J. D. Tygar
List of publications from the DBLP Bibliography Server - FAQ
2008 | ||
---|---|---|
51 | EE | Marco Barreno, Peter L. Bartlett, Fuching Jack Chi, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, Udam Saini, J. Doug Tygar: Open problems in the security of learning. AISec 2008: 19-26 |
50 | EE | Yu-Lun Huang, J. Doug Tygar, H. Y. Lin, L. Y. Yeh, H. Y. Tsai, K. Sklower, Shiuh-Pyng Shieh, C. C. Wu, P. H. Lu, S. Y. Chien, Z. S. Lin, L. W. Hsu, C. W. Hsu, C. T. Hsu, Y. C. Wu, M. S. Leong: SWOON: A Testbed for Secure Wireless Overlay Networks. CSET 2008 |
49 | EE | Li Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, J. Doug Tygar: Characterizing Botnets from Email Spam Records. LEET 2008 |
48 | EE | Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I. P. Rubinstein, Udam Saini, Charles Sutton, J. Doug Tygar, Kai Xia: Exploiting Machine Learning to Subvert Your Spam Filter. LEET 2008 |
47 | EE | Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar: Evading Anomaly Detection through Variance Injection Attacks on PCA. RAID 2008: 394-395 |
46 | EE | Chris Karlof, J. Doug Tygar, David Wagner: A User Study Design for Comparing the Security of Registration Protocols. UPSEC 2008 |
2007 | ||
45 | EE | Chris Karlof, Umesh Shankar, J. Doug Tygar, David Wagner: Dynamic pharming attacks and locked same-origin policies for web browsers. ACM Conference on Computer and Communications Security 2007: 58-71 |
44 | EE | Chih-Chung Lin, Yuan-Cheng Lai, J. D. Tygar, Chuan-Kai Yang, Chi-Lung Chiang: Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags. APWeb/WAIM Workshops 2007: 634-643 |
43 | EE | Marco Barreno, Alvaro Cardenas, J. Doug Tygar: Optimal ROC Curve for a Combination of Classifiers. NIPS 2007 |
2006 | ||
42 | EE | Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar: Can machine learning be secure? ASIACCS 2006: 16-25 |
41 | EE | Rachna Dhamija, J. D. Tygar, Marti A. Hearst: Why phishing works. CHI 2006: 581-590 |
2005 | ||
40 | EE | Li Zhuang, Feng Zhou, J. D. Tygar: Keyboard acoustic emanations revisited. ACM Conference on Computer and Communications Security 2005: 373-382 |
39 | EE | Rachna Dhamija, J. D. Tygar: Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks. HIP 2005: 127-141 |
38 | EE | Monica Chew, J. D. Tygar: Collaborative Filtering CAPTCHAs. HIP 2005: 66-81 |
37 | EE | J. D. Tygar: When Computer Security Crashes into Multimedia. ISM 2005: 2 |
36 | EE | Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng: Panel: Authentication in Constrained Environments. MADNES 2005: 186-191 |
35 | EE | Rachna Dhamija, J. Doug Tygar: The battle against phishing: Dynamic Security Skins. SOUPS 2005: 77-88 |
2004 | ||
34 | EE | Monica Chew, J. D. Tygar: Image Recognition CAPTCHAs. ISC 2004: 268-279 |
33 | EE | Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, J. D. Tygar: Distillation Codes and Applications to DoS Resistant Multicast Authentication. NDSS 2004 |
32 | EE | Umesh Shankar, Monica Chew, J. D. Tygar: Side Effects Are Not Sufficient to Authenticate Software. USENIX Security Symposium 2004: 89-102 |
31 | EE | Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu: Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004) |
2002 | ||
30 | EE | Dawn Xiaodong Song, J. D. Tygar, David Zuckerman: Expander Graphs for Digital Stream Authentication and Robust Overlay Networks. IEEE Symposium on Security and Privacy 2002: 258- |
29 | EE | J. D. Tygar: Privacy in Sensor Webs and Distributed Information Systems. ISSS 2002: 84-95 |
28 | Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, David E. Culler: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8(5): 521-534 (2002) | |
2001 | ||
27 | EE | Adrian Perrig, Dawn Xiaodong Song, J. D. Tygar: ELK, A New Protocol for Efficient Large-Group Key Distribution. IEEE Symposium on Security and Privacy 2001: 247- |
26 | Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar: SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. IPDPS 2001: 170 | |
25 | EE | Adrian Perrig, Robert Szewczyk, Victor Wen, David E. Culler, J. D. Tygar: SPINS: security protocols for sensor netowrks. MOBICOM 2001: 189-199 |
24 | EE | Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar: Efficient and Secure Source Authentication for Multicast. NDSS 2001 |
2000 | ||
23 | EE | Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. IEEE Symposium on Security and Privacy 2000: 56-73 |
1999 | ||
22 | EE | J. D. Tygar: Open Problems in Electronic Commerce. PODS 1999: 101 |
1998 | ||
21 | EE | J. D. Tygar: Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce. VLDB 1998: 1-12 |
1997 | ||
20 | J. D. Tygar: Limits of Microtransaction Systems. NGITS 1997: 0- | |
1996 | ||
19 | J. D. Tygar, Bennet S. Yee, Nevin Heintze: Cryptographic Postage Indicia. ASIAN 1996: 378-391 | |
18 | J. D. Tygar: Atomicity in Electronic Commerce. PODC 1996: 8-26 | |
17 | EE | Nevin Heintze, J. D. Tygar: A Model for Secure Protocols and Their Compositions. IEEE Trans. Software Eng. 22(1): 16-30 (1996) |
1995 | ||
16 | Marvin A. Sirbu, J. D. Tygar: NetBill: An Internet Commerce System Optimized for Network Delivered Services. COMPCON 1995: 20-25 | |
15 | Sean W. Smith, David B. Johnson, J. D. Tygar: Completely Asynchronous Optimistic Recovery with Minimal Rollbacks. FTCS 1995: 361-370 | |
14 | Chris Clifton, Peter Gemmel, Ed Means, Matt J. Merges, J. D. Tygar: How are We Going to Pay for This? Fee-for-Service in Distributed Systems: Research and Policy Issues (Panel). ICDCS 1995: 344-348 | |
13 | Catherine C. McGeoch, J. D. Tygar: Optimal Sampling Strategies for Quicksort. Random Struct. Algorithms 7(4): 287-300 (1995) | |
1994 | ||
12 | Allan Heydon, J. D. Tygar: Specifying and Checking UNIX Security Constraints. Computing Systems 7(1): 91-112 (1994) | |
11 | John H. Reif, J. D. Tygar, Akitoshi Yoshida: Computability and Complexity of Ray Tracing. Discrete & Computational Geometry 11: 265-287 (1994) | |
10 | EE | L. Jean Camp, J. D. Tygar: Providing Auditing While Protecting Privacy. Inf. Soc. 10(1): (1994) |
1993 | ||
9 | Randal E. Bryant, J. D. Tygar, Lawrence P. Huang: Geometric characterization of series-parallel variable resistor networks. ISCAS 1993: 2678-2681 | |
1990 | ||
8 | John H. Reif, J. D. Tygar, Akitoshi Yoshida: The Computability and Complexity of Optical Beam Tracing FOCS 1990: 106-114 | |
7 | EE | Allan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski: Miró: Visual Specification of Security. IEEE Trans. Software Eng. 16(10): 1185-1197 (1990) |
1989 | ||
6 | Michael O. Rabin, J. D. Tygar: ITOSS: An Integrated Toolkit For Operating System Security. FODO 1989: 2-15 | |
5 | Allan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski: Constraining Pictures with Pictures. IFIP Congress 1989: 157-162 | |
1988 | ||
4 | John H. Reif, J. D. Tygar: Efficient Parallel Pseudorandom Number Generation. SIAM J. Comput. 17(2): 404-411 (1988) | |
1987 | ||
3 | EE | Maurice Herlihy, J. D. Tygar: How to Make Replicated Data Secure. CRYPTO 1987: 379-391 |
1985 | ||
2 | EE | John H. Reif, J. D. Tygar: Efficient Parallel Pseudo-Random Number Generation. CRYPTO 1985: 433-446 |
1 | EE | J. Doug Tygar, Ron Ellickson: Efficient netlist comparison using hierarchy and randomization. DAC 1985: 702-708 |