Dan S. Wallach - Publications

Affiliations: 
Rice University, Houston, TX 
Area:
Computer Science

36 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Kortum P, Stein R, Acemyan CZ, Wallach DS, Vann E. How Human Factors Can Help Preserve Democracy in the Age of Pandemics. Human Factors. 18720820946896. PMID 32741224 DOI: 10.1177/0018720820946896  0.307
2018 Acemyan CZ, Kortum P, Byrne MD, Wallach DS. Summative Usability Assessments of STAR-Vote: A Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use. Human Factors. 18720818812586. PMID 30512968 DOI: 10.1177/0018720818812586  0.315
2017 Pridgen A, Garfinkel S, Wallach DS. Picking up the trash: Exploiting generational GC for memory analysis Digital Investigation. 20. DOI: 10.1016/J.Diin.2017.01.002  0.31
2015 Bates A, Butler KRB, Sherr M, Shields C, Traynor P, Wallach D. Accountable wiretapping-or-I know they can hear you now Journal of Computer Security. 23: 167-195. DOI: 10.3233/Jcs-140515  0.382
2015 Bild DR, Liu Y, Dick RP, Mao ZM, Wallach DS. Aggregate characterization of user behavior in Twitter and analysis of the retweet graph Acm Transactions On Internet Technology. 15. DOI: 10.1145/2700060  0.339
2015 Liu Y, Bild DR, Dick RP, Mao ZM, Wallach DS. The mason test: A defense against sybil attacks in wireless networks without trusted authorities Ieee Transactions On Mobile Computing. 14: 2376-2391. DOI: 10.1109/Tmc.2015.2398425  0.417
2014 Rostami M, Majzoobi M, Koushanfar F, Wallach DS, Devadas S. Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching Ieee Transactions On Emerging Topics in Computing. 2: 37-49. DOI: 10.1109/Tetc.2014.2300635  0.369
2011 Crosby SA, Wallach DS. Authenticated dictionaries: Real-world costs and trade-offs Acm Transactions On Information and System Security. 14. DOI: 10.1145/2019599.2019602  0.751
2011 Wallach DS. Rebooting the CS publication process Communications of the Acm. 54: 32-35. DOI: 10.1145/2001269.2001283  0.315
2011 Bild DR, Liu Y, Dick RP, Mao ZM, Wallach DS. Using predictable mobility patterns to support scalable and secure MANETs of handheld devices Mobisys'11 - Compilation Proceedings of the 9th International Conference On Mobile Systems, Applications, and Services and Co-Located Workshops - Mobiarch 2011 Workshop, Mobiarch'11. 13-18. DOI: 10.1145/1999916.1999921  0.334
2010 Wallach D. Technical perspective native client: A clever alternative Communications of the Acm. 53: 90. DOI: 10.1145/1629175.1629202  0.342
2009 Crosby SA, Wallach DS, Riedi RH. Opportunities and Limits of Remote Timing Attacks Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455526.1455530  0.757
2009 Crosby SA, Wallach DS. Super-efficient aggregating history-independent persistent authenticated dictionaries Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5789: 671-688. DOI: 10.1007/978-3-642-04444-1_41  0.747
2006 Coarfa C, Druschel P, Wallach DS. Performance analysis of TLS web servers Acm Transactions On Computer Systems. 24: 39-69. DOI: 10.1145/1124153.1124155  0.364
2006 Singh A, Ngan TW, Druschel P, Wallach DS. Eclipse attacks on overlay networks: Threats and defenses Proceedings - Ieee Infocom. DOI: 10.1109/INFOCOM.2006.231  0.742
2005 de Lara E, Chopra Y, Kumar R, Vaghela N, Wallach DS, Zwaenepoel W. Iterative adaptation for mobile clients using existing APIs Ieee Transactions On Parallel and Distributed Systems. 16: 966-981. DOI: 10.1109/Tpds.2005.124  0.379
2005 Stubblefield A, Rubin AD, Wallach DS. Managing the performance impact of web security Electronic Commerce Research. 5: 99-116. DOI: 10.1023/B:Elec.0000045975.59531.08  0.399
2005 Ladd AM, Bekris KE, Rudys A, Kavraki LE, Wallach DS. Robotics-based location sensing using wireless ethernet Wireless Networks. 11: 189-204. DOI: 10.1007/S11276-004-4755-8  0.74
2005 Nandi A, Ngan TW, Singh A, Druschel P, Wallach DS. Scrivener: Providing incentives in cooperative content distribution systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3790: 270-291. DOI: 10.1007/11587552_14  0.771
2005 Nielson SJ, Crosby SA, Wallach DS. A taxonomy of rational attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3640: 36-46. DOI: 10.1007/11558989_4  0.673
2004 Ladd AM, Bekris KE, Rudys AP, Wallach DS, Kavraki LE. On the feasibility of using wireless Ethernet for indoor localization Ieee Transactions On Robotics and Automation. 20: 555-559. DOI: 10.1109/Tra.2004.824948  0.742
2004 Bannet J, Price DW, Rudys A, Singer J, Wallach DS. Hack-a-Vote: Security Issues with Electronic Voting Systems Ieee Security and Privacy. 2: 32-37. DOI: 10.1109/MSECP.2004.1264851  0.705
2004 Haeberlen A, Rudys A, Flannery E, Wallach DS, Ladd AM, Kavraki LE. Practical robust localization over large-scale 802.11 wireless networks Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 70-84.  0.735
2003 Hu YC, Yu W, Cox A, Wallach D, Zwaenepoel W. Run-time support for distributed sharing in safe languages Acm Transactions On Computer Systems. 21: 1-35. DOI: 10.1145/592637.592638  0.359
2003 Price DW, Rudys A, Wallach DS. Garbage collector memory accounting in language-based systems Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 263-274. DOI: 10.1109/SECPRI.2003.1199342  0.702
2003 Tao P, Rudys A, Ladd AM, Wallach DS. Wireless LAN Location-Sensing for Security Applications Proceedings of the Workshop On Wireless Security. 11-20.  0.738
2003 Ngan TW, Wallach DS, Druschel P. Enforcing fair sharing of peer-to-peer resources Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2735: 149-159.  0.784
2003 Rudys A, Wallach DS. Enforcing Java run-time properties using bytecode rewriting Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2609: 185-200.  0.728
2003 Wallach DS. A survey of peer-to-peer security issues Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2609: 42-57.  0.376
2002 Rudys A, Wallach DS. Termination in language-based systems Acm Transactions On Information and System Security. 5: 138-168. DOI: 10.1145/505586.505589  0.728
2002 Rudys A, Wallach DS. Transaction rollback for language-based systems Proceedings of the 2002 International Conference On Dependable Systems and Networks. 439-448. DOI: 10.1109/DSN.2002.1028929  0.739
2002 Ladd AM, Bekris KE, Marceau G, Rudys A, Wallach DS, Kavraki LE. Using wireless ethernet for localization Ieee International Conference On Intelligent Robots and Systems. 1: 402-408.  0.742
2001 Flinn J, De Lara E, Satyanarayanan M, Wallach DS, Zwaenepoel W. Reducing the energy usage of office applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2218: 252-272. DOI: 10.1007/3-540-45518-3_14  0.313
2000 Wallach DS, Appel AW, Felten EW. SAFKASI: A security mechanism for language-based systems Acm Transactions On Software Engineering and Methodology. 9: 341-378. DOI: 10.1145/363516.363520  0.388
2000 de Lara E, Wallach D, Zwaenepoel W. Puppeteer Acm Sigops Operating Systems Review. 34: 33. DOI: 10.1145/346152.346224  0.331
2000 Charlie Hu Y, Yu W, Cox AL, Wallach DS, Zwaenepoel W. Run-time support for distributed sharing in typed languages Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1915: 192-206. DOI: 10.1007/3-540-40889-4_15  0.343
Show low-probability matches.