David Molnar

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

16EEGene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback: RFID security and privacy: long-term research or short-term tinkering? WISEC 2008: 160
15EENicholas Hopper, David Molnar, David Wagner: From Weak to Strong Watermarking. TCC 2007: 362-382
14EEDavid Molnar, Tadayoshi Kohno, Naveen Sastry, David Wagner: Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 365-370
13EEChris Crutchfield, David Molnar, David Turner, David Wagner: Generic On-Line/Off-Line Threshold Signatures. Public Key Cryptography 2006: 58-74
12EECraig Gentry, David Molnar, Zulfikar Ramzan: Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs. ASIACRYPT 2005: 662-681
11EERavi Jain, David Molnar, Zulfikar Ramzan: Towards understanding algorithmic factors affecting energy consumption: switching complexity, randomness, and preliminary experiments. DIALM-POMC 2005: 70-79
10EEDavid Molnar, Matt Piotrowski, David Schultz, David Wagner: The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. ICISC 2005: 156-168
9EEStark C. Draper, Prakash Ishwar, David Molnar, Vinod M. Prabhakaran, Kannan Ramchandran, Daniel Schonberg, David Wagner: An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography. Information Hiding 2005: 327-341
8EEDavid Molnar, Andrea Soppera, David Wagner: A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. Selected Areas in Cryptography 2005: 276-290
7EEDavid Molnar, Andrea Soppera, David Wagner: Privacy for RFID through trusted computing. WPES 2005: 31-34
6EEDavid Molnar, David Wagner: Privacy and security in library RFID: issues, practices, and architectures. ACM Conference on Computer and Communications Security 2004: 210-219
5EENathan Good, David Molnar, Jennifer M. Urban, Deirdre K. Mulligan, Elizabeth Miles, Laura Quilter, David Wagner: Radio frequency Id and privacy with information goods. WPES 2004: 41-42
4EETony Vila, Rachel Greenstadt, David Molnar: Why we can't be bothered to read privacy policies models of privacy economics as a lemons market. ICEC 2003: 403-407
3EERobert Johnson, David Molnar, Dawn Xiaodong Song, David Wagner: Homomorphic Signature Schemes. CT-RSA 2002: 244-262
2EERoger Dingledine, Michael J. Freedman, David Hopwood, David Molnar: A Reputation System to Increase MIX-Net Reliability. Information Hiding 2001: 126-141
1EERoger Dingledine, Michael J. Freedman, David Molnar: The Free Haven Project: Distributed Anonymous Storage Service. Workshop on Design Issues in Anonymity and Unobservability 2000: 67-95

Coauthor Index

1Mike Burmester [16]
2Chris Crutchfield [13]
3Roger Dingledine [1] [2]
4Stark C. Draper [9]
5Michael J. Freedman [1] [2]
6Craig Gentry [12]
7Nathaniel Good (Nathan Good) [5]
8Rachel Greenstadt [4]
9Nicholas Hopper [15]
10David Hopwood [2]
11Prakash Ishwar [9]
12Ravi Jain [11]
13Robert Johnson [3]
14Ari Juels [16]
15Alfred Kobsa [16]
16Tadayoshi Kohno [14]
17Elizabeth Miles [5]
18Deirdre K. Mulligan [5]
19Roberto Di Pietro [16]
20Matt Piotrowski [10]
21Vinod M. Prabhakaran [9]
22Laura Quilter [5]
23Kannan Ramchandran [9]
24Zulfikar Ramzan [11] [12]
25Melanie R. Rieback [16]
26Naveen Sastry [14]
27Daniel Schonberg [9]
28David Schultz [10]
29Dawn Xiaodong Song [3]
30Andrea Soppera [7] [8]
31Gene Tsudik [16]
32David Turner [13]
33Jennifer M. Urban [5]
34Tony Vila [4]
35David Wagner [3] [5] [6] [7] [8] [9] [10] [13] [14] [15]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)