David Molnar
According to our database1,
David Molnar
authored at least 52 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CYBERSECEVAL 3: Advancing the Evaluation of Cybersecurity Risks and Capabilities in Large Language Models.
CoRR, 2024
CyberSecEval 2: A Wide-Ranging Cybersecurity Evaluation Suite for Large Language Models.
CoRR, 2024
2020
Proceedings of the Privacy in Statistical Databases, 2020
2018
Getting Fit for the Future: Optimizing Energy Usage in Existing Buildings by Adding Non-Invasive Sensor Networks.
Proceedings of the 27th IEEE International Symposium on Industrial Electronics, 2018
2017
IEEE Secur. Priv., 2017
2016
Detection of pulmonary nodule growth with dose reduced chest tomosynthesis: a human observer study using simulated nodules.
Proceedings of the Medical Imaging 2016: Image Perception, Observer Performance, and Technology Assessment, San Diego, California, United States, 27 February, 2016
2015
ACM Trans. Program. Lang. Syst., 2015
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015
2014
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013
2012
Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2012
2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 2011 USENIX Annual Technical Conference, 2011
Using Services and Service Compositions to Enable the Distributed Execution of Legacy Simulation Applications.
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011
Workflow-based Distributed Environment for Legacy Simulation Applications.
Proceedings of the ICSOFT 2011, 2011
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the 18th USENIX Security Symposium, 2009
2008
Proceedings of the First ACM Conference on Wireless Network Security, 2008
2006
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine.
IACR Cryptol. ePrint Arch., 2006
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
2005
IACR Cryptol. ePrint Arch., 2005
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks.
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography.
Proceedings of the Information Hiding, 7th International Workshop, 2005
Towards understanding algorithmic factors affecting energy consumption: switching complexity, randomness, and preliminary experiments.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2005
Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs.
Proceedings of the Advances in Cryptology, 2005
2004
Why We Can't Be Bothered to Read Privacy Policies - Models of Privacy Economics as a Lemons Market.
Proceedings of the Economics of Information Security, 2004
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
2003
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market.
Proceedings of the 5th International Conference on Electronic Commerce, 2003
2002
2001
Proceedings of the Information Hiding, 4th International Workshop, 2001
2000
Proceedings of the Designing Privacy Enhancing Technologies, 2000