Year |
Citation |
Score |
2015 |
Connolly L, Lang M, Tygar JD. Investigation of employee security behaviour: A grounded theory approach Ifip Advances in Information and Communication Technology. 455: 283-296. DOI: 10.1007/978-3-319-18467-8_19 |
0.357 |
|
2010 |
Huang SI, Shieh S, Tygar JD. Secure encrypted-data aggregation for wireless sensor networks Wireless Networks. 16: 915-927. DOI: 10.1007/s11276-009-0177-y |
0.515 |
|
2009 |
Ni CC, Hsiang TR, Tygar JD. A power-preserving broadcast protocol for wireless sensor networks International Journal of Sensor Networks. 6: 191-198. DOI: 10.1504/IJSNET.2009.029395 |
0.442 |
|
2009 |
Rubinstein BIP, Nelson B, Huang L, Joseph AD, Lau SH, Rao S, Taft N, Tygar JD. Stealthy poisoning attacks on PCA-based anomaly detectors Performance Evaluation Review. 37: 73-74. DOI: 10.1145/1639562.1639592 |
0.318 |
|
2009 |
Huang YL, Lu PH, Tygar JD, Joseph AD. OSNP: Secure wireless authentication protocol using one-time key Computers and Security. 28: 803-815. DOI: 10.1016/J.Cose.2009.05.009 |
0.572 |
|
2008 |
Chen P, Ahammad P, Boyer C, Huang SI, Lin L, Lobaton E, Meingast M, Oh S, Wang S, Yan P, Yang AY, Yeo C, Chang LC, Tygar JD, Sastry SS. Citric: A low-bandwidth wireless camera network platform 2008 2nd Acm/Ieee International Conference On Distributed Smart Cameras, Icdsc 2008. DOI: 10.1109/ICDSC.2008.4635675 |
0.364 |
|
2008 |
Ni CC, Hsiang TR, Tygar JD. A power-preserving broadcast protocol for WSNs with DoS resistance Proceedings - International Conference On Computer Communications and Networks, Icccn. 777-782. DOI: 10.1109/ICCCN.2008.ECP.146 |
0.428 |
|
2008 |
Rubinstein BIP, Nelson B, Huang L, Joseph AD, Lau SH, Taft N, Tygar JD. Evading anomaly detection through variance injection attacks on PCA Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 394-395. DOI: 10.1007/978-3-540-87403-4_23 |
0.384 |
|
2005 |
Tygar JD. When computer security crashes into multimedia Proceedings - Seventh Ieee International Symposium On Multimedia, Ism 2005. 2005: 2. DOI: 10.1109/ISM.2005.124 |
0.332 |
|
2005 |
Lee DT, Shieh SP, Tygar JD. Computer security in the 21st century Computer Security in the 21st Century. 1-268. DOI: 10.1007/b104203 |
0.528 |
|
2005 |
Li Y, Tygar JD, Hellerstein JM. Private Matching Computer Security in the 21st Century. 25-50. DOI: 10.1007/0-387-24006-3_3 |
0.306 |
|
2003 |
Tygar JD. The problem with privacy Proceedings - 3rd Ieee Workshop On Internet Applications, Wiapp 2003. 2-8. DOI: 10.1109/WIAPP.2003.1210280 |
0.415 |
|
2002 |
Song D, Zuckerman D, Tygar JD. Expander graphs for digital stream authentication and robust overlay networks Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 258-270. DOI: 10.1109/SECPRI.2002.1004376 |
0.339 |
|
2002 |
Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE. SPINS: Security protocols for sensor networks Wireless Networks. 8: 521-534. DOI: 10.1023/A:1016598314198 |
0.549 |
|
2001 |
Perrig A, Smith S, Song D, Tygar JD. SAM: A flexible and secure auction architecture using trusted hardware Proceedings - 15th International Parallel and Distributed Processing Symposium, Ipdps 2001. 1764-1773. DOI: 10.1109/IPDPS.2001.925165 |
0.482 |
|
2001 |
Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: Security protocols for sensor networks Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 189-199. |
0.566 |
|
2001 |
Perrig A, Song D, Tygar JD. ELK, a new protocol for efficient large-group key distribution Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 247-262. |
0.483 |
|
2000 |
Perrig A, Canetti R, Tygar JD, Song D. Efficient authentication and signing of multicast streams over lossy channels Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 56-73. |
0.402 |
|
1996 |
Heintze N, Tygar JD. A model for secure protocols and their compositions Ieee Transactions On Software Engineering. 22: 16-30. DOI: 10.1109/32.481514 |
0.492 |
|
1995 |
Sirbu M, Tygar JD. A business model, a set of protocols, and software implementation NetBill: An Internet Commerce System Optimized for Network-Delivered Services Ieee Personal Communications. 2: 34-39. DOI: 10.1109/98.403456 |
0.382 |
|
1994 |
Heydon A, Tygar JD. Specifying and checking UNIX security constraints Computing Systems. 7: 91-112. |
0.352 |
|
1994 |
Heintze N, Tygar JD. Model for secure protocols and their compositions Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 2-13. |
0.468 |
|
Show low-probability matches. |