dblp.uni-trier.dewww.uni-trier.de

Dan S. Wallach

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
42EEScott A. Crosby, Dan S. Wallach, Rudolf H. Riedi: Opportunities and Limits of Remote Timing Attacks. ACM Trans. Inf. Syst. Secur. 12(3): (2009)
41EEDan S. Wallach: Technical perspective - Tools for information to flow securely and Swift-ly. Commun. ACM 52(2): 78 (2009)
2008
40EESarah P. Everett, Kristen K. Greene, Michael D. Byrne, Dan S. Wallach, Kyle Derr, Daniel Sandler, Ted Torous: Electronic voting machines versus traditional methods: improved preference, similar performance. CHI 2008: 883-892
39EEDaniel Sandler, Dan S. Wallach: The Case for Networked Remote Voting Precincts. EVT 2008
38EEDaniel Sandler, Kyle Derr, Dan S. Wallach: VoteBox: A Tamper-evident, Verifiable Electronic Voting System. USENIX Security Symposium 2008: 349-364
2006
37EEAtul Singh, Tsuen-Wan Ngan, Peter Druschel, Dan S. Wallach: Eclipse Attacks on Overlay Networks: Threats and Defenses. INFOCOM 2006
36EECristian Coarfa, Peter Druschel, Dan S. Wallach: Performance analysis of TLS Web servers. ACM Trans. Comput. Syst. 24(1): 39-69 (2006)
2005
35EESeth James Nielson, Scott A. Crosby, Dan S. Wallach: A Taxonomy of Rational Attacks. IPTPS 2005: 36-46
34EEAnimesh Nandi, Tsuen-Wan Ngan, Atul Singh, Peter Druschel, Dan S. Wallach: Scrivener: Providing Incentives in Cooperative Content Distribution Systems. Middleware 2005: 270-291
33EEAdam Stubblefield, Aviel D. Rubin, Dan S. Wallach: Managing the Performance Impact of Web Security. Electronic Commerce Research 5(1): 99-116 (2005)
32EEShiuhpyng W. Shieh, Dan S. Wallach: Guest Editors' Introduction: Ad Hoc and P2P Security. IEEE Internet Computing 9(6): 14-15 (2005)
31EEEyal de Lara, Yogesh Chopra, Rajnish Kumar, Nilesh Vaghela, Dan S. Wallach, Willy Zwaenepoel: Iterative Adaptation for Mobile Clients Using Existing APIs. IEEE Trans. Parallel Distrib. Syst. 16(10): 966-981 (2005)
30EEAndrew M. Ladd, Kostas E. Bekris, Algis Rudys, Lydia E. Kavraki, Dan S. Wallach: Robotics-Based Location Sensing Using Wireless Ethernet. Wireless Networks 11(1-2): 189-204 (2005)
2004
29EEAlan Mislove, Gaurav Oberoi, Ansley Post, Charles Reis, Peter Druschel, Dan S. Wallach: AP3: cooperative, decentralized anonymous communication. ACM SIGOPS European Workshop 2004: 30
28EETadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach: Analysis of an Electronic Voting System. IEEE Symposium on Security and Privacy 2004: 27-
27EEAndreas Haeberlen, Eliot Flannery, Andrew M. Ladd, Algis Rudys, Dan S. Wallach, Lydia E. Kavraki: Practical robust localization over large-scale 802.11 wireless networks. MOBICOM 2004: 70-84
26EEJonathan Bannet, David W. Price, Algis Rudys, Justin Singer, Dan S. Wallach: Hack-a-Vote: Security Issues with Electronic Voting Systems. IEEE Security & Privacy 2(1): 32-37 (2004)
2003
25 Alan Mislove, Ansley Post, Charles Reis, Paul Willmann, Peter Druschel, Dan S. Wallach, Xavier Bonnaire, Pierre Sens, Jean-Michel Busca, Luciana Bezerra Arantes: POST: A Secure, Resilient, Cooperative Messaging System. HotOS 2003: 61-66
24EEDavid W. Price, Algis Rudys, Dan S. Wallach: Garbage Collector Memory Accounting in Language-Based Systems. IEEE Symposium on Security and Privacy 2003: 263-274
23EETsuen-Wan Ngan, Dan S. Wallach, Peter Druschel: Enforcing Fair Sharing of Peer-to-Peer Resources. IPTPS 2003: 149-159
22EEEyal de Lara, Rajnish Kumar, Dan S. Wallach, Willy Zwaenepoel: Collaboration and Multimedia Authoring on Mobile Devices. MobiSys 2003
21EEPing Tao, Algis Rudys, Andrew M. Ladd, Dan S. Wallach: Wireless LAN location-sensing for security applications. Workshop on Wireless Security 2003: 11-20
20EEY. Charlie Hu, Weimin Yu, Alan L. Cox, Dan S. Wallach, Willy Zwaenepoel: Run-time support for distributed sharing in safe languages. ACM Trans. Comput. Syst. 21(1): 1-35 (2003)
2002
19EEAlgis Rudys, Dan S. Wallach: Transactional Rollback for Language-Based Systems. DSN 2002: 439-448
18EEAlgis Rudys, Dan S. Wallach: Enforcing Java Run-Time Properties Using Bytecode Rewriting. ISSS 2002: 185-200
17EEDan S. Wallach: A Survey of Peer-to-Peer Security Issues. ISSS 2002: 42-57
16EEAndrew M. Ladd, Kostas E. Bekris, Algis Rudys, Lydia E. Kavraki, Dan S. Wallach, Guillaume Marceau: Robotics-based location sensing using wireless ethernet. MOBICOM 2002: 227-238
15EECristian Coarfa, Peter Druschel, Dan S. Wallach: Performance Analysis of TLS Web Servers. NDSS 2002
14EEMiguel Castro, Peter Druschel, Ayalvadi J. Ganesh, Antony I. T. Rowstron, Dan S. Wallach: Secure Routing for Structured Peer-to-Peer Overlay Networks. OSDI 2002
13EEYuri Dotsenko, Eyal de Lara, Dan S. Wallach, Willy Zwaenepoel: Extensible Adaptation via Constraint Solving. WMCSA 2002: 117-127
12EEAlgis Rudys, Dan S. Wallach: Termination in language-based systems. ACM Trans. Inf. Syst. Secur. 5(2): 138-168 (2002)
2001
11EEEyal de Lara, Dan S. Wallach, Willy Zwaenepoel: Architectures for Adaption Systems. HotOS 2001: 167
10EEJason Flinn, Eyal de Lara, Mahadev Satyanarayanan, Dan S. Wallach, Willy Zwaenepoel: Reducing the Energy Usage of Office Applications. Middleware 2001: 252-272
9EEAlgis Rudys, John Clements, Dan S. Wallach: Termination in Language-based Systems. NDSS 2001
8EEEyal de Lara, Dan S. Wallach, Willy Zwaenepoel: Puppeteer: Component-based Adaptation for Mobile Computing. USITS 2001: 159-170
7EEDan S. Wallach: Copy Protection Technology is Doomed. IEEE Computer 34(10): 48-49 (2001)
2000
6EEY. Charlie Hu, Weimin Yu, Alan L. Cox, Dan S. Wallach, Willy Zwaenepoel: Run-Time Support for Distributed Sharing in Typed Languages. LCR 2000: 192-206
5EEDan S. Wallach, Andrew W. Appel, Edward W. Felten: SAFKASI: a security mechanism for language-based systems. ACM Trans. Softw. Eng. Methodol. 9(4): 341-378 (2000)
1998
4EEDan S. Wallach, Edward W. Felten: Understanding Java Stack Inspection. IEEE Symposium on Security and Privacy 1998: 52-63
1997
3 Dan S. Wallach, Dirk Balfanz, Drew Dean, Edward W. Felten: Extensible Security Architecture for Java. SOSP 1997: 116-128
1996
2EEDrew Dean, Edward W. Felten, Dan S. Wallach: Java Security: From HotJava to Netscape and Beyond. IEEE Symposium on Security and Privacy 1996: 190-200
1994
1EEDan S. Wallach, Sharma Kunapalli, Michael F. Cohen: Accelerated MPEG compression of dynamic polygonal scenes. SIGGRAPH 1994: 193-196

Coauthor Index

1Andrew W. Appel [5]
2Luciana Arantes (Luciana Bezerra Arantes) [25]
3Dirk Balfanz [3]
4Jonathan Bannet [26]
5Kostas E. Bekris [16] [30]
6Xavier Bonnaire [25]
7Jean-Michel Busca [25]
8Michael D. Byrne [40]
9Miguel Castro [14]
10Yogesh Chopra [31]
11John Clements [9]
12Cristian Coarfa [15] [36]
13Michael F. Cohen [1]
14Alan L. Cox [6] [20]
15Scott A. Crosby [35] [42]
16Drew Dean [2] [3]
17Kyle Derr [38] [40]
18Yuri Dotsenko [13]
19Peter Druschel [14] [15] [23] [25] [29] [34] [36] [37]
20Sarah P. Everett [40]
21Edward W. Felten [2] [3] [4] [5]
22Eliot Flannery [27]
23Jason Flinn [10]
24Ayalvadi J. Ganesh [14]
25Kristen K. Greene [40]
26Andreas Haeberlen [27]
27Y. Charlie Hu [6] [20]
28Lydia E. Kavraki [16] [27] [30]
29Tadayoshi Kohno [28]
30Rajnish Kumar [22] [31]
31Sharma Kunapalli [1]
32Andrew M. Ladd [16] [21] [27] [30]
33Eyal de Lara [8] [10] [11] [13] [22] [31]
34Guillaume Marceau [16]
35Alan Mislove [25] [29]
36Animesh Nandi [34]
37Tsuen-Wan Ngan [23] [34] [37]
38Seth James Nielson [35]
39Gaurav Oberoi [29]
40Ansley Post [25] [29]
41David W. Price [24] [26]
42Charles Reis [25] [29]
43Rudolf H. Riedi [42]
44Antony I. T. Rowstron [14]
45Aviel D. Rubin [28] [33]
46Algis Rudys [9] [12] [16] [18] [19] [21] [24] [26] [27] [30]
47Daniel Sandler [38] [39] [40]
48Mahadev Satyanarayanan (M. Satyanarayanan) [10]
49Pierre Sens [25]
50Shiuhpyng W. Shieh [32]
51Justin Singer [26]
52Atul Singh [34] [37]
53Adam Stubblefield [28] [33]
54Ping Tao [21]
55Ted Torous [40]
56Nilesh Vaghela [31]
57Paul Willmann [25]
58Weimin Yu [6] [20]
59Willy Zwaenepoel [6] [8] [10] [11] [13] [20] [22] [31]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)