Dan S. Wallach - Publications

Affiliations: 
Rice University, Houston, TX 
Area:
Computer Science

49 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2015 Bates A, Butler KRB, Sherr M, Shields C, Traynor P, Wallach D. Accountable wiretapping-or-I know they can hear you now Journal of Computer Security. 23: 167-195. DOI: 10.3233/Jcs-140515  1
2015 Tanash RS, Chen Z, Thakur T, Wallach DS, Subramanian D. Known unknowns: An analysis of twitter censorship in Turkey Wpes 2015 - Proceedings of the 2015 Acm Workshop On Privacy in the Electronic Society, Co-Located With Ccs 2015. 11-20. DOI: 10.1145/2808138.2808147  1
2015 Bild DR, Liu Y, Dick RP, Mao ZM, Wallach DS. Aggregate characterization of user behavior in Twitter and analysis of the retweet graph Acm Transactions On Internet Technology. 15. DOI: 10.1145/2700060  1
2015 Liu Y, Bild DR, Dick RP, Mao ZM, Wallach DS. The mason test: A defense against sybil attacks in wireless networks without trusted authorities Ieee Transactions On Mobile Computing. 14: 2376-2391. DOI: 10.1109/Tmc.2015.2398425  1
2015 Dressler JC, Bronk C, Wallach DS. Exploiting military OpSec through open-source vulnerabilities Proceedings - Ieee Military Communications Conference Milcom. 2015: 450-458. DOI: 10.1109/MILCOM.2015.7357484  1
2015 Acemyan CZ, Kortum P, Byrne MD, Wallach DS. Users’ mental models for three end-to-end voting systems: Helios, Prêt à Voter, and Scantegrity II Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9190: 463-474. DOI: 10.1007/978-3-319-20376-8_41  1
2014 Wallach D. Techn Communications of the Acm. 57: 98. DOI: 10.1145/2576234  1
2014 Rostami M, Majzoobi M, Koushanfar F, Wallach DS, Devadas S. Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching Ieee Transactions On Emerging Topics in Computing. 2: 37-49. DOI: 10.1109/Tetc.2014.2300635  1
2013 Book T, Wallach DS. A case of collusion: A study of the interface between ad libraries and their apps Proceedings of the Acm Conference On Computer and Communications Security. 79-85. DOI: 10.1145/2516760.2516762  1
2012 Majzoobi M, Rostami M, Koushanfar F, Wallach DS, Devadas S. Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching Proceedings - Ieee Cs Security and Privacy Workshops, Spw 2012. 33-44. DOI: 10.1109/SPW.2012.30  1
2012 Song P, Shu A, Phipps D, Tiwari M, Wallach DS, Crandall JR, Luger GF. Language without words: A pointillist model for natural language processing 6th International Conference On Soft Computing and Intelligent Systems, and 13th International Symposium On Advanced Intelligence Systems, Scis/Isis 2012. 11-15. DOI: 10.1109/SCIS-ISIS.2012.6505413  1
2011 Crosby SA, Wallach DS. Authenticated dictionaries: Real-world costs and trade-offs Acm Transactions On Information and System Security. 14. DOI: 10.1145/2019599.2019602  1
2011 Wallach DS. Rebooting the CS publication process Communications of the Acm. 54: 32-35. DOI: 10.1145/2001269.2001283  1
2011 Bild DR, Liu Y, Dick RP, Mao ZM, Wallach DS. Using predictable mobility patterns to support scalable and secure MANETs of handheld devices Mobisys'11 - Compilation Proceedings of the 9th International Conference On Mobile Systems, Applications, and Services and Co-Located Workshops - Mobiarch 2011 Workshop, Mobiarch'11. 13-18. DOI: 10.1145/1999916.1999921  1
2010 Wallach D. Technical perspective native client: A clever alternative Communications of the Acm. 53: 90. DOI: 10.1145/1629175.1629202  1
2010 Johnny Ngan TW, Dingledine R, Wallach DS. Building incentives into tor Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6052: 238-256. DOI: 10.1007/978-3-642-14577-3_19  1
2009 Wallach D. Technical perspective: Tools for information to flow securely and Swift-ly Communications of the Acm. 52: 78. DOI: 10.1145/1461928.1461948  1
2009 Crosby SA, Wallach DS, Riedi RH. Opportunities and Limits of Remote Timing Attacks Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455526.1455530  1
2009 Crosby SA, Wallach DS. Super-efficient aggregating history-independent persistent authenticated dictionaries Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5789: 671-688. DOI: 10.1007/978-3-642-04444-1_41  1
2006 Coarfa C, Druschel P, Wallach DS. Performance analysis of TLS web servers Acm Transactions On Computer Systems. 24: 39-69. DOI: 10.1145/1124153.1124155  1
2006 Singh A, Ngan TW, Druschel P, Wallach DS. Eclipse attacks on overlay networks: Threats and defenses Proceedings - Ieee Infocom. DOI: 10.1109/INFOCOM.2006.231  1
2005 de Lara E, Chopra Y, Kumar R, Vaghela N, Wallach DS, Zwaenepoel W. Iterative adaptation for mobile clients using existing APIs Ieee Transactions On Parallel and Distributed Systems. 16: 966-981. DOI: 10.1109/Tpds.2005.124  1
2005 Shieh SW, Wallach DS. Ad hoc and P2P security Ieee Internet Computing. 9: 14-15. DOI: 10.1109/MIC.2005.128  1
2005 Stubblefield A, Rubin AD, Wallach DS. Managing the performance impact of web security Electronic Commerce Research. 5: 99-116. DOI: 10.1023/B:Elec.0000045975.59531.08  1
2005 Ladd AM, Bekris KE, Rudys A, Kavraki LE, Wallach DS. Robotics-based location sensing using wireless ethernet Wireless Networks. 11: 189-204. DOI: 10.1007/S11276-004-4755-8  1
2005 Nandi A, Ngan TW, Singh A, Druschel P, Wallach DS. Scrivener: Providing incentives in cooperative content distribution systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3790: 270-291. DOI: 10.1007/11587552_14  1
2005 Nielson SJ, Crosby SA, Wallach DS. A taxonomy of rational attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3640: 36-46. DOI: 10.1007/11558989_4  1
2004 Mislove A, Oberoi G, Post A, Reis C, Druschel P, Wallach DS. AP3: Cooperative, decentralized anonymous communication Proceedings of the 11th Workshop On Acm Sigops European Workshop, Ew 11. DOI: 10.1145/1133572.1133578  1
2004 Ladd AM, Bekris KE, Rudys AP, Wallach DS, Kavraki LE. On the feasibility of using wireless Ethernet for indoor localization Ieee Transactions On Robotics and Automation. 20: 555-559. DOI: 10.1109/Tra.2004.824948  1
2004 Kohno T, Stubblefield A, Rubin AD, Wallach DS. Analysis of an electronic voting system Proceedings - Ieee Symposium On Security and Privacy. 2004: 27-40. DOI: 10.1109/SECPRI.2004.1301313  1
2004 Bannet J, Price DW, Rudys A, Singer J, Wallach DS. Hack-a-Vote: Security Issues with Electronic Voting Systems Ieee Security and Privacy. 2: 32-37. DOI: 10.1109/MSECP.2004.1264851  1
2004 Haeberlen A, Rudys A, Flannery E, Wallach DS, Ladd AM, Kavraki LE. Practical robust localization over large-scale 802.11 wireless networks Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 70-84.  1
2003 Hu YC, Yu W, Cox A, Wallach D, Zwaenepoel W. Run-time support for distributed sharing in safe languages Acm Transactions On Computer Systems. 21: 1-35. DOI: 10.1145/592637.592638  1
2003 Price DW, Rudys A, Wallach DS. Garbage collector memory accounting in language-based systems Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 263-274. DOI: 10.1109/SECPRI.2003.1199342  1
2003 Rudys A, Wallach DS. Enforcing Java run-time properties using bytecode rewriting Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2609: 185-200.  1
2003 Tao P, Rudys A, Ladd AM, Wallach DS. Wireless LAN Location-Sensing for Security Applications Proceedings of the Workshop On Wireless Security. 11-20.  1
2003 Ngan TW, Wallach DS, Druschel P. Enforcing fair sharing of peer-to-peer resources Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2735: 149-159.  1
2003 Wallach DS. A survey of peer-to-peer security issues Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2609: 42-57.  1
2002 Rudys A, Wallach DS. Termination in language-based systems Acm Transactions On Information and System Security. 5: 138-168. DOI: 10.1145/505586.505589  1
2002 De Lara E, Wallach DS, Zwaenepoel W. HATS: Hierarchical Adaptive Transmission Scheduling for multi-application adaptation Proceedings of Spie - the International Society For Optical Engineering. 4673: 100-114. DOI: 10.1117/12.449973  1
2002 Dotsenko Y, De Lara E, Wallach DS, Zwaenepoel W. Extensible adaptation via constraint solving Proceedings - 4th Ieee Workshop On Mobile Computing Systems and Applications, Wmcsa 2002. 117-127. DOI: 10.1109/MCSA.2002.1017491  1
2002 Rudys A, Wallach DS. Transaction rollback for language-based systems Proceedings of the 2002 International Conference On Dependable Systems and Networks. 439-448. DOI: 10.1109/DSN.2002.1028929  1
2002 Ladd AM, Bekris KE, Marceau G, Rudys A, Wallach DS, Kavraki LE. Using wireless ethernet for localization Ieee International Conference On Intelligent Robots and Systems. 1: 402-408.  1
2001 Wallach DS. Copy protection technology is doomed Computer. 34: 48-49. DOI: 10.1109/2.955098  1
2001 Flinn J, De Lara E, Satyanarayanan M, Wallach DS, Zwaenepoel W. Reducing the energy usage of office applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2218: 252-272. DOI: 10.1007/3-540-45518-3_14  1
2001 De Lara E, Wallach DS, Zwaenepoel W. Architectures for adaptation systems Proceedings of the Workshop On Hot Topics in Operating Systems - Hotos. 167.  1
2000 Wallach DS, Appel AW, Felten EW. SAFKASI: A security mechanism for language-based systems Acm Transactions On Software Engineering and Methodology. 9: 341-378. DOI: 10.1145/363516.363520  1
2000 Charlie Hu Y, Yu W, Cox AL, Wallach DS, Zwaenepoel W. Run-time support for distributed sharing in typed languages Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1915: 192-206. DOI: 10.1007/3-540-40889-4_15  1
1997 Wallach DS, Balfanz D, Dean D, Felten EW. Extensible Security Architectures for Java Operating Systems Review (Acm). 31: 116-128.  1
Show low-probability matches.