Dan S. Wallach
Orcid: 0000-0002-6059-925XAffiliations:
- Rice University, Houston, Department of Computer Science
According to our database1,
Dan S. Wallach
authored at least 119 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on facebook.com
-
on twitter.com
-
on orcid.org
-
on cs.rice.edu
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
2023
Proceedings of the 24th IEEE International Conference on Information Reuse and Integration for Data Science, 2023
2022
Summative Usability Assessments of STAR-Vote: A Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use.
Hum. Factors, 2022
2021
Int. J. Comput. Sci. Educ. Sch., 2021
Proceedings of the 29th European Symposium on Artificial Neural Networks, 2021
2020
Proc. Priv. Enhancing Technol., 2020
Hum. Factors, 2020
The Design and Implementation of a Verified File System with End-to-End Data Integrity.
CoRR, 2020
2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Digit. Investig., 2017
Proceedings of the Electronic Voting - Second International Joint Conference, 2017
Proceedings of the Electronic Voting - Second International Joint Conference, 2017
The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup.
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017
Proceedings of the Integrated Formal Methods - 13th International Conference, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
2016
CoRR, 2016
2015
Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph.
ACM Trans. Internet Techn., 2015
The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities.
IEEE Trans. Mob. Comput., 2015
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015
Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Users' Mental Models for Three End-to-End Voting Systems: Helios, Prêt à Voter, and Scantegrity II.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
2014
Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching.
IEEE Trans. Emerg. Top. Comput., 2014
Commun. ACM, 2014
Usability of Voter Verifiable, End-to-end Voting Systems: Baseline Data for Helios, Prêt à Voter, and Scantegrity II.
Proceedings of the 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013
Proceedings of the SPSM'13, 2013
2012
login Usenix Mag., 2012
Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012
Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012
Proceedings of the 6th International Conference on Soft Computing and Intelligent Systems (SCIS), 2012
Strengthening user authentication through opportunistic cryptographic identity assertions.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
ACM Trans. Inf. Syst. Secur., 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Using predictable mobility patterns to support scalable and secure MANETs of handheld devices.
Proceedings of the sixth international workshop on MobiArch, MobiArch '11, Bethesda, 2011
2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
2009
ACM Trans. Inf. Syst. Secur., 2009
Commun. ACM, 2009
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009
Proceedings of the 18th USENIX Security Symposium, 2009
Proceedings of the 8th international conference on Peer-to-peer systems, 2009
Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries.
Proceedings of the Computer Security, 2009
2008
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Proceedings of the 17th USENIX Security Symposium, 2008
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008
Electronic voting machines versus traditional methods: improved preference, similar performance.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
2007
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007
2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
2005
IEEE Trans. Parallel Distributed Syst., 2005
Proceedings of the Middleware 2005, ACM/IFIP/USENIX, 6th International Middleware Conference, Grenoble, France, November 28, 2005
Proceedings of the Peer-to-Peer Systems IV, 4th International Workshop, 2005
2004
IEEE Trans. Robotics, 2004
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
Proceedings of the 11st ACM SIGOPS European Workshop, 2004
Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, 2004
2003
ACM Trans. Comput. Syst., 2003
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
Proceedings of the First International Conference on Mobile Systems, 2003
Proceedings of the Peer-to-Peer Systems II, Second International Workshop, 2003
Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems, 2003
2002
Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), 2002
Proceedings of the 5th Symposium on Operating System Design and Implementation (OSDI 2002), 2002
Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking, 2002
Proceedings of the Software Security -- Theories and Systems, 2002
Proceedings of the Software Security -- Theories and Systems, 2002
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, Lausanne, Switzerland, September 30, 2002
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002
2001
Proceedings of the 10th USENIX Security Symposium, 2001
Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems, 2001
Proceedings of the Network and Distributed System Security Symposium, 2001
Proceedings of the Middleware 2001, 2001
Proceedings of HotOS-VIII: 8th Workshop on Hot Topics in Operating Systems, 2001
2000
ACM Trans. Softw. Eng. Methodol., 2000
Proceedings of the Languages, 2000
1998
1997
Proceedings of the Sixteenth ACM Symposium on Operating System Principles, 1997
1996
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
Proceedings of the Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, 1996
1994
Proceedings of the 21th Annual Conference on Computer Graphics and Interactive Techniques, 1994