Search the dblp DataBase
David Molnar :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Tony Vila , Rachel Greenstadt , David Molnar Why we can't be bothered to read privacy policies models of privacy economics as a lemons market. [Citation Graph (0, 0)][DBLP ] ICEC, 2003, pp:403-407 [Conf ] Craig Gentry , David Molnar , Zulfikar Ramzan Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2005, pp:662-681 [Conf ] David Molnar , David Wagner Privacy and security in library RFID: issues, practices, and architectures. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:210-219 [Conf ] Robert Johnson , David Molnar , Dawn Xiaodong Song , David Wagner Homomorphic Signature Schemes. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:244-262 [Conf ] Ravi Jain , David Molnar , Zulfikar Ramzan Towards understanding algorithmic factors affecting energy consumption: switching complexity, randomness, and preliminary experiments. [Citation Graph (0, 0)][DBLP ] DIALM-POMC, 2005, pp:70-79 [Conf ] Roger Dingledine , Michael J. Freedman , David Molnar The Free Haven Project: Distributed Anonymous Storage Service. [Citation Graph (0, 0)][DBLP ] Workshop on Design Issues in Anonymity and Unobservability, 2000, pp:67-95 [Conf ] David Molnar , Matt Piotrowski , David Schultz , David Wagner The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:156-168 [Conf ] Roger Dingledine , Michael J. Freedman , David Hopwood , David Molnar A Reputation System to Increase MIX-Net Reliability. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2001, pp:126-141 [Conf ] Stark C. Draper , Prakash Ishwar , David Molnar , Vinod Prabhakaran , Kannan Ramchandran , Daniel Schonberg , David Wagner An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2005, pp:327-341 [Conf ] Chris Crutchfield , David Molnar , David Turner , David Wagner Generic On-Line/Off-Line Threshold Signatures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:58-74 [Conf ] David Molnar , Andrea Soppera , David Wagner A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:276-290 [Conf ] David Molnar , Tadayoshi Kohno , Naveen Sastry , David Wagner Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract). [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:365-370 [Conf ] Nicholas Hopper , David Molnar , David Wagner From Weak to Strong Watermarking. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:362-382 [Conf ] David Molnar , Andrea Soppera , David Wagner Privacy for RFID through trusted computing. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:31-34 [Conf ] Nathan Good , David Molnar , Jennifer M. Urban , Deirdre K. Mulligan , Elizabeth Miles , Laura Quilter , David Wagner Radio frequency Id and privacy with information goods. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:41-42 [Conf ] Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate. [Citation Graph (, )][DBLP ] RFID security and privacy: long-term research or short-term tinkering? [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs