|
Search the dblp DataBase
J. D. Tygar:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Marvin A. Sirbu, J. D. Tygar
NetBill: An Internet Commerce System Optimized for Network Delivered Services. [Citation Graph (2, 0)][DBLP] COMPCON, 1995, pp:20-25 [Conf]
- J. D. Tygar, Bennet S. Yee, Nevin Heintze
Cryptographic Postage Indicia. [Citation Graph (1, 0)][DBLP] ASIAN, 1996, pp:378-391 [Conf]
- J. D. Tygar
Atomicity in Electronic Commerce. [Citation Graph (1, 0)][DBLP] PODC, 1996, pp:8-26 [Conf]
- J. D. Tygar
Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce. [Citation Graph (1, 5)][DBLP] VLDB, 1998, pp:1-12 [Conf]
- Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar
Can machine learning be secure? [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:16-25 [Conf]
- Li Zhuang, Feng Zhou, J. D. Tygar
Keyboard acoustic emanations revisited. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:373-382 [Conf]
- Rachna Dhamija, J. D. Tygar, Marti A. Hearst
Why phishing works. [Citation Graph (0, 0)][DBLP] CHI, 2006, pp:581-590 [Conf]
- Maurice Herlihy, J. D. Tygar
How to Make Replicated Data Secure. [Citation Graph (0, 0)][DBLP] CRYPTO, 1987, pp:379-391 [Conf]
- John H. Reif, J. D. Tygar
Efficient Parallel Pseudo-Random Number Generation. [Citation Graph (0, 0)][DBLP] CRYPTO, 1985, pp:433-446 [Conf]
- John H. Reif, J. D. Tygar, Akitoshi Yoshida
The Computability and Complexity of Optical Beam Tracing [Citation Graph (0, 0)][DBLP] FOCS, 1990, pp:106-114 [Conf]
- Michael O. Rabin, J. D. Tygar
ITOSS: An Integrated Toolkit For Operating System Security. [Citation Graph (0, 0)][DBLP] FODO, 1989, pp:2-15 [Conf]
- Sean W. Smith, David B. Johnson, J. D. Tygar
Completely Asynchronous Optimistic Recovery with Minimal Rollbacks. [Citation Graph (0, 0)][DBLP] FTCS, 1995, pp:361-370 [Conf]
- Monica Chew, J. D. Tygar
Collaborative Filtering CAPTCHAs. [Citation Graph (0, 0)][DBLP] HIP, 2005, pp:66-81 [Conf]
- Rachna Dhamija, J. D. Tygar
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks. [Citation Graph (0, 0)][DBLP] HIP, 2005, pp:127-141 [Conf]
- Chris Clifton, Peter Gemmel, Ed Means, Matt J. Merges, J. D. Tygar
How are We Going to Pay for This? Fee-for-Service in Distributed Systems: Research and Policy Issues (Panel). [Citation Graph (0, 0)][DBLP] ICDCS, 1995, pp:344-348 [Conf]
- Allan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski
Constraining Pictures with Pictures. [Citation Graph (0, 0)][DBLP] IFIP Congress, 1989, pp:157-162 [Conf]
- Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar
SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. [Citation Graph (0, 0)][DBLP] IPDPS, 2001, pp:170- [Conf]
- Randal E. Bryant, J. D. Tygar, Lawrence P. Huang
Geometric characterization of series-parallel variable resistor networks. [Citation Graph (0, 0)][DBLP] ISCAS, 1993, pp:2678-2681 [Conf]
- J. D. Tygar
When Computer Security Crashes into Multimedia. [Citation Graph (0, 0)][DBLP] ISM, 2005, pp:2- [Conf]
- J. D. Tygar
Privacy in Sensor Webs and Distributed Information Systems. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:84-95 [Conf]
- Monica Chew, J. D. Tygar
Image Recognition CAPTCHAs. [Citation Graph (0, 0)][DBLP] ISC, 2004, pp:268-279 [Conf]
- Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng
Panel: Authentication in Constrained Environments. [Citation Graph (0, 0)][DBLP] MADNES, 2005, pp:186-191 [Conf]
- Adrian Perrig, Robert Szewczyk, Victor Wen, David E. Culler, J. D. Tygar
SPINS: security protocols for sensor netowrks. [Citation Graph (0, 0)][DBLP] MOBICOM, 2001, pp:189-199 [Conf]
- Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, J. D. Tygar
Distillation Codes and Applications to DoS Resistant Multicast Authentication. [Citation Graph (0, 0)][DBLP] NDSS, 2004, pp:- [Conf]
- Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar
Efficient and Secure Source Authentication for Multicast. [Citation Graph (0, 0)][DBLP] NDSS, 2001, pp:- [Conf]
- J. D. Tygar
Limits of Microtransaction Systems. [Citation Graph (0, 0)][DBLP] NGITS, 1997, pp:0-0 [Conf]
- J. D. Tygar
Open Problems in Electronic Commerce. [Citation Graph (0, 0)][DBLP] PODS, 1999, pp:101- [Conf]
- Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song
Efficient Authentication and Signing of Multicast Streams over Lossy Channels. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2000, pp:56-73 [Conf]
- Adrian Perrig, Dawn Xiaodong Song, J. D. Tygar
ELK, A New Protocol for Efficient Large-Group Key Distribution. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2001, pp:247-0 [Conf]
- Dawn Xiaodong Song, J. D. Tygar, David Zuckerman
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2002, pp:258-0 [Conf]
- Umesh Shankar, Monica Chew, J. D. Tygar
Side Effects Are Not Sufficient to Authenticate Software. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2004, pp:89-102 [Conf]
- Allan Heydon, J. D. Tygar
Specifying and Checking UNIX Security Constraints. [Citation Graph (0, 0)][DBLP] Computing Systems, 1994, v:7, n:1, pp:91-112 [Journal]
- John H. Reif, J. D. Tygar, Akitoshi Yoshida
Computability and Complexity of Ray Tracing. [Citation Graph (0, 0)][DBLP] Discrete & Computational Geometry, 1994, v:11, n:, pp:265-287 [Journal]
- Catherine C. McGeoch, J. D. Tygar
Optimal Sampling Strategies for Quicksort. [Citation Graph (0, 0)][DBLP] Random Struct. Algorithms, 1995, v:7, n:4, pp:287-300 [Journal]
- John H. Reif, J. D. Tygar
Efficient Parallel Pseudorandom Number Generation. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1988, v:17, n:2, pp:404-411 [Journal]
- L. Jean Camp, J. D. Tygar
Providing Auditing While Protecting Privacy. [Citation Graph (0, 0)][DBLP] Inf. Soc., 1994, v:10, n:1, pp:- [Journal]
- Nevin Heintze, J. D. Tygar
A Model for Secure Protocols and Their Compositions. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 1996, v:22, n:1, pp:16-30 [Journal]
- Allan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski
Miró: Visual Specification of Security. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 1990, v:16, n:10, pp:1185-1197 [Journal]
- Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, David E. Culler
SPINS: Security Protocols for Sensor Networks. [Citation Graph (0, 0)][DBLP] Wireless Networks, 2002, v:8, n:5, pp:521-534 [Journal]
- Chih-Chung Lin, Yuan-Cheng Lai, J. D. Tygar, Chuan-Kai Yang, Chi-Lung Chiang
Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags. [Citation Graph (0, 0)][DBLP] APWeb/WAIM Workshops, 2007, pp:634-643 [Conf]
A Power-Preserving Broadcast Protocol for WSNs with DoS Resistance. [Citation Graph (, )][DBLP]
ANTIDOTE: understanding and defending against poisoning of anomaly detectors. [Citation Graph (, )][DBLP]
Conditioned-safe ceremonies and a user study of an application to web authentication. [Citation Graph (, )][DBLP]
Near-Optimal Evasion of Convex-Inducing Classifiers [Citation Graph (, )][DBLP]
Query Strategies for Evading Convex-Inducing Classifiers [Citation Graph (, )][DBLP]
Search in 0.021secs, Finished in 0.023secs
|