Runtime Support for Distributed Sharing in Strongly-Typed Languages

Y. Charlie Hu , Alan L. Cox , Dan S. Wallach , Weimin Yu

5
1999
Origin-bound certificates: a fresh approach to strong client authentication for the web

Alexei Czeskis , Michael Dietz , Dan S. Wallach , Dirk Balfanz
usenix security symposium 16 -16

55
2012
Efficient data structures for tamper-evident logging

Scott A. Crosby , Dan S. Wallach
usenix security symposium 317 -334

227
2009
VoteBox: a tamper-evident, verifiable electronic voting system

Daniel Sandler , Kyle Derr , Dan S. Wallach
usenix security symposium 349 -364

86
2008
AdSplit: separating smartphone advertising from applications

Shashi Shekhar , Michael Dietz , Dan S. Wallach
usenix security symposium 28 -28

117
2012
A Related-Key Cryptanalysis of RC4

Alexander Grosul , Dan S. Wallach

56
2000
Opportunities for bandwidth adaptation in microsoft office documents

Eyal de Lara , Dan S. Wallach , Willy Zwaenepoel
conference on usenix windows systems symposium 9 -9

19
2000
Collaboration and Document Editing on Bandwidth-Limited Devices

Eyal de Lara , Dan S. Wallach , Willy Zwaenepoel , Rajnish Kumar
ubiquitous computing

3
2001
Denial of service via algorithmic complexity attacks

Scott A. Crosby , Dan S. Wallach
usenix security symposium 3 -3

539
2003
Quire: lightweight provenance for smart phone operating systems

Shashi Shekhar , Michael Dietz , Anhei Shu , Dan S. Wallach
usenix security symposium 23 -23

509
2011
Reading between the lines: lessons from the SDMI challenge

Scott A. Craver , Edward W. Felten , Adam Stubblefield , Drew Dean
usenix security symposium 10 -10

75
2001
Web Spoofing: An Internet Con Game

Edward W. Felten , Drew Dean , Dan S. Wallach , Dirk Balfanz

302
1997
STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System

Philip B. Stark , Michael D. Byrne , Olivier Pereira , Dan S. Wallach
conference on electronic voting technology workshop on trustworthy elections 1 ( 1) 18 -37

75
2013
Puppeteer: Component-based adaptation for mobile computing

Eyal De Lara , Dan S. Wallach , Willy Zwaenepoel
usenix symposium on internet technologies and systems 14 -14

156
2001
Usability of Voter Verifiable, End-to-end Voting Systems: Baseline Data for Helios, Prêt à Voter, and Scantegrity II

Claudia Z Acemyan , Philip Kortum , Michael D Byrne , Dan S Wallach
conference on electronic voting technology workshop on trustworthy elections 26 -56

18
2014
From Error to Error: Why Voters Could not Cast a Ballot and Verify Their Vote With Helios, Prêt à Voter, and Scantegrity II

Claudia Z Acemyan , Philip Kortum , Michael D Byrne , Dan S Wallach
{USENIX} Journal of Election Technology and Systems ({JETS}) 3 ( 2) 1 -25

13
2015
Flexible, extensible Java security using digital signatures.

Edward W. Felten , Dan S. Wallach , Jim A. Roskind
Network Threats 59 -74

2
1996
A Characterization of Compound Documents on the Web

Eyal de Lara , Dan S. Wallach , Willy Zwaenepoel

1
1999
Robotics-Based Location Sensing based on Wireless Ethernet

Lydia E. Kavraki , Algis Rudys , Guillaume Marceau , Dan S. Wallach

1
2002