Year |
Citation |
Score |
2020 |
Kortum P, Stein R, Acemyan CZ, Wallach DS, Vann E. How Human Factors Can Help Preserve Democracy in the Age of Pandemics. Human Factors. 18720820946896. PMID 32741224 DOI: 10.1177/0018720820946896 |
0.307 |
|
2018 |
Acemyan CZ, Kortum P, Byrne MD, Wallach DS. Summative Usability Assessments of STAR-Vote: A Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use. Human Factors. 18720818812586. PMID 30512968 DOI: 10.1177/0018720818812586 |
0.315 |
|
2017 |
Pridgen A, Garfinkel S, Wallach DS. Picking up the trash: Exploiting generational GC for memory analysis Digital Investigation. 20. DOI: 10.1016/J.Diin.2017.01.002 |
0.31 |
|
2015 |
Bates A, Butler KRB, Sherr M, Shields C, Traynor P, Wallach D. Accountable wiretapping-or-I know they can hear you now Journal of Computer Security. 23: 167-195. DOI: 10.3233/Jcs-140515 |
0.382 |
|
2015 |
Bild DR, Liu Y, Dick RP, Mao ZM, Wallach DS. Aggregate characterization of user behavior in Twitter and analysis of the retweet graph Acm Transactions On Internet Technology. 15. DOI: 10.1145/2700060 |
0.339 |
|
2015 |
Liu Y, Bild DR, Dick RP, Mao ZM, Wallach DS. The mason test: A defense against sybil attacks in wireless networks without trusted authorities Ieee Transactions On Mobile Computing. 14: 2376-2391. DOI: 10.1109/Tmc.2015.2398425 |
0.417 |
|
2014 |
Rostami M, Majzoobi M, Koushanfar F, Wallach DS, Devadas S. Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching Ieee Transactions On Emerging Topics in Computing. 2: 37-49. DOI: 10.1109/Tetc.2014.2300635 |
0.369 |
|
2011 |
Crosby SA, Wallach DS. Authenticated dictionaries: Real-world costs and trade-offs Acm Transactions On Information and System Security. 14. DOI: 10.1145/2019599.2019602 |
0.751 |
|
2011 |
Wallach DS. Rebooting the CS publication process Communications of the Acm. 54: 32-35. DOI: 10.1145/2001269.2001283 |
0.315 |
|
2011 |
Bild DR, Liu Y, Dick RP, Mao ZM, Wallach DS. Using predictable mobility patterns to support scalable and secure MANETs of handheld devices Mobisys'11 - Compilation Proceedings of the 9th International Conference On Mobile Systems, Applications, and Services and Co-Located Workshops - Mobiarch 2011 Workshop, Mobiarch'11. 13-18. DOI: 10.1145/1999916.1999921 |
0.334 |
|
2010 |
Wallach D. Technical perspective native client: A clever alternative Communications of the Acm. 53: 90. DOI: 10.1145/1629175.1629202 |
0.342 |
|
2009 |
Crosby SA, Wallach DS, Riedi RH. Opportunities and Limits of Remote Timing Attacks Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455526.1455530 |
0.757 |
|
2009 |
Crosby SA, Wallach DS. Super-efficient aggregating history-independent persistent authenticated dictionaries Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5789: 671-688. DOI: 10.1007/978-3-642-04444-1_41 |
0.747 |
|
2006 |
Coarfa C, Druschel P, Wallach DS. Performance analysis of TLS web servers Acm Transactions On Computer Systems. 24: 39-69. DOI: 10.1145/1124153.1124155 |
0.364 |
|
2006 |
Singh A, Ngan TW, Druschel P, Wallach DS. Eclipse attacks on overlay networks: Threats and defenses Proceedings - Ieee Infocom. DOI: 10.1109/INFOCOM.2006.231 |
0.742 |
|
2005 |
de Lara E, Chopra Y, Kumar R, Vaghela N, Wallach DS, Zwaenepoel W. Iterative adaptation for mobile clients using existing APIs Ieee Transactions On Parallel and Distributed Systems. 16: 966-981. DOI: 10.1109/Tpds.2005.124 |
0.379 |
|
2005 |
Stubblefield A, Rubin AD, Wallach DS. Managing the performance impact of web security Electronic Commerce Research. 5: 99-116. DOI: 10.1023/B:Elec.0000045975.59531.08 |
0.399 |
|
2005 |
Ladd AM, Bekris KE, Rudys A, Kavraki LE, Wallach DS. Robotics-based location sensing using wireless ethernet Wireless Networks. 11: 189-204. DOI: 10.1007/S11276-004-4755-8 |
0.74 |
|
2005 |
Nandi A, Ngan TW, Singh A, Druschel P, Wallach DS. Scrivener: Providing incentives in cooperative content distribution systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3790: 270-291. DOI: 10.1007/11587552_14 |
0.771 |
|
2005 |
Nielson SJ, Crosby SA, Wallach DS. A taxonomy of rational attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3640: 36-46. DOI: 10.1007/11558989_4 |
0.673 |
|
2004 |
Ladd AM, Bekris KE, Rudys AP, Wallach DS, Kavraki LE. On the feasibility of using wireless Ethernet for indoor localization Ieee Transactions On Robotics and Automation. 20: 555-559. DOI: 10.1109/Tra.2004.824948 |
0.742 |
|
2004 |
Bannet J, Price DW, Rudys A, Singer J, Wallach DS. Hack-a-Vote: Security Issues with Electronic Voting Systems Ieee Security and Privacy. 2: 32-37. DOI: 10.1109/MSECP.2004.1264851 |
0.705 |
|
2004 |
Haeberlen A, Rudys A, Flannery E, Wallach DS, Ladd AM, Kavraki LE. Practical robust localization over large-scale 802.11 wireless networks Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 70-84. |
0.735 |
|
2003 |
Hu YC, Yu W, Cox A, Wallach D, Zwaenepoel W. Run-time support for distributed sharing in safe languages Acm Transactions On Computer Systems. 21: 1-35. DOI: 10.1145/592637.592638 |
0.359 |
|
2003 |
Price DW, Rudys A, Wallach DS. Garbage collector memory accounting in language-based systems Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 263-274. DOI: 10.1109/SECPRI.2003.1199342 |
0.702 |
|
2003 |
Tao P, Rudys A, Ladd AM, Wallach DS. Wireless LAN Location-Sensing for Security Applications Proceedings of the Workshop On Wireless Security. 11-20. |
0.738 |
|
2003 |
Ngan TW, Wallach DS, Druschel P. Enforcing fair sharing of peer-to-peer resources Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2735: 149-159. |
0.784 |
|
2003 |
Rudys A, Wallach DS. Enforcing Java run-time properties using bytecode rewriting Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2609: 185-200. |
0.728 |
|
2003 |
Wallach DS. A survey of peer-to-peer security issues Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2609: 42-57. |
0.376 |
|
2002 |
Rudys A, Wallach DS. Termination in language-based systems Acm Transactions On Information and System Security. 5: 138-168. DOI: 10.1145/505586.505589 |
0.728 |
|
2002 |
Rudys A, Wallach DS. Transaction rollback for language-based systems Proceedings of the 2002 International Conference On Dependable Systems and Networks. 439-448. DOI: 10.1109/DSN.2002.1028929 |
0.739 |
|
2002 |
Ladd AM, Bekris KE, Marceau G, Rudys A, Wallach DS, Kavraki LE. Using wireless ethernet for localization Ieee International Conference On Intelligent Robots and Systems. 1: 402-408. |
0.742 |
|
2001 |
Flinn J, De Lara E, Satyanarayanan M, Wallach DS, Zwaenepoel W. Reducing the energy usage of office applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2218: 252-272. DOI: 10.1007/3-540-45518-3_14 |
0.313 |
|
2000 |
Wallach DS, Appel AW, Felten EW. SAFKASI: A security mechanism for language-based systems Acm Transactions On Software Engineering and Methodology. 9: 341-378. DOI: 10.1145/363516.363520 |
0.388 |
|
2000 |
de Lara E, Wallach D, Zwaenepoel W. Puppeteer Acm Sigops Operating Systems Review. 34: 33. DOI: 10.1145/346152.346224 |
0.331 |
|
2000 |
Charlie Hu Y, Yu W, Cox AL, Wallach DS, Zwaenepoel W. Run-time support for distributed sharing in typed languages Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1915: 192-206. DOI: 10.1007/3-540-40889-4_15 |
0.343 |
|
Show low-probability matches. |