Origin-bound certificates: a fresh approach to strong client authentication for the web

Alexei Czeskis , Michael Dietz , Dan S. Wallach , Dirk Balfanz
usenix security symposium 16 -16

55
2012
MOMMIE knows best: systematic optimizations for verifiable distributed algorithms

Charalampos Papamanthou , Petros Maniatis , Michael Dietz
hot topics in operating systems 30 -30

2
2011
AdSplit: separating smartphone advertising from applications

Shashi Shekhar , Michael Dietz , Dan S. Wallach
usenix security symposium 28 -28

117
2012
Quire: lightweight provenance for smart phone operating systems

Shashi Shekhar , Michael Dietz , Anhei Shu , Dan S. Wallach
usenix security symposium 23 -23

509
2011
Manufacturer origin attestation for device user authorization

Arnar Birgisson , Michael Dietz , Breno de Medeiros , Mengcheng Duan

2017
Hardening Persona - Improving Federated Web Login.

Michael Dietz , Dan S. Wallach
network and distributed system security symposium

7
2014
Strengthening user authentication through opportunistic cryptographic identity assertions

Alexei Czeskis , Michael Dietz , Tadayoshi Kohno , Dan Wallach
Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12 404 -414

86
2012
Separating Smartphone advertising from applications

Shashi Shekhar , Michael Dietz , Dan S Wallach
Rice University

4
2012
Secbook and Pidgin-Trust

Devin Grady , Michael Dietz

2008
IMMUNE: an Infrastructure for Mobile Machines in an Unplanned Network for Epidemiology

Michael Dietz , William Ashford , Marty Humphrey , Bryan Pfaffenberger
University of Virginia

2008
2008