| 2009 |
| 42 | EE | Scott A. Crosby,
Dan S. Wallach,
Rudolf H. Riedi:
Opportunities and Limits of Remote Timing Attacks.
ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
| 41 | EE | Dan S. Wallach:
Technical perspective - Tools for information to flow securely and Swift-ly.
Commun. ACM 52(2): 78 (2009) |
| 2008 |
| 40 | EE | Sarah P. Everett,
Kristen K. Greene,
Michael D. Byrne,
Dan S. Wallach,
Kyle Derr,
Daniel Sandler,
Ted Torous:
Electronic voting machines versus traditional methods: improved preference, similar performance.
CHI 2008: 883-892 |
| 39 | EE | Daniel Sandler,
Dan S. Wallach:
The Case for Networked Remote Voting Precincts.
EVT 2008 |
| 38 | EE | Daniel Sandler,
Kyle Derr,
Dan S. Wallach:
VoteBox: A Tamper-evident, Verifiable Electronic Voting System.
USENIX Security Symposium 2008: 349-364 |
| 2006 |
| 37 | EE | Atul Singh,
Tsuen-Wan Ngan,
Peter Druschel,
Dan S. Wallach:
Eclipse Attacks on Overlay Networks: Threats and Defenses.
INFOCOM 2006 |
| 36 | EE | Cristian Coarfa,
Peter Druschel,
Dan S. Wallach:
Performance analysis of TLS Web servers.
ACM Trans. Comput. Syst. 24(1): 39-69 (2006) |
| 2005 |
| 35 | EE | Seth James Nielson,
Scott A. Crosby,
Dan S. Wallach:
A Taxonomy of Rational Attacks.
IPTPS 2005: 36-46 |
| 34 | EE | Animesh Nandi,
Tsuen-Wan Ngan,
Atul Singh,
Peter Druschel,
Dan S. Wallach:
Scrivener: Providing Incentives in Cooperative Content Distribution Systems.
Middleware 2005: 270-291 |
| 33 | EE | Adam Stubblefield,
Aviel D. Rubin,
Dan S. Wallach:
Managing the Performance Impact of Web Security.
Electronic Commerce Research 5(1): 99-116 (2005) |
| 32 | EE | Shiuhpyng W. Shieh,
Dan S. Wallach:
Guest Editors' Introduction: Ad Hoc and P2P Security.
IEEE Internet Computing 9(6): 14-15 (2005) |
| 31 | EE | Eyal de Lara,
Yogesh Chopra,
Rajnish Kumar,
Nilesh Vaghela,
Dan S. Wallach,
Willy Zwaenepoel:
Iterative Adaptation for Mobile Clients Using Existing APIs.
IEEE Trans. Parallel Distrib. Syst. 16(10): 966-981 (2005) |
| 30 | EE | Andrew M. Ladd,
Kostas E. Bekris,
Algis Rudys,
Lydia E. Kavraki,
Dan S. Wallach:
Robotics-Based Location Sensing Using Wireless Ethernet.
Wireless Networks 11(1-2): 189-204 (2005) |
| 2004 |
| 29 | EE | Alan Mislove,
Gaurav Oberoi,
Ansley Post,
Charles Reis,
Peter Druschel,
Dan S. Wallach:
AP3: cooperative, decentralized anonymous communication.
ACM SIGOPS European Workshop 2004: 30 |
| 28 | EE | Tadayoshi Kohno,
Adam Stubblefield,
Aviel D. Rubin,
Dan S. Wallach:
Analysis of an Electronic Voting System.
IEEE Symposium on Security and Privacy 2004: 27- |
| 27 | EE | Andreas Haeberlen,
Eliot Flannery,
Andrew M. Ladd,
Algis Rudys,
Dan S. Wallach,
Lydia E. Kavraki:
Practical robust localization over large-scale 802.11 wireless networks.
MOBICOM 2004: 70-84 |
| 26 | EE | Jonathan Bannet,
David W. Price,
Algis Rudys,
Justin Singer,
Dan S. Wallach:
Hack-a-Vote: Security Issues with Electronic Voting Systems.
IEEE Security & Privacy 2(1): 32-37 (2004) |
| 2003 |
| 25 | | Alan Mislove,
Ansley Post,
Charles Reis,
Paul Willmann,
Peter Druschel,
Dan S. Wallach,
Xavier Bonnaire,
Pierre Sens,
Jean-Michel Busca,
Luciana Bezerra Arantes:
POST: A Secure, Resilient, Cooperative Messaging System.
HotOS 2003: 61-66 |
| 24 | EE | David W. Price,
Algis Rudys,
Dan S. Wallach:
Garbage Collector Memory Accounting in Language-Based Systems.
IEEE Symposium on Security and Privacy 2003: 263-274 |
| 23 | EE | Tsuen-Wan Ngan,
Dan S. Wallach,
Peter Druschel:
Enforcing Fair Sharing of Peer-to-Peer Resources.
IPTPS 2003: 149-159 |
| 22 | EE | Eyal de Lara,
Rajnish Kumar,
Dan S. Wallach,
Willy Zwaenepoel:
Collaboration and Multimedia Authoring on Mobile Devices.
MobiSys 2003 |
| 21 | EE | Ping Tao,
Algis Rudys,
Andrew M. Ladd,
Dan S. Wallach:
Wireless LAN location-sensing for security applications.
Workshop on Wireless Security 2003: 11-20 |
| 20 | EE | Y. Charlie Hu,
Weimin Yu,
Alan L. Cox,
Dan S. Wallach,
Willy Zwaenepoel:
Run-time support for distributed sharing in safe languages.
ACM Trans. Comput. Syst. 21(1): 1-35 (2003) |
| 2002 |
| 19 | EE | Algis Rudys,
Dan S. Wallach:
Transactional Rollback for Language-Based Systems.
DSN 2002: 439-448 |
| 18 | EE | Algis Rudys,
Dan S. Wallach:
Enforcing Java Run-Time Properties Using Bytecode Rewriting.
ISSS 2002: 185-200 |
| 17 | EE | Dan S. Wallach:
A Survey of Peer-to-Peer Security Issues.
ISSS 2002: 42-57 |
| 16 | EE | Andrew M. Ladd,
Kostas E. Bekris,
Algis Rudys,
Lydia E. Kavraki,
Dan S. Wallach,
Guillaume Marceau:
Robotics-based location sensing using wireless ethernet.
MOBICOM 2002: 227-238 |
| 15 | EE | Cristian Coarfa,
Peter Druschel,
Dan S. Wallach:
Performance Analysis of TLS Web Servers.
NDSS 2002 |
| 14 | EE | Miguel Castro,
Peter Druschel,
Ayalvadi J. Ganesh,
Antony I. T. Rowstron,
Dan S. Wallach:
Secure Routing for Structured Peer-to-Peer Overlay Networks.
OSDI 2002 |
| 13 | EE | Yuri Dotsenko,
Eyal de Lara,
Dan S. Wallach,
Willy Zwaenepoel:
Extensible Adaptation via Constraint Solving.
WMCSA 2002: 117-127 |
| 12 | EE | Algis Rudys,
Dan S. Wallach:
Termination in language-based systems.
ACM Trans. Inf. Syst. Secur. 5(2): 138-168 (2002) |
| 2001 |
| 11 | EE | Eyal de Lara,
Dan S. Wallach,
Willy Zwaenepoel:
Architectures for Adaption Systems.
HotOS 2001: 167 |
| 10 | EE | Jason Flinn,
Eyal de Lara,
Mahadev Satyanarayanan,
Dan S. Wallach,
Willy Zwaenepoel:
Reducing the Energy Usage of Office Applications.
Middleware 2001: 252-272 |
| 9 | EE | Algis Rudys,
John Clements,
Dan S. Wallach:
Termination in Language-based Systems.
NDSS 2001 |
| 8 | EE | Eyal de Lara,
Dan S. Wallach,
Willy Zwaenepoel:
Puppeteer: Component-based Adaptation for Mobile Computing.
USITS 2001: 159-170 |
| 7 | EE | Dan S. Wallach:
Copy Protection Technology is Doomed.
IEEE Computer 34(10): 48-49 (2001) |
| 2000 |
| 6 | EE | Y. Charlie Hu,
Weimin Yu,
Alan L. Cox,
Dan S. Wallach,
Willy Zwaenepoel:
Run-Time Support for Distributed Sharing in Typed Languages.
LCR 2000: 192-206 |
| 5 | EE | Dan S. Wallach,
Andrew W. Appel,
Edward W. Felten:
SAFKASI: a security mechanism for language-based systems.
ACM Trans. Softw. Eng. Methodol. 9(4): 341-378 (2000) |
| 1998 |
| 4 | EE | Dan S. Wallach,
Edward W. Felten:
Understanding Java Stack Inspection.
IEEE Symposium on Security and Privacy 1998: 52-63 |
| 1997 |
| 3 | | Dan S. Wallach,
Dirk Balfanz,
Drew Dean,
Edward W. Felten:
Extensible Security Architecture for Java.
SOSP 1997: 116-128 |
| 1996 |
| 2 | EE | Drew Dean,
Edward W. Felten,
Dan S. Wallach:
Java Security: From HotJava to Netscape and Beyond.
IEEE Symposium on Security and Privacy 1996: 190-200 |
| 1994 |
| 1 | EE | Dan S. Wallach,
Sharma Kunapalli,
Michael F. Cohen:
Accelerated MPEG compression of dynamic polygonal scenes.
SIGGRAPH 1994: 193-196 |