2008 |
16 | EE | Gene Tsudik,
Mike Burmester,
Ari Juels,
Alfred Kobsa,
David Molnar,
Roberto Di Pietro,
Melanie R. Rieback:
RFID security and privacy: long-term research or short-term tinkering?
WISEC 2008: 160 |
2007 |
15 | EE | Nicholas Hopper,
David Molnar,
David Wagner:
From Weak to Strong Watermarking.
TCC 2007: 362-382 |
2006 |
14 | EE | David Molnar,
Tadayoshi Kohno,
Naveen Sastry,
David Wagner:
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract).
IEEE Symposium on Security and Privacy 2006: 365-370 |
13 | EE | Chris Crutchfield,
David Molnar,
David Turner,
David Wagner:
Generic On-Line/Off-Line Threshold Signatures.
Public Key Cryptography 2006: 58-74 |
2005 |
12 | EE | Craig Gentry,
David Molnar,
Zulfikar Ramzan:
Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs.
ASIACRYPT 2005: 662-681 |
11 | EE | Ravi Jain,
David Molnar,
Zulfikar Ramzan:
Towards understanding algorithmic factors affecting energy consumption: switching complexity, randomness, and preliminary experiments.
DIALM-POMC 2005: 70-79 |
10 | EE | David Molnar,
Matt Piotrowski,
David Schultz,
David Wagner:
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks.
ICISC 2005: 156-168 |
9 | EE | Stark C. Draper,
Prakash Ishwar,
David Molnar,
Vinod M. Prabhakaran,
Kannan Ramchandran,
Daniel Schonberg,
David Wagner:
An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography.
Information Hiding 2005: 327-341 |
8 | EE | David Molnar,
Andrea Soppera,
David Wagner:
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags.
Selected Areas in Cryptography 2005: 276-290 |
7 | EE | David Molnar,
Andrea Soppera,
David Wagner:
Privacy for RFID through trusted computing.
WPES 2005: 31-34 |
2004 |
6 | EE | David Molnar,
David Wagner:
Privacy and security in library RFID: issues, practices, and architectures.
ACM Conference on Computer and Communications Security 2004: 210-219 |
5 | EE | Nathan Good,
David Molnar,
Jennifer M. Urban,
Deirdre K. Mulligan,
Elizabeth Miles,
Laura Quilter,
David Wagner:
Radio frequency Id and privacy with information goods.
WPES 2004: 41-42 |
2003 |
4 | EE | Tony Vila,
Rachel Greenstadt,
David Molnar:
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market.
ICEC 2003: 403-407 |
2002 |
3 | EE | Robert Johnson,
David Molnar,
Dawn Xiaodong Song,
David Wagner:
Homomorphic Signature Schemes.
CT-RSA 2002: 244-262 |
2001 |
2 | EE | Roger Dingledine,
Michael J. Freedman,
David Hopwood,
David Molnar:
A Reputation System to Increase MIX-Net Reliability.
Information Hiding 2001: 126-141 |
2000 |
1 | EE | Roger Dingledine,
Michael J. Freedman,
David Molnar:
The Free Haven Project: Distributed Anonymous Storage Service.
Workshop on Design Issues in Anonymity and Unobservability 2000: 67-95 |