200 results on '"Wallach, Dan S."'
Search Results
52. Machine Learning for Measuring and Analyzing Online Social Communications
53. How Human Factors Can Help Preserve Democracy in the Age of Pandemics
54. Scaling Up Anonymous Communication with Efficient Nanopayment Channels
55. A Taxonomy of Rational Attacks
56. Scrivener: Providing Incentives in Cooperative Content Distribution Systems
57. Enforcing Java Run-Time Properties Using Bytecode Rewriting
58. Enforcing Fair Sharing of Peer-to-Peer Resources
59. A Survey of Peer-to-Peer Security Issues
60. Reducing the Energy Usage of Office Applications
61. Run-Time Support for Distributed Sharing in Typed Languages
62. On the Usability of HTTPS Deployment
63. Total Recall: Persistence of Passwords in Android
64. ON THE SECURITY OF BALLOT MARKING DEVICES.
65. Summative Usability Assessments of STAR-Vote: A Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use
66. An Historical Analysis of the SEAndroid Policy Evolution
67. 2FA Might Be Secure, But It’s Not Usable: A Summative Usability Assessment of Google’s Two-factor Authentication (2FA) Methods
68. Removing Secrets from Android's TLS
69. Viewpoint Rebooting the CS Publication Process.
70. STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System
71. The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities
72. Known Unknowns
73. Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication
74. Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph
75. Copy protection technology is doomed
76. Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching
77. POST: A Secure, Resilient, Cooperative Messaging System
78. STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System
79. Hardening Persona – Improving Federated Web Login
80. A case of collusion
81. E-voting systems & software engineering
82. Language without words: A pointillist model for natural language processing
83. Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching
84. Rebooting the CS publication process
85. Authenticated Dictionaries
86. Using predictable mobility patterns to support scalable and secure MANETs of handheld devices
87. Opportunities and Limits of Remote Timing Attacks
88. Finding the Evidence in Tamper-Evident Logs
89. Electronic voting machines versus traditional methods
90. Practical robust localization over large-scale 802.11 wireless networks
91. AP3
92. Wireless LAN location-sensing for security applications
93. Collaboration and multimedia authoring on mobile devices
94. Electronic voting machines versus traditional methods.
95. Secure routing for structured peer-to-peer overlay networks
96. Robotics-based location sensing using wireless ethernet
97. Termination in language-based systems
98. Web Spoofing: An Internet Con Game
99. A Taxonomy of Rational Attacks.
100. Scrivener: Providing Incentives in Cooperative Content Distribution Systems.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.