The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

David Molnar: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tony Vila, Rachel Greenstadt, David Molnar
    Why we can't be bothered to read privacy policies models of privacy economics as a lemons market. [Citation Graph (0, 0)][DBLP]
    ICEC, 2003, pp:403-407 [Conf]
  2. Craig Gentry, David Molnar, Zulfikar Ramzan
    Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:662-681 [Conf]
  3. David Molnar, David Wagner
    Privacy and security in library RFID: issues, practices, and architectures. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:210-219 [Conf]
  4. Robert Johnson, David Molnar, Dawn Xiaodong Song, David Wagner
    Homomorphic Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:244-262 [Conf]
  5. Ravi Jain, David Molnar, Zulfikar Ramzan
    Towards understanding algorithmic factors affecting energy consumption: switching complexity, randomness, and preliminary experiments. [Citation Graph (0, 0)][DBLP]
    DIALM-POMC, 2005, pp:70-79 [Conf]
  6. Roger Dingledine, Michael J. Freedman, David Molnar
    The Free Haven Project: Distributed Anonymous Storage Service. [Citation Graph (0, 0)][DBLP]
    Workshop on Design Issues in Anonymity and Unobservability, 2000, pp:67-95 [Conf]
  7. David Molnar, Matt Piotrowski, David Schultz, David Wagner
    The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:156-168 [Conf]
  8. Roger Dingledine, Michael J. Freedman, David Hopwood, David Molnar
    A Reputation System to Increase MIX-Net Reliability. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:126-141 [Conf]
  9. Stark C. Draper, Prakash Ishwar, David Molnar, Vinod Prabhakaran, Kannan Ramchandran, Daniel Schonberg, David Wagner
    An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:327-341 [Conf]
  10. Chris Crutchfield, David Molnar, David Turner, David Wagner
    Generic On-Line/Off-Line Threshold Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:58-74 [Conf]
  11. David Molnar, Andrea Soppera, David Wagner
    A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:276-290 [Conf]
  12. David Molnar, Tadayoshi Kohno, Naveen Sastry, David Wagner
    Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:365-370 [Conf]
  13. Nicholas Hopper, David Molnar, David Wagner
    From Weak to Strong Watermarking. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:362-382 [Conf]
  14. David Molnar, Andrea Soppera, David Wagner
    Privacy for RFID through trusted computing. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:31-34 [Conf]
  15. Nathan Good, David Molnar, Jennifer M. Urban, Deirdre K. Mulligan, Elizabeth Miles, Laura Quilter, David Wagner
    Radio frequency Id and privacy with information goods. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:41-42 [Conf]

  16. Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate. [Citation Graph (, )][DBLP]


  17. RFID security and privacy: long-term research or short-term tinkering? [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002