Search

Your search keyword '"Wallach, Dan S."' showing total 200 results

Search Constraints

Start Over You searched for: Author "Wallach, Dan S." Remove constraint Author: "Wallach, Dan S."
200 results on '"Wallach, Dan S."'

Search Results

2. The Design and Implementation of a Verified File System with End-to-End Data Integrity

3. Investigating the effectiveness of web adblockers

4. On the security of ballot marking devices

6. Public Evidence from Secret Ballots

7. Verification of STAR-Vote and Evaluation of FDR and ProVerif

8. An Empirical Study of Mobile Ad Targeting

9. Glider: A GPU Library Driver for Improved System Security

10. The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities

11. Performance Analysis of Location Profile Routing

12. Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph

13. A Case of Collusion: A Study of the Interface Between Ad Libraries and their Apps

14. Automated generation of web server fingerprints

15. Longitudinal Analysis of Android Ad Library Permissions

16. The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions

17. Tracking and Quantifying Censorship on a Chinese Microblogging Site

18. STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System

19. AdSplit: Separating smartphone advertising from applications

20. #h00t: Censorship Resistant Microblogging

21. Attacks on Local Searching Tools

22. Building Better Incentives for Robustness in BitTorrent

23. The BitTorrent Anonymity Marketplace

24. An Analysis of Chinese Search Engine Filtering

25. Quire: Lightweight Provenance for Smart Phone Operating Systems

26. Clash Attacks and the STAR-Vote System

28. Users’ Mental Models for Three End-to-End Voting Systems: Helios, Prêt à Voter, and Scantegrity II

29. Building Incentives into Tor

30. Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries

31. A Viewpoint: A Memory Safety Manifesto

32. Scrivener: Providing Incentives in Cooperative Content Distribution Systems

33. A Taxonomy of Rational Attacks

35. A Survey of Peer-to-Peer Security Issues

39. Public Evidence from Secret Ballots

43. Summative Usability Assessments of STAR-Vote: A Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use.

47. Performance analysis of TLS Web servers

48. Iterative Adaptation for mobile clients using existing APIs

49. On the feasibility of using wireless ethernet for indoor localization

Catalog

Books, media, physical & digital resources