Volgen
Dan S. Wallach
Dan S. Wallach
Professor, Rice University, Department of Computer Science
Geverifieerd e-mailadres voor cs.rice.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Secure routing for structured peer-to-peer overlay networks
M Castro, P Druschel, A Ganesh, A Rowstron, DS Wallach
ACM SIGOPS Operating Systems Review 36 (SI), 299-314, 2002
12892002
Practical robust localization over large-scale 802.11 wireless networks
A Haeberlen, E Flannery, AM Ladd, A Rudys, DS Wallach, LE Kavraki
Proceedings of the 10th annual international conference on Mobile computing …, 2004
10102004
Robotics-based location sensing using wireless ethernet
AM Ladd, KE Bekris, A Rudys, G Marceau, LE Kavraki, DS Wallach
Proceedings of the 8th annual international conference on Mobile computing …, 2002
9092002
Analysis of an electronic voting system
T Kohno, A Stubblefield, AD Rubin, DS Wallach
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 27-40, 2004
8342004
Denial of service via algorithmic complexity attacks
SA Crosby, DS Wallach
12th USENIX Security Symposium (USENIX Security 03), 2003
5712003
Quire: Lightweight provenance for smart phone operating systems
M Dietz, S Shekhar, Y Pisetsky, A Shu, DS Wallach
USENIX security symposium 31, 3, 2011
5222011
Eclipse attacks on overlay networks: Threats and defenses
A Singh, TW Ngan, P Druschel, DS Wallach
IEEE, 2006
4652006
Java security: From HotJava to Netscape and beyond
D Dean, EW Felten, DS Wallach
Proceedings 1996 IEEE Symposium on Security and Privacy, 190-200, 1996
4591996
Extensible security architectures for Java
DS Wallach, D Balfanz, D Dean, EW Felten
Proceedings of the sixteenth ACM symposium on Operating systems principles …, 1997
4101997
A survey of peer-to-peer security issues
DS Wallach
International symposium on software security, 42-57, 2002
4092002
{AdSplit}: Separating smartphone advertising from applications
S Shekhar, M Dietz, DS Wallach
21st USENIX Security Symposium (USENIX Security 12), 553-567, 2012
3672012
On the feasibility of using wireless ethernet for indoor localization
AM Ladd, KE Bekris, AP Rudys, DS Wallach, LE Kavraki
IEEE Transactions on Robotics and Automation 20 (3), 555-559, 2004
3572004
Web spoofing: An internet con game
EW Felten, D Balfanz, D Dean, DS Wallach
Software World 28 (2), 6-8, 1997
3231997
Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching
M Majzoobi, M Rostami, F Koushanfar, DS Wallach, S Devadas
2012 IEEE Symposium on Security and Privacy Workshops, 33-44, 2012
2652012
Efficient data structures for tamper-evident logging.
SA Crosby, DS Wallach
USENIX security symposium, 317-334, 2009
2632009
Understanding Java stack inspection
DS Wallach, EW Felten
Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998
2401998
Longitudinal analysis of android ad library permissions
T Book, A Pridgen, DS Wallach
arXiv preprint arXiv:1303.0857, 2013
2252013
Performance analysis of TLS Web servers
C Coarfa, P Druschel, DS Wallach
ACM Transactions on Computer Systems (TOCS) 24 (1), 39-69, 2006
2252006
Enforcing fair sharing of peer-to-peer resources
TWJ Ngan, DS Wallach, P Druschel
Peer-to-Peer Systems II: Second International Workshop, IPTPS 2003, Berkeley …, 2003
2242003
Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching
M Rostami, M Majzoobi, F Koushanfar, DS Wallach, S Devadas
IEEE Transactions on Emerging Topics in Computing 2 (1), 37-49, 2014
1922014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20