The SCEAS System
Navigation Menu

Search the dblp DataBase


J. D. Tygar: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Marvin A. Sirbu, J. D. Tygar
    NetBill: An Internet Commerce System Optimized for Network Delivered Services. [Citation Graph (2, 0)][DBLP]
    COMPCON, 1995, pp:20-25 [Conf]
  2. J. D. Tygar, Bennet S. Yee, Nevin Heintze
    Cryptographic Postage Indicia. [Citation Graph (1, 0)][DBLP]
    ASIAN, 1996, pp:378-391 [Conf]
  3. J. D. Tygar
    Atomicity in Electronic Commerce. [Citation Graph (1, 0)][DBLP]
    PODC, 1996, pp:8-26 [Conf]
  4. J. D. Tygar
    Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce. [Citation Graph (1, 5)][DBLP]
    VLDB, 1998, pp:1-12 [Conf]
  5. Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar
    Can machine learning be secure? [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:16-25 [Conf]
  6. Li Zhuang, Feng Zhou, J. D. Tygar
    Keyboard acoustic emanations revisited. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:373-382 [Conf]
  7. Rachna Dhamija, J. D. Tygar, Marti A. Hearst
    Why phishing works. [Citation Graph (0, 0)][DBLP]
    CHI, 2006, pp:581-590 [Conf]
  8. Maurice Herlihy, J. D. Tygar
    How to Make Replicated Data Secure. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:379-391 [Conf]
  9. John H. Reif, J. D. Tygar
    Efficient Parallel Pseudo-Random Number Generation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1985, pp:433-446 [Conf]
  10. John H. Reif, J. D. Tygar, Akitoshi Yoshida
    The Computability and Complexity of Optical Beam Tracing [Citation Graph (0, 0)][DBLP]
    FOCS, 1990, pp:106-114 [Conf]
  11. Michael O. Rabin, J. D. Tygar
    ITOSS: An Integrated Toolkit For Operating System Security. [Citation Graph (0, 0)][DBLP]
    FODO, 1989, pp:2-15 [Conf]
  12. Sean W. Smith, David B. Johnson, J. D. Tygar
    Completely Asynchronous Optimistic Recovery with Minimal Rollbacks. [Citation Graph (0, 0)][DBLP]
    FTCS, 1995, pp:361-370 [Conf]
  13. Monica Chew, J. D. Tygar
    Collaborative Filtering CAPTCHAs. [Citation Graph (0, 0)][DBLP]
    HIP, 2005, pp:66-81 [Conf]
  14. Rachna Dhamija, J. D. Tygar
    Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks. [Citation Graph (0, 0)][DBLP]
    HIP, 2005, pp:127-141 [Conf]
  15. Chris Clifton, Peter Gemmel, Ed Means, Matt J. Merges, J. D. Tygar
    How are We Going to Pay for This? Fee-for-Service in Distributed Systems: Research and Policy Issues (Panel). [Citation Graph (0, 0)][DBLP]
    ICDCS, 1995, pp:344-348 [Conf]
  16. Allan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski
    Constraining Pictures with Pictures. [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1989, pp:157-162 [Conf]
  17. Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar
    SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2001, pp:170- [Conf]
  18. Randal E. Bryant, J. D. Tygar, Lawrence P. Huang
    Geometric characterization of series-parallel variable resistor networks. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1993, pp:2678-2681 [Conf]
  19. J. D. Tygar
    When Computer Security Crashes into Multimedia. [Citation Graph (0, 0)][DBLP]
    ISM, 2005, pp:2- [Conf]
  20. J. D. Tygar
    Privacy in Sensor Webs and Distributed Information Systems. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:84-95 [Conf]
  21. Monica Chew, J. D. Tygar
    Image Recognition CAPTCHAs. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:268-279 [Conf]
  22. Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng
    Panel: Authentication in Constrained Environments. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:186-191 [Conf]
  23. Adrian Perrig, Robert Szewczyk, Victor Wen, David E. Culler, J. D. Tygar
    SPINS: security protocols for sensor netowrks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2001, pp:189-199 [Conf]
  24. Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, J. D. Tygar
    Distillation Codes and Applications to DoS Resistant Multicast Authentication. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  25. Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar
    Efficient and Secure Source Authentication for Multicast. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  26. J. D. Tygar
    Limits of Microtransaction Systems. [Citation Graph (0, 0)][DBLP]
    NGITS, 1997, pp:0-0 [Conf]
  27. J. D. Tygar
    Open Problems in Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    PODS, 1999, pp:101- [Conf]
  28. Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song
    Efficient Authentication and Signing of Multicast Streams over Lossy Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:56-73 [Conf]
  29. Adrian Perrig, Dawn Xiaodong Song, J. D. Tygar
    ELK, A New Protocol for Efficient Large-Group Key Distribution. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:247-0 [Conf]
  30. Dawn Xiaodong Song, J. D. Tygar, David Zuckerman
    Expander Graphs for Digital Stream Authentication and Robust Overlay Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:258-0 [Conf]
  31. Umesh Shankar, Monica Chew, J. D. Tygar
    Side Effects Are Not Sufficient to Authenticate Software. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:89-102 [Conf]
  32. Allan Heydon, J. D. Tygar
    Specifying and Checking UNIX Security Constraints. [Citation Graph (0, 0)][DBLP]
    Computing Systems, 1994, v:7, n:1, pp:91-112 [Journal]
  33. John H. Reif, J. D. Tygar, Akitoshi Yoshida
    Computability and Complexity of Ray Tracing. [Citation Graph (0, 0)][DBLP]
    Discrete & Computational Geometry, 1994, v:11, n:, pp:265-287 [Journal]
  34. Catherine C. McGeoch, J. D. Tygar
    Optimal Sampling Strategies for Quicksort. [Citation Graph (0, 0)][DBLP]
    Random Struct. Algorithms, 1995, v:7, n:4, pp:287-300 [Journal]
  35. John H. Reif, J. D. Tygar
    Efficient Parallel Pseudorandom Number Generation. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1988, v:17, n:2, pp:404-411 [Journal]
  36. L. Jean Camp, J. D. Tygar
    Providing Auditing While Protecting Privacy. [Citation Graph (0, 0)][DBLP]
    Inf. Soc., 1994, v:10, n:1, pp:- [Journal]
  37. Nevin Heintze, J. D. Tygar
    A Model for Secure Protocols and Their Compositions. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1996, v:22, n:1, pp:16-30 [Journal]
  38. Allan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski
    Miró: Visual Specification of Security. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1990, v:16, n:10, pp:1185-1197 [Journal]
  39. Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, David E. Culler
    SPINS: Security Protocols for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2002, v:8, n:5, pp:521-534 [Journal]
  40. Chih-Chung Lin, Yuan-Cheng Lai, J. D. Tygar, Chuan-Kai Yang, Chi-Lung Chiang
    Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags. [Citation Graph (0, 0)][DBLP]
    APWeb/WAIM Workshops, 2007, pp:634-643 [Conf]

  41. A Power-Preserving Broadcast Protocol for WSNs with DoS Resistance. [Citation Graph (, )][DBLP]

  42. ANTIDOTE: understanding and defending against poisoning of anomaly detectors. [Citation Graph (, )][DBLP]

  43. Conditioned-safe ceremonies and a user study of an application to web authentication. [Citation Graph (, )][DBLP]

  44. Near-Optimal Evasion of Convex-Inducing Classifiers [Citation Graph (, )][DBLP]

  45. Query Strategies for Evading Convex-Inducing Classifiers [Citation Graph (, )][DBLP]

Search in 0.062secs, Finished in 0.064secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002