The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Patrick McDaniel: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wesam Lootah, William Enck, Patrick McDaniel
    TARP: Ticket-based Address Resolution Protocol. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:106-116 [Conf]
  2. William Enck, Patrick Traynor, Patrick McDaniel, Thomas F. La Porta
    Exploiting open functionality in SMS-capable cellular networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:393-404 [Conf]
  3. Kevin R. B. Butler, Patrick McDaniel, William Aiello
    Optimizing BGP security by exploiting path stability. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:298-310 [Conf]
  4. Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Brent Waters
    Secure attribute-based systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:99-112 [Conf]
  5. Jim Irrer, Atul Prakash, Patrick McDaniel
    Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:44-46 [Conf]
  6. Patrick McDaniel, Atul Prakash
    A Flexible Architecture for Security Policy Enforcement. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:234-239 [Conf]
  7. Somesh Jha, Louis Kruger, Patrick McDaniel
    Privacy Preserving Clustering. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:397-417 [Conf]
  8. Kevin R. B. Butler, William Enck, Jennifer Plasterr, Patrick Traynor, Patrick McDaniel
    Privacy Preserving Web-Based Email. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:116-131 [Conf]
  9. Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger
    Password Exhaustion: Predicting the End of Password Usefulness. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:37-55 [Conf]
  10. Ali Al-Lawati, Dongwon Lee, Patrick McDaniel
    Blocking-aware private record linkage. [Citation Graph (0, 0)][DBLP]
    IQIS, 2005, pp:59-68 [Conf]
  11. Patrick Traynor, William Enck, Patrick McDaniel, Thomas F. La Porta
    Mitigating attacks on open functionality in SMS-capable cellular networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2006, pp:182-193 [Conf]
  12. Heesook Choi, William Enck, Jaesheung Shin, Patrick McDaniel, Thomas F. La Porta
    Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2005, pp:12-21 [Conf]
  13. Patrick McDaniel, William Aiello, Kevin Butler, John Ioannidis
    Origin authentication in interdomain routing. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:16, pp:2953-2980 [Journal]
  14. Patrick McDaniel, Atul Prakash
    Enforcing provisioning and authorization policy in the Antigone system. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:6, pp:483-511 [Journal]
  15. Patrick McDaniel, Atul Prakash
    Methods and limitations of security policy reconciliation. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:3, pp:259-291 [Journal]
  16. Hosam Rowaihy, William Enck, Patrick McDaniel, Tom La Porta
    Limiting Sybil Attacks in Structured P2P Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:2596-2600 [Conf]
  17. Wesam Lootah, William Enck, Patrick McDaniel
    TARP: Ticket-based address resolution protocol. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:15, pp:4322-4337 [Journal]

  18. Establishing and Sustaining System Integrity via Root of Trust Installation. [Citation Graph (, )][DBLP]


  19. Channels: Runtime System Infrastructure for Security-Typed Languages. [Citation Graph (, )][DBLP]


  20. Protecting users from "themselves". [Citation Graph (, )][DBLP]


  21. Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. [Citation Graph (, )][DBLP]


  22. Jifclipse: development tools for security-typed languages. [Citation Graph (, )][DBLP]


  23. Trusted declassification: : high-level policy for a security-typed language. [Citation Graph (, )][DBLP]


  24. An architecture for enforcing end-to-end access control over web applications. [Citation Graph (, )][DBLP]


  25. Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST. [Citation Graph (, )][DBLP]


  26. Energy Theft in the Advanced Metering Infrastructure. [Citation Graph (, )][DBLP]


  27. Design, implementation and evaluation of security in iSCSI-based network storage systems. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002