Dan S. Wallach

Affiliations: 
Rice University, Houston, TX 
Area:
Computer Science
Google:
"Dan Wallach"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Tanash RS, Chen Z, Thakur T, et al. (2015) Known unknowns: An analysis of twitter censorship in Turkey Wpes 2015 - Proceedings of the 2015 Acm Workshop On Privacy in the Electronic Society, Co-Located With Ccs 2015. 11-20
Bild DR, Liu Y, Dick RP, et al. (2015) Aggregate characterization of user behavior in Twitter and analysis of the retweet graph Acm Transactions On Internet Technology. 15
Liu Y, Bild DR, Dick RP, et al. (2015) The mason test: A defense against sybil attacks in wireless networks without trusted authorities Ieee Transactions On Mobile Computing. 14: 2376-2391
Dressler JC, Bronk C, Wallach DS. (2015) Exploiting military OpSec through open-source vulnerabilities Proceedings - Ieee Military Communications Conference Milcom. 2015: 450-458
Acemyan CZ, Kortum P, Byrne MD, et al. (2015) Users’ mental models for three end-to-end voting systems: Helios, Prêt à Voter, and Scantegrity II Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9190: 463-474
Rostami M, Majzoobi M, Koushanfar F, et al. (2014) Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching Ieee Transactions On Emerging Topics in Computing. 2: 37-49
Book T, Wallach DS. (2013) A case of collusion: A study of the interface between ad libraries and their apps Proceedings of the Acm Conference On Computer and Communications Security. 79-85
Majzoobi M, Rostami M, Koushanfar F, et al. (2012) Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching Proceedings - Ieee Cs Security and Privacy Workshops, Spw 2012. 33-44
Song P, Shu A, Phipps D, et al. (2012) Language without words: A pointillist model for natural language processing 6th International Conference On Soft Computing and Intelligent Systems, and 13th International Symposium On Advanced Intelligence Systems, Scis/Isis 2012. 11-15
Crosby SA, Wallach DS. (2011) Authenticated dictionaries: Real-world costs and trade-offs Acm Transactions On Information and System Security. 14
See more...