J Doug Tygar - Publications

Affiliations: 
Carnegie Mellon University, Pittsburgh, PA 
Area:
Computer Science

22 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2015 Connolly L, Lang M, Tygar JD. Investigation of employee security behaviour: A grounded theory approach Ifip Advances in Information and Communication Technology. 455: 283-296. DOI: 10.1007/978-3-319-18467-8_19  0.357
2010 Huang SI, Shieh S, Tygar JD. Secure encrypted-data aggregation for wireless sensor networks Wireless Networks. 16: 915-927. DOI: 10.1007/s11276-009-0177-y  0.515
2009 Ni CC, Hsiang TR, Tygar JD. A power-preserving broadcast protocol for wireless sensor networks International Journal of Sensor Networks. 6: 191-198. DOI: 10.1504/IJSNET.2009.029395  0.442
2009 Rubinstein BIP, Nelson B, Huang L, Joseph AD, Lau SH, Rao S, Taft N, Tygar JD. Stealthy poisoning attacks on PCA-based anomaly detectors Performance Evaluation Review. 37: 73-74. DOI: 10.1145/1639562.1639592  0.318
2009 Huang YL, Lu PH, Tygar JD, Joseph AD. OSNP: Secure wireless authentication protocol using one-time key Computers and Security. 28: 803-815. DOI: 10.1016/J.Cose.2009.05.009  0.572
2008 Chen P, Ahammad P, Boyer C, Huang SI, Lin L, Lobaton E, Meingast M, Oh S, Wang S, Yan P, Yang AY, Yeo C, Chang LC, Tygar JD, Sastry SS. Citric: A low-bandwidth wireless camera network platform 2008 2nd Acm/Ieee International Conference On Distributed Smart Cameras, Icdsc 2008. DOI: 10.1109/ICDSC.2008.4635675  0.364
2008 Ni CC, Hsiang TR, Tygar JD. A power-preserving broadcast protocol for WSNs with DoS resistance Proceedings - International Conference On Computer Communications and Networks, Icccn. 777-782. DOI: 10.1109/ICCCN.2008.ECP.146  0.428
2008 Rubinstein BIP, Nelson B, Huang L, Joseph AD, Lau SH, Taft N, Tygar JD. Evading anomaly detection through variance injection attacks on PCA Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 394-395. DOI: 10.1007/978-3-540-87403-4_23  0.384
2005 Tygar JD. When computer security crashes into multimedia Proceedings - Seventh Ieee International Symposium On Multimedia, Ism 2005. 2005: 2. DOI: 10.1109/ISM.2005.124  0.332
2005 Lee DT, Shieh SP, Tygar JD. Computer security in the 21st century Computer Security in the 21st Century. 1-268. DOI: 10.1007/b104203  0.528
2005 Li Y, Tygar JD, Hellerstein JM. Private Matching Computer Security in the 21st Century. 25-50. DOI: 10.1007/0-387-24006-3_3  0.306
2003 Tygar JD. The problem with privacy Proceedings - 3rd Ieee Workshop On Internet Applications, Wiapp 2003. 2-8. DOI: 10.1109/WIAPP.2003.1210280  0.415
2002 Song D, Zuckerman D, Tygar JD. Expander graphs for digital stream authentication and robust overlay networks Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 258-270. DOI: 10.1109/SECPRI.2002.1004376  0.339
2002 Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE. SPINS: Security protocols for sensor networks Wireless Networks. 8: 521-534. DOI: 10.1023/A:1016598314198  0.549
2001 Perrig A, Smith S, Song D, Tygar JD. SAM: A flexible and secure auction architecture using trusted hardware Proceedings - 15th International Parallel and Distributed Processing Symposium, Ipdps 2001. 1764-1773. DOI: 10.1109/IPDPS.2001.925165  0.482
2001 Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: Security protocols for sensor networks Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 189-199.  0.566
2001 Perrig A, Song D, Tygar JD. ELK, a new protocol for efficient large-group key distribution Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 247-262.  0.483
2000 Perrig A, Canetti R, Tygar JD, Song D. Efficient authentication and signing of multicast streams over lossy channels Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 56-73.  0.402
1996 Heintze N, Tygar JD. A model for secure protocols and their compositions Ieee Transactions On Software Engineering. 22: 16-30. DOI: 10.1109/32.481514  0.492
1995 Sirbu M, Tygar JD. A business model, a set of protocols, and software implementation NetBill: An Internet Commerce System Optimized for Network-Delivered Services Ieee Personal Communications. 2: 34-39. DOI: 10.1109/98.403456  0.382
1994 Heydon A, Tygar JD. Specifying and checking UNIX security constraints Computing Systems. 7: 91-112.  0.352
1994 Heintze N, Tygar JD. Model for secure protocols and their compositions Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 2-13.  0.468
Show low-probability matches.