2009 |
42 | EE | Scott A. Crosby,
Dan S. Wallach,
Rudolf H. Riedi:
Opportunities and Limits of Remote Timing Attacks.
ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
41 | EE | Dan S. Wallach:
Technical perspective - Tools for information to flow securely and Swift-ly.
Commun. ACM 52(2): 78 (2009) |
2008 |
40 | EE | Sarah P. Everett,
Kristen K. Greene,
Michael D. Byrne,
Dan S. Wallach,
Kyle Derr,
Daniel Sandler,
Ted Torous:
Electronic voting machines versus traditional methods: improved preference, similar performance.
CHI 2008: 883-892 |
39 | EE | Daniel Sandler,
Dan S. Wallach:
The Case for Networked Remote Voting Precincts.
EVT 2008 |
38 | EE | Daniel Sandler,
Kyle Derr,
Dan S. Wallach:
VoteBox: A Tamper-evident, Verifiable Electronic Voting System.
USENIX Security Symposium 2008: 349-364 |
2006 |
37 | EE | Atul Singh,
Tsuen-Wan Ngan,
Peter Druschel,
Dan S. Wallach:
Eclipse Attacks on Overlay Networks: Threats and Defenses.
INFOCOM 2006 |
36 | EE | Cristian Coarfa,
Peter Druschel,
Dan S. Wallach:
Performance analysis of TLS Web servers.
ACM Trans. Comput. Syst. 24(1): 39-69 (2006) |
2005 |
35 | EE | Seth James Nielson,
Scott A. Crosby,
Dan S. Wallach:
A Taxonomy of Rational Attacks.
IPTPS 2005: 36-46 |
34 | EE | Animesh Nandi,
Tsuen-Wan Ngan,
Atul Singh,
Peter Druschel,
Dan S. Wallach:
Scrivener: Providing Incentives in Cooperative Content Distribution Systems.
Middleware 2005: 270-291 |
33 | EE | Adam Stubblefield,
Aviel D. Rubin,
Dan S. Wallach:
Managing the Performance Impact of Web Security.
Electronic Commerce Research 5(1): 99-116 (2005) |
32 | EE | Shiuhpyng W. Shieh,
Dan S. Wallach:
Guest Editors' Introduction: Ad Hoc and P2P Security.
IEEE Internet Computing 9(6): 14-15 (2005) |
31 | EE | Eyal de Lara,
Yogesh Chopra,
Rajnish Kumar,
Nilesh Vaghela,
Dan S. Wallach,
Willy Zwaenepoel:
Iterative Adaptation for Mobile Clients Using Existing APIs.
IEEE Trans. Parallel Distrib. Syst. 16(10): 966-981 (2005) |
30 | EE | Andrew M. Ladd,
Kostas E. Bekris,
Algis Rudys,
Lydia E. Kavraki,
Dan S. Wallach:
Robotics-Based Location Sensing Using Wireless Ethernet.
Wireless Networks 11(1-2): 189-204 (2005) |
2004 |
29 | EE | Alan Mislove,
Gaurav Oberoi,
Ansley Post,
Charles Reis,
Peter Druschel,
Dan S. Wallach:
AP3: cooperative, decentralized anonymous communication.
ACM SIGOPS European Workshop 2004: 30 |
28 | EE | Tadayoshi Kohno,
Adam Stubblefield,
Aviel D. Rubin,
Dan S. Wallach:
Analysis of an Electronic Voting System.
IEEE Symposium on Security and Privacy 2004: 27- |
27 | EE | Andreas Haeberlen,
Eliot Flannery,
Andrew M. Ladd,
Algis Rudys,
Dan S. Wallach,
Lydia E. Kavraki:
Practical robust localization over large-scale 802.11 wireless networks.
MOBICOM 2004: 70-84 |
26 | EE | Jonathan Bannet,
David W. Price,
Algis Rudys,
Justin Singer,
Dan S. Wallach:
Hack-a-Vote: Security Issues with Electronic Voting Systems.
IEEE Security & Privacy 2(1): 32-37 (2004) |
2003 |
25 | | Alan Mislove,
Ansley Post,
Charles Reis,
Paul Willmann,
Peter Druschel,
Dan S. Wallach,
Xavier Bonnaire,
Pierre Sens,
Jean-Michel Busca,
Luciana Bezerra Arantes:
POST: A Secure, Resilient, Cooperative Messaging System.
HotOS 2003: 61-66 |
24 | EE | David W. Price,
Algis Rudys,
Dan S. Wallach:
Garbage Collector Memory Accounting in Language-Based Systems.
IEEE Symposium on Security and Privacy 2003: 263-274 |
23 | EE | Tsuen-Wan Ngan,
Dan S. Wallach,
Peter Druschel:
Enforcing Fair Sharing of Peer-to-Peer Resources.
IPTPS 2003: 149-159 |
22 | EE | Eyal de Lara,
Rajnish Kumar,
Dan S. Wallach,
Willy Zwaenepoel:
Collaboration and Multimedia Authoring on Mobile Devices.
MobiSys 2003 |
21 | EE | Ping Tao,
Algis Rudys,
Andrew M. Ladd,
Dan S. Wallach:
Wireless LAN location-sensing for security applications.
Workshop on Wireless Security 2003: 11-20 |
20 | EE | Y. Charlie Hu,
Weimin Yu,
Alan L. Cox,
Dan S. Wallach,
Willy Zwaenepoel:
Run-time support for distributed sharing in safe languages.
ACM Trans. Comput. Syst. 21(1): 1-35 (2003) |
2002 |
19 | EE | Algis Rudys,
Dan S. Wallach:
Transactional Rollback for Language-Based Systems.
DSN 2002: 439-448 |
18 | EE | Algis Rudys,
Dan S. Wallach:
Enforcing Java Run-Time Properties Using Bytecode Rewriting.
ISSS 2002: 185-200 |
17 | EE | Dan S. Wallach:
A Survey of Peer-to-Peer Security Issues.
ISSS 2002: 42-57 |
16 | EE | Andrew M. Ladd,
Kostas E. Bekris,
Algis Rudys,
Lydia E. Kavraki,
Dan S. Wallach,
Guillaume Marceau:
Robotics-based location sensing using wireless ethernet.
MOBICOM 2002: 227-238 |
15 | EE | Cristian Coarfa,
Peter Druschel,
Dan S. Wallach:
Performance Analysis of TLS Web Servers.
NDSS 2002 |
14 | EE | Miguel Castro,
Peter Druschel,
Ayalvadi J. Ganesh,
Antony I. T. Rowstron,
Dan S. Wallach:
Secure Routing for Structured Peer-to-Peer Overlay Networks.
OSDI 2002 |
13 | EE | Yuri Dotsenko,
Eyal de Lara,
Dan S. Wallach,
Willy Zwaenepoel:
Extensible Adaptation via Constraint Solving.
WMCSA 2002: 117-127 |
12 | EE | Algis Rudys,
Dan S. Wallach:
Termination in language-based systems.
ACM Trans. Inf. Syst. Secur. 5(2): 138-168 (2002) |
2001 |
11 | EE | Eyal de Lara,
Dan S. Wallach,
Willy Zwaenepoel:
Architectures for Adaption Systems.
HotOS 2001: 167 |
10 | EE | Jason Flinn,
Eyal de Lara,
Mahadev Satyanarayanan,
Dan S. Wallach,
Willy Zwaenepoel:
Reducing the Energy Usage of Office Applications.
Middleware 2001: 252-272 |
9 | EE | Algis Rudys,
John Clements,
Dan S. Wallach:
Termination in Language-based Systems.
NDSS 2001 |
8 | EE | Eyal de Lara,
Dan S. Wallach,
Willy Zwaenepoel:
Puppeteer: Component-based Adaptation for Mobile Computing.
USITS 2001: 159-170 |
7 | EE | Dan S. Wallach:
Copy Protection Technology is Doomed.
IEEE Computer 34(10): 48-49 (2001) |
2000 |
6 | EE | Y. Charlie Hu,
Weimin Yu,
Alan L. Cox,
Dan S. Wallach,
Willy Zwaenepoel:
Run-Time Support for Distributed Sharing in Typed Languages.
LCR 2000: 192-206 |
5 | EE | Dan S. Wallach,
Andrew W. Appel,
Edward W. Felten:
SAFKASI: a security mechanism for language-based systems.
ACM Trans. Softw. Eng. Methodol. 9(4): 341-378 (2000) |
1998 |
4 | EE | Dan S. Wallach,
Edward W. Felten:
Understanding Java Stack Inspection.
IEEE Symposium on Security and Privacy 1998: 52-63 |
1997 |
3 | | Dan S. Wallach,
Dirk Balfanz,
Drew Dean,
Edward W. Felten:
Extensible Security Architecture for Java.
SOSP 1997: 116-128 |
1996 |
2 | EE | Drew Dean,
Edward W. Felten,
Dan S. Wallach:
Java Security: From HotJava to Netscape and Beyond.
IEEE Symposium on Security and Privacy 1996: 190-200 |
1994 |
1 | EE | Dan S. Wallach,
Sharma Kunapalli,
Michael F. Cohen:
Accelerated MPEG compression of dynamic polygonal scenes.
SIGGRAPH 1994: 193-196 |