dblp.uni-trier.dewww.uni-trier.de

J. Doug Tygar

J. D. Tygar

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
51EEMarco Barreno, Peter L. Bartlett, Fuching Jack Chi, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, Udam Saini, J. Doug Tygar: Open problems in the security of learning. AISec 2008: 19-26
50EEYu-Lun Huang, J. Doug Tygar, H. Y. Lin, L. Y. Yeh, H. Y. Tsai, K. Sklower, Shiuh-Pyng Shieh, C. C. Wu, P. H. Lu, S. Y. Chien, Z. S. Lin, L. W. Hsu, C. W. Hsu, C. T. Hsu, Y. C. Wu, M. S. Leong: SWOON: A Testbed for Secure Wireless Overlay Networks. CSET 2008
49EELi Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, J. Doug Tygar: Characterizing Botnets from Email Spam Records. LEET 2008
48EEBlaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I. P. Rubinstein, Udam Saini, Charles Sutton, J. Doug Tygar, Kai Xia: Exploiting Machine Learning to Subvert Your Spam Filter. LEET 2008
47EEBenjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar: Evading Anomaly Detection through Variance Injection Attacks on PCA. RAID 2008: 394-395
46EEChris Karlof, J. Doug Tygar, David Wagner: A User Study Design for Comparing the Security of Registration Protocols. UPSEC 2008
2007
45EEChris Karlof, Umesh Shankar, J. Doug Tygar, David Wagner: Dynamic pharming attacks and locked same-origin policies for web browsers. ACM Conference on Computer and Communications Security 2007: 58-71
44EEChih-Chung Lin, Yuan-Cheng Lai, J. D. Tygar, Chuan-Kai Yang, Chi-Lung Chiang: Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags. APWeb/WAIM Workshops 2007: 634-643
43EEMarco Barreno, Alvaro Cardenas, J. Doug Tygar: Optimal ROC Curve for a Combination of Classifiers. NIPS 2007
2006
42EEMarco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar: Can machine learning be secure? ASIACCS 2006: 16-25
41EERachna Dhamija, J. D. Tygar, Marti A. Hearst: Why phishing works. CHI 2006: 581-590
2005
40EELi Zhuang, Feng Zhou, J. D. Tygar: Keyboard acoustic emanations revisited. ACM Conference on Computer and Communications Security 2005: 373-382
39EERachna Dhamija, J. D. Tygar: Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks. HIP 2005: 127-141
38EEMonica Chew, J. D. Tygar: Collaborative Filtering CAPTCHAs. HIP 2005: 66-81
37EEJ. D. Tygar: When Computer Security Crashes into Multimedia. ISM 2005: 2
36EEMike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng: Panel: Authentication in Constrained Environments. MADNES 2005: 186-191
35EERachna Dhamija, J. Doug Tygar: The battle against phishing: Dynamic Security Skins. SOUPS 2005: 77-88
2004
34EEMonica Chew, J. D. Tygar: Image Recognition CAPTCHAs. ISC 2004: 268-279
33EEChris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, J. D. Tygar: Distillation Codes and Applications to DoS Resistant Multicast Authentication. NDSS 2004
32EEUmesh Shankar, Monica Chew, J. D. Tygar: Side Effects Are Not Sufficient to Authenticate Software. USENIX Security Symposium 2004: 89-102
31EERuzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu: Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004)
2002
30EEDawn Xiaodong Song, J. D. Tygar, David Zuckerman: Expander Graphs for Digital Stream Authentication and Robust Overlay Networks. IEEE Symposium on Security and Privacy 2002: 258-
29EEJ. D. Tygar: Privacy in Sensor Webs and Distributed Information Systems. ISSS 2002: 84-95
28 Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, David E. Culler: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8(5): 521-534 (2002)
2001
27EEAdrian Perrig, Dawn Xiaodong Song, J. D. Tygar: ELK, A New Protocol for Efficient Large-Group Key Distribution. IEEE Symposium on Security and Privacy 2001: 247-
26 Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar: SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. IPDPS 2001: 170
25EEAdrian Perrig, Robert Szewczyk, Victor Wen, David E. Culler, J. D. Tygar: SPINS: security protocols for sensor netowrks. MOBICOM 2001: 189-199
24EEAdrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar: Efficient and Secure Source Authentication for Multicast. NDSS 2001
2000
23EEAdrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. IEEE Symposium on Security and Privacy 2000: 56-73
1999
22EEJ. D. Tygar: Open Problems in Electronic Commerce. PODS 1999: 101
1998
21EEJ. D. Tygar: Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce. VLDB 1998: 1-12
1997
20 J. D. Tygar: Limits of Microtransaction Systems. NGITS 1997: 0-
1996
19 J. D. Tygar, Bennet S. Yee, Nevin Heintze: Cryptographic Postage Indicia. ASIAN 1996: 378-391
18 J. D. Tygar: Atomicity in Electronic Commerce. PODC 1996: 8-26
17EENevin Heintze, J. D. Tygar: A Model for Secure Protocols and Their Compositions. IEEE Trans. Software Eng. 22(1): 16-30 (1996)
1995
16 Marvin A. Sirbu, J. D. Tygar: NetBill: An Internet Commerce System Optimized for Network Delivered Services. COMPCON 1995: 20-25
15 Sean W. Smith, David B. Johnson, J. D. Tygar: Completely Asynchronous Optimistic Recovery with Minimal Rollbacks. FTCS 1995: 361-370
14 Chris Clifton, Peter Gemmel, Ed Means, Matt J. Merges, J. D. Tygar: How are We Going to Pay for This? Fee-for-Service in Distributed Systems: Research and Policy Issues (Panel). ICDCS 1995: 344-348
13 Catherine C. McGeoch, J. D. Tygar: Optimal Sampling Strategies for Quicksort. Random Struct. Algorithms 7(4): 287-300 (1995)
1994
12 Allan Heydon, J. D. Tygar: Specifying and Checking UNIX Security Constraints. Computing Systems 7(1): 91-112 (1994)
11 John H. Reif, J. D. Tygar, Akitoshi Yoshida: Computability and Complexity of Ray Tracing. Discrete & Computational Geometry 11: 265-287 (1994)
10EEL. Jean Camp, J. D. Tygar: Providing Auditing While Protecting Privacy. Inf. Soc. 10(1): (1994)
1993
9 Randal E. Bryant, J. D. Tygar, Lawrence P. Huang: Geometric characterization of series-parallel variable resistor networks. ISCAS 1993: 2678-2681
1990
8 John H. Reif, J. D. Tygar, Akitoshi Yoshida: The Computability and Complexity of Optical Beam Tracing FOCS 1990: 106-114
7EEAllan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski: Miró: Visual Specification of Security. IEEE Trans. Software Eng. 16(10): 1185-1197 (1990)
1989
6 Michael O. Rabin, J. D. Tygar: ITOSS: An Integrated Toolkit For Operating System Security. FODO 1989: 2-15
5 Allan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski: Constraining Pictures with Pictures. IFIP Congress 1989: 157-162
1988
4 John H. Reif, J. D. Tygar: Efficient Parallel Pseudorandom Number Generation. SIAM J. Comput. 17(2): 404-411 (1988)
1987
3EEMaurice Herlihy, J. D. Tygar: How to Make Replicated Data Secure. CRYPTO 1987: 379-391
1985
2EEJohn H. Reif, J. D. Tygar: Efficient Parallel Pseudo-Random Number Generation. CRYPTO 1985: 433-446
1EEJ. Doug Tygar, Ron Ellickson: Efficient netlist comparison using hierarchy and randomization. DAC 1985: 702-708

Coauthor Index

1Ruzena Bajcsy [31]
2Marco Barreno [42] [43] [48] [51]
3Peter L. Bartlett [51]
4Terry Benzel [31]
5Matt Bishop [31]
6Robert Braden [31]
7Carla E. Brodley [31]
8Randal E. Bryant [9]
9Mike Burmester [36]
10L. Jean Camp [10]
11Ran Canetti [23] [24]
12Alvaro Cardenas [43]
13Monica Chew [32] [34] [38]
14Fuching Jack Chi [48] [51]
15Chi-Lung Chiang [44]
16S. Y. Chien [50]
17Chris Clifton (Christopher W. Clifton) [14]
18David E. Culler [25] [28]
19Rachna Dhamija [35] [39] [41]
20John Dunagan [49]
21Ron Ellickson [1]
22Sonia Fahmy [31]
23Sally Floyd [31]
24Peter Gemmel [14]
25Virgil D. Gligor [36]
26W. Hardaker [31]
27Marti A. Hearst [41]
28Nevin Heintze [17] [19]
29Maurice Herlihy [3]
30Allan Heydon [5] [7] [12]
31C. T. Hsu [50]
32C. W. Hsu [50]
33L. W. Hsu [50]
34Lawrence P. Huang [9]
35Ling Huang [47]
36Yu-Lun Huang [50]
37David B. Johnson [15]
38Anthony D. Joseph [31] [42] [47] [48] [51]
39Chris Karlof [33] [45] [46]
40George Kesidis [31]
41Evangelos Kranakis [36]
42Yuan-Cheng Lai [44]
43Shing-hon Lau [47]
44M. S. Leong [50]
45Karl N. Levitt [31]
46Yaping Li [33]
47Chih-Chung Lin [44]
48H. Y. Lin [50]
49Z. S. Lin [50]
50Robert Lindell [31]
51Peng Liu [31]
52P. H. Lu [50]
53Mark W. Maimone [5] [7]
54Catherine C. McGeoch [13]
55Ed Means [14]
56Matt J. Merges [14]
57David Miller [31]
58Russ Mundy [31]
59Blaine Nelson [42] [47] [48] [51]
60Cliford Neuman [31]
61Ivan Osipkov [49]
62Ron Ostrenga [31]
63Vern Paxson [31]
64Adrian Perrig [23] [24] [25] [26] [27] [28] [33]
65Phillip A. Porras [31]
66Michael O. Rabin [6]
67John H. Reif [2] [4] [8] [11]
68Catherine Rosenberg [31]
69Benjamin I. P. Rubinstein [47] [48] [51]
70Udam Saini [48] [51]
71Naveen Sastry [33]
72Shankar Sastry (Shankar S. Sastry) [31]
73Russell Sears [42]
74Umesh Shankar [32] [45]
75Shiuh-Pyng Shieh (Shiuh-Pyng Winston Shieh) [50]
76Daniel R. Simon [49]
77Marvin A. Sirbu [16]
78K. Sklower [50]
79Sean W. Smith [15] [26]
80Dawn Xiaodong Song [23] [24] [26] [27] [30]
81Daniel F. Sterne [31]
82Charles Sutton [48]
83Robert Szewczyk [25] [28]
84Nina Taft (Nina Taft Plotkin) [47]
85H. Y. Tsai [50]
86David Wagner [45] [46]
87Helen J. Wang [49]
88Victor Wen [25] [28]
89Jeannette M. Wing [5] [7]
90C. C. Wu [50]
91Shyhtsun Felix Wu [31]
92Y. C. Wu [50]
93Kai Xia [48]
94Chuan-Kai Yang [44]
95Bennet S. Yee [19]
96L. Y. Yeh [50]
97Akitoshi Yoshida [8] [11]
98Amy Moormann Zaremski [5] [7]
99Yuliang Zheng [36]
100Feng Zhou [40]
101Li Zhuang [40] [49]
102David Zuckerman [30]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)