2009 | ||
---|---|---|
42 | EE | Scott A. Crosby, Dan S. Wallach, Rudolf H. Riedi: Opportunities and Limits of Remote Timing Attacks. ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
41 | EE | Dan S. Wallach: Technical perspective - Tools for information to flow securely and Swift-ly. Commun. ACM 52(2): 78 (2009) |
2008 | ||
40 | EE | Sarah P. Everett, Kristen K. Greene, Michael D. Byrne, Dan S. Wallach, Kyle Derr, Daniel Sandler, Ted Torous: Electronic voting machines versus traditional methods: improved preference, similar performance. CHI 2008: 883-892 |
39 | EE | Daniel Sandler, Dan S. Wallach: The Case for Networked Remote Voting Precincts. EVT 2008 |
38 | EE | Daniel Sandler, Kyle Derr, Dan S. Wallach: VoteBox: A Tamper-evident, Verifiable Electronic Voting System. USENIX Security Symposium 2008: 349-364 |
2006 | ||
37 | EE | Atul Singh, Tsuen-Wan Ngan, Peter Druschel, Dan S. Wallach: Eclipse Attacks on Overlay Networks: Threats and Defenses. INFOCOM 2006 |
36 | EE | Cristian Coarfa, Peter Druschel, Dan S. Wallach: Performance analysis of TLS Web servers. ACM Trans. Comput. Syst. 24(1): 39-69 (2006) |
2005 | ||
35 | EE | Seth James Nielson, Scott A. Crosby, Dan S. Wallach: A Taxonomy of Rational Attacks. IPTPS 2005: 36-46 |
34 | EE | Animesh Nandi, Tsuen-Wan Ngan, Atul Singh, Peter Druschel, Dan S. Wallach: Scrivener: Providing Incentives in Cooperative Content Distribution Systems. Middleware 2005: 270-291 |
33 | EE | Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach: Managing the Performance Impact of Web Security. Electronic Commerce Research 5(1): 99-116 (2005) |
32 | EE | Shiuhpyng W. Shieh, Dan S. Wallach: Guest Editors' Introduction: Ad Hoc and P2P Security. IEEE Internet Computing 9(6): 14-15 (2005) |
31 | EE | Eyal de Lara, Yogesh Chopra, Rajnish Kumar, Nilesh Vaghela, Dan S. Wallach, Willy Zwaenepoel: Iterative Adaptation for Mobile Clients Using Existing APIs. IEEE Trans. Parallel Distrib. Syst. 16(10): 966-981 (2005) |
30 | EE | Andrew M. Ladd, Kostas E. Bekris, Algis Rudys, Lydia E. Kavraki, Dan S. Wallach: Robotics-Based Location Sensing Using Wireless Ethernet. Wireless Networks 11(1-2): 189-204 (2005) |
2004 | ||
29 | EE | Alan Mislove, Gaurav Oberoi, Ansley Post, Charles Reis, Peter Druschel, Dan S. Wallach: AP3: cooperative, decentralized anonymous communication. ACM SIGOPS European Workshop 2004: 30 |
28 | EE | Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach: Analysis of an Electronic Voting System. IEEE Symposium on Security and Privacy 2004: 27- |
27 | EE | Andreas Haeberlen, Eliot Flannery, Andrew M. Ladd, Algis Rudys, Dan S. Wallach, Lydia E. Kavraki: Practical robust localization over large-scale 802.11 wireless networks. MOBICOM 2004: 70-84 |
26 | EE | Jonathan Bannet, David W. Price, Algis Rudys, Justin Singer, Dan S. Wallach: Hack-a-Vote: Security Issues with Electronic Voting Systems. IEEE Security & Privacy 2(1): 32-37 (2004) |
2003 | ||
25 | Alan Mislove, Ansley Post, Charles Reis, Paul Willmann, Peter Druschel, Dan S. Wallach, Xavier Bonnaire, Pierre Sens, Jean-Michel Busca, Luciana Bezerra Arantes: POST: A Secure, Resilient, Cooperative Messaging System. HotOS 2003: 61-66 | |
24 | EE | David W. Price, Algis Rudys, Dan S. Wallach: Garbage Collector Memory Accounting in Language-Based Systems. IEEE Symposium on Security and Privacy 2003: 263-274 |
23 | EE | Tsuen-Wan Ngan, Dan S. Wallach, Peter Druschel: Enforcing Fair Sharing of Peer-to-Peer Resources. IPTPS 2003: 149-159 |
22 | EE | Eyal de Lara, Rajnish Kumar, Dan S. Wallach, Willy Zwaenepoel: Collaboration and Multimedia Authoring on Mobile Devices. MobiSys 2003 |
21 | EE | Ping Tao, Algis Rudys, Andrew M. Ladd, Dan S. Wallach: Wireless LAN location-sensing for security applications. Workshop on Wireless Security 2003: 11-20 |
20 | EE | Y. Charlie Hu, Weimin Yu, Alan L. Cox, Dan S. Wallach, Willy Zwaenepoel: Run-time support for distributed sharing in safe languages. ACM Trans. Comput. Syst. 21(1): 1-35 (2003) |
2002 | ||
19 | EE | Algis Rudys, Dan S. Wallach: Transactional Rollback for Language-Based Systems. DSN 2002: 439-448 |
18 | EE | Algis Rudys, Dan S. Wallach: Enforcing Java Run-Time Properties Using Bytecode Rewriting. ISSS 2002: 185-200 |
17 | EE | Dan S. Wallach: A Survey of Peer-to-Peer Security Issues. ISSS 2002: 42-57 |
16 | EE | Andrew M. Ladd, Kostas E. Bekris, Algis Rudys, Lydia E. Kavraki, Dan S. Wallach, Guillaume Marceau: Robotics-based location sensing using wireless ethernet. MOBICOM 2002: 227-238 |
15 | EE | Cristian Coarfa, Peter Druschel, Dan S. Wallach: Performance Analysis of TLS Web Servers. NDSS 2002 |
14 | EE | Miguel Castro, Peter Druschel, Ayalvadi J. Ganesh, Antony I. T. Rowstron, Dan S. Wallach: Secure Routing for Structured Peer-to-Peer Overlay Networks. OSDI 2002 |
13 | EE | Yuri Dotsenko, Eyal de Lara, Dan S. Wallach, Willy Zwaenepoel: Extensible Adaptation via Constraint Solving. WMCSA 2002: 117-127 |
12 | EE | Algis Rudys, Dan S. Wallach: Termination in language-based systems. ACM Trans. Inf. Syst. Secur. 5(2): 138-168 (2002) |
2001 | ||
11 | EE | Eyal de Lara, Dan S. Wallach, Willy Zwaenepoel: Architectures for Adaption Systems. HotOS 2001: 167 |
10 | EE | Jason Flinn, Eyal de Lara, Mahadev Satyanarayanan, Dan S. Wallach, Willy Zwaenepoel: Reducing the Energy Usage of Office Applications. Middleware 2001: 252-272 |
9 | EE | Algis Rudys, John Clements, Dan S. Wallach: Termination in Language-based Systems. NDSS 2001 |
8 | EE | Eyal de Lara, Dan S. Wallach, Willy Zwaenepoel: Puppeteer: Component-based Adaptation for Mobile Computing. USITS 2001: 159-170 |
7 | EE | Dan S. Wallach: Copy Protection Technology is Doomed. IEEE Computer 34(10): 48-49 (2001) |
2000 | ||
6 | EE | Y. Charlie Hu, Weimin Yu, Alan L. Cox, Dan S. Wallach, Willy Zwaenepoel: Run-Time Support for Distributed Sharing in Typed Languages. LCR 2000: 192-206 |
5 | EE | Dan S. Wallach, Andrew W. Appel, Edward W. Felten: SAFKASI: a security mechanism for language-based systems. ACM Trans. Softw. Eng. Methodol. 9(4): 341-378 (2000) |
1998 | ||
4 | EE | Dan S. Wallach, Edward W. Felten: Understanding Java Stack Inspection. IEEE Symposium on Security and Privacy 1998: 52-63 |
1997 | ||
3 | Dan S. Wallach, Dirk Balfanz, Drew Dean, Edward W. Felten: Extensible Security Architecture for Java. SOSP 1997: 116-128 | |
1996 | ||
2 | EE | Drew Dean, Edward W. Felten, Dan S. Wallach: Java Security: From HotJava to Netscape and Beyond. IEEE Symposium on Security and Privacy 1996: 190-200 |
1994 | ||
1 | EE | Dan S. Wallach, Sharma Kunapalli, Michael F. Cohen: Accelerated MPEG compression of dynamic polygonal scenes. SIGGRAPH 1994: 193-196 |