Search

Your search keyword '"Dan S. Wallach"' showing total 71 results

Search Constraints

Start Over You searched for: Author "Dan S. Wallach" Remove constraint Author: "Dan S. Wallach" Language undetermined Remove constraint Language: undetermined
71 results on '"Dan S. Wallach"'

Search Results

2. VAULT-Style Risk-Limiting Audits and the Inyo County Pilot

3. How Human Factors Can Help Preserve Democracy in the Age of Pandemics

4. Summative Usability Assessments of STAR-Vote: A Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use

5. 2FA Might Be Secure, But It’s Not Usable: A Summative Usability Assessment of Google’s Two-factor Authentication (2FA) Methods

6. Picking up the trash: Exploiting generational GC for memory analysis

8. An Historical Analysis of the SEAndroid Policy Evolution

9. Removing Secrets from Android's TLS

10. The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities

11. Accountable wiretapping – or – I know they can hear you now

12. Present but Unreachable: Reducing Persistentlatent Secrets in HotSpot JVM

13. Verification of STAR-Vote and Evaluation of FDR and ProVerif

14. Clash Attacks and the STAR-Vote System

15. Public Evidence from Secret Ballots

16. Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching

17. Rebooting the CS publication process

18. Authenticated Dictionaries

19. Opportunities and Limits of Remote Timing Attacks

20. Known Unknowns

21. Exploiting military OpSec through open-source vulnerabilities

22. Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication

23. Users’ Mental Models for Three End-to-End Voting Systems: Helios, Prêt à Voter, and Scantegrity II

24. Performance analysis of TLS Web servers

25. Iterative adaptation for mobile clients using existing APIs

26. Robotics-Based Location Sensing Using Wireless Ethernet

27. Managing the Performance Impact of Web Security

28. On the feasibility of using wireless ethernet for indoor localization

29. Hack-a-vote: security issues with electronic voting systems

30. Run-time support for distributed sharing in safe languages

31. Secure routing for structured peer-to-peer overlay networks

32. Termination in language-based systems

33. Hardening Persona – Improving Federated Web Login

34. Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph

35. SAFKASI

36. Extensible security architectures for Java

37. A Case of Collusion: A Study of the Interface Between Ad Libraries and their Apps

38. Inferring Atmospheric Particulate Matter Concentrations from Chinese Social Media Data

39. Strengthening user authentication through opportunistic cryptographic identity assertions

40. Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching

41. Using predictable mobility patterns to support scalable and secure MANETs of handheld devices

42. Building Incentives into Tor

43. Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries

44. Finding the Evidence in Tamper-Evident Logs

45. Electronic voting machines versus traditional methods

46. Eclipse Attacks on Overlay Networks: Threats and Defenses

47. Architectures for adaptation systems

48. A Taxonomy of Rational Attacks

49. Scrivener: Providing Incentives in Cooperative Content Distribution Systems

50. Practical robust localization over large-scale 802.11 wireless networks

Catalog

Books, media, physical & digital resources