson, Adam Barth: Forcehttps: protecting high-security web sites from network attacks. WWW 2008: 525-534
2007
6EECollin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh: Protecting browsers from dns rebinding attacks. ACM Conference on Computer and Communications Security 2007: 421-431
5EECollin Jackson, Daniel R. Simon, Desney S. Tan, Adam Barth: An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. Financial Cryptography 2007: 281-293
4EEHelen J. Wang, Xiaofeng Fan, Jon Howell, Collin Jackson: Protection and communication abstractions for web browsers in MashupOS. SOSP 2007: 1-16
3EECollin Jackson, Helen J. Wang: Subspace: secure cross-domain communication for web mashups. WWW 2007: 611-620
2006
2EECollin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell: Protecting browser state from web privacy attacks. WWW 2006: 737-744
1EECollin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell: Protecting browser state from web privacy attacks. WWW 2006: 737-744

Coauthor Index

1Adam Barth [5] [6] [7] [8] [9] [10]
2Dan Boneh [1] [2] [6] [10]
3Andrew Bortz [1] [2] [6] [10]
4Xiaofeng Fan [4]
5Jon Howell [4]
6John C. Mitchell [1] [2] [8] [9]
7Weidong Shao [6] [10]
8Daniel R. Simon [5]
9Desney S. Tan [5]
10Helen J. Wang [3] [4]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)