J. D. Tygar
Affiliations:- University of California, Berkeley, USA
According to our database1,
J. D. Tygar
authored at least 94 papers
between 1985 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2017
Organisational culture, procedural countermeasures, and employee security behaviour: A qualitative study.
Inf. Comput. Secur., 2017
2016
Proceedings of the 33nd International Conference on Machine Learning, 2016
The Effect of Organisational Culture on Employee Security Behaviour: A Qualitative Study.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016
2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015
2014
Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values.
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014
Proceedings of the Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, 2014
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014
2013
ACM Trans. Sens. Networks, 2013
2012
Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371).
Dagstuhl Reports, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012
2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011
2010
Wirel. Networks, 2010
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010
Proceedings of the Privacy and Security Issues in Data Mining and Machine Learning, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
SIGMETRICS Perform. Evaluation Rev., 2009
Int. J. Sens. Networks, 2009
Comput. Secur., 2009
Conditioned-safe ceremonies and a user study of an application to web authentication.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009
2008
Proceedings of the Workshop on Cyber Security and Test, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008
Proceedings of the Usability, Psychology, and Security, 2008
Proceedings of the 2008 Second ACM/IEEE International Conference on Distributed Smart Cameras, 2008
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008
2007
Proceedings of the Advances in Neural Information Processing Systems 20, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007
2006
Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction.
RFC, June, 2005
Proceedings of the 1st Symposium on Usable Privacy and Security, 2005
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005
Proceedings of the Human Interactive Proofs, Second International Workshop, 2005
Proceedings of the Human Interactive Proofs, Second International Workshop, 2005
2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the Network and Distributed System Security Symposium, 2004
Proceedings of the Information Security, 7th International Conference, 2004
2003
Springer, ISBN: 978-0-7923-7650-7, 2003
2002
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002
Proceedings of the Software Security -- Theories and Systems, 2002
2001
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001
Proceedings of the Network and Distributed System Security Symposium, 2001
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001
2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
1999
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999
Proceedings of the Eighteenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, May 31, 1999
1998
Proceedings of the VLDB'98, 1998
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998
1997
Limits of Microtransaction Systems.
Proceedings of the Next Generation Information Technologies and Systems (NGITS '97), Third International Workshop, Neve Ilan, Israel, June 30, 1997
1996
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996
1995
IEEE Wirel. Commun., 1995
Proceedings of the First USENIX Workshop on Electronic Commerce, 1995
How are We Going to Pay for This? Fee-for-Service in Distributed Systems: Research and Policy Issues (Panel).
Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, British Columbia, Canada, May 30, 1995
Proceedings of the Digest of Papers: FTCS-25, 1995
1994
1993
Geometric characterization of series-parallel variable resistor networks.
Proceedings of the 1993 IEEE International Symposium on Circuits and Systems, 1993
1990
Proceedings of the 31st Annual Symposium on Foundations of Computer Science, 1990
1989
Constraining Pictures with Pictures.
Proceedings of the Information Processing 89, Proceedings of the IFIP 11th World Computer Congress, San Francisco, USA, August 28, 1989
Proceedings of the Foundations of Data Organization and Algorithms, 1989
1988
Proceedings of the IEEE Workshop on Visual Languages, 1988
1987
1985
Proceedings of the 22nd ACM/IEEE conference on Design automation, 1985
Proceedings of the Advances in Cryptology, 1985