Dan S. Wallach

Affiliations: 
Rice University, Houston, TX 
Area:
Computer Science
Google:
"Dan Wallach"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Bates A, Butler KRB, Sherr M, et al. (2015) Accountable wiretapping-or-I know they can hear you now Journal of Computer Security. 23: 167-195
Tanash RS, Chen Z, Thakur T, et al. (2015) Known unknowns: An analysis of twitter censorship in Turkey Wpes 2015 - Proceedings of the 2015 Acm Workshop On Privacy in the Electronic Society, Co-Located With Ccs 2015. 11-20
Bild DR, Liu Y, Dick RP, et al. (2015) Aggregate characterization of user behavior in Twitter and analysis of the retweet graph Acm Transactions On Internet Technology. 15
Liu Y, Bild DR, Dick RP, et al. (2015) The mason test: A defense against sybil attacks in wireless networks without trusted authorities Ieee Transactions On Mobile Computing. 14: 2376-2391
Dressler JC, Bronk C, Wallach DS. (2015) Exploiting military OpSec through open-source vulnerabilities Proceedings - Ieee Military Communications Conference Milcom. 2015: 450-458
Acemyan CZ, Kortum P, Byrne MD, et al. (2015) Users’ mental models for three end-to-end voting systems: Helios, Prêt à Voter, and Scantegrity II Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9190: 463-474
Wallach D. (2014) Techn Communications of the Acm. 57: 98
Rostami M, Majzoobi M, Koushanfar F, et al. (2014) Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching Ieee Transactions On Emerging Topics in Computing. 2: 37-49
Book T, Wallach DS. (2013) A case of collusion: A study of the interface between ad libraries and their apps Proceedings of the Acm Conference On Computer and Communications Security. 79-85
Majzoobi M, Rostami M, Koushanfar F, et al. (2012) Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching Proceedings - Ieee Cs Security and Privacy Workshops, Spw 2012. 33-44
See more...