default search action
David A. Wagner 0001
Person information
- affiliation: University of California, Berkeley, CA, USA
Other persons with the same name
- David A. Wagner 0002 — California Institute of Technology, NASA Jet Propulsion Lab, Pasadena, CA, USA
Other persons with a similar name
- David B. Wagner
- David G. Wagner (aka: David Gustav Wagner) — University of Waterloo, ON, Canada (and 1 more)
- David K. Wagner
- David M. Wagner
- David P. Wagner
- David Wagner 0001 — German Graduate School of Management and Law, Heilbronn, Germany
- David Wagner 0004 — NASA, USA
- David Wagner 0007 — Munich Business School, Germany
- David Wagner 0008 — Forschungsinstitut für öffentliche Verwaltung (FÖV), Germany
- David Wagner 0009 — TripleBlind, Inc.
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c183]Julien Piet, Maha Alrashed, Chawin Sitawarin, Sizhe Chen, Zeming Wei, Elizabeth Sun, Basel Alomair, David A. Wagner:
Jatmo: Prompt Injection Defense by Task-Specific Finetuning. ESORICS (1) 2024: 105-124 - [c182]Chawin Sitawarin, Jaewon Chang, David Huang, Wesson Altoyan, David A. Wagner:
PubDef: Defending Against Transfer Attacks From Public Models. ICLR 2024 - [i50]Sizhe Chen, Julien Piet, Chawin Sitawarin, David A. Wagner:
StruQ: Defending Against Prompt Injection with Structured Queries. CoRR abs/2402.06363 (2024) - [i49]Chawin Sitawarin, Norman Mu, David A. Wagner, Alexandre Araujo:
PAL: Proxy-Guided Black-Box Attack on Large Language Models. CoRR abs/2402.09674 (2024) - [i48]Banghua Zhu, Norman Mu, Jiantao Jiao, David A. Wagner:
Generative AI Security: Challenges and Countermeasures. CoRR abs/2402.12617 (2024) - [i47]Yangruibo Ding, Yanjun Fu, Omniyyah Ibrahim, Chawin Sitawarin, Xinyun Chen, Basel Alomair, David A. Wagner, Baishakhi Ray, Yizheng Chen:
Vulnerability Detection with Code Language Models: How Far Are We? CoRR abs/2403.18624 (2024) - [i46]Yigitcan Kaya, Yizheng Chen, Shoumik Saha, Fabio Pierazzi, Lorenzo Cavallaro, David A. Wagner, Tudor Dumitras:
Demystifying Behavior-Based Malware Detection at Endpoints. CoRR abs/2405.06124 (2024) - [i45]Chong Xiang, Tong Wu, Zexuan Zhong, David A. Wagner, Danqi Chen, Prateek Mittal:
Certifiably Robust RAG against Retrieval Corruption. CoRR abs/2405.15556 (2024) - [i44]Zhanhao Hu, Julien Piet, Geng Zhao, Jiantao Jiao, David A. Wagner:
Toxicity Detection for Free. CoRR abs/2405.18822 (2024) - 2023
- [j22]Dhanya K. A., P. Vinod, Suleiman Y. Yerima, Abul Bashar, David A. Wagner, Abhiram T., Alan Antony, Ashil K. Shavanas, T. Gireesh Kumar:
Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN. IEEE Syst. J. 17(2): 2756-2766 (2023) - [c181]Nabeel Hingun, Chawin Sitawarin, Jerry Li, David A. Wagner:
REAP: A Large-Scale Realistic Adversarial Patch Benchmark. ICCV 2023: 4617-4628 - [c180]Chawin Sitawarin, Kornrapat Pongmala, Yizheng Chen, Nicholas Carlini, David A. Wagner:
Part-Based Models Improve Adversarial Robustness. ICLR 2023 - [c179]Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, David A. Wagner:
DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection. RAID 2023: 654-668 - [c178]Yizheng Chen, Zhoujie Ding, David A. Wagner:
Continuous Learning for Android Malware Detection. USENIX Security Symposium 2023: 1127-1144 - [c177]Julien Piet, Aashish Sharma, Vern Paxson, David A. Wagner:
Network Detection of Interactive SSH Impostors Using Deep Learning. USENIX Security Symposium 2023: 4283-4300 - [i43]Yizheng Chen, Zhoujie Ding, David A. Wagner:
Continuous Learning for Android Malware Detection. CoRR abs/2302.04332 (2023) - [i42]Yizheng Chen, Zhoujie Ding, Xinyun Chen, David A. Wagner:
DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection. CoRR abs/2304.00409 (2023) - [i41]Chawin Sitawarin, Jaewon Chang, David Huang, Wesson Altoyan, David A. Wagner:
Defending Against Transfer Attacks From Public Models. CoRR abs/2310.17645 (2023) - [i40]Norman Mu, Sarah Chen, Zifan Wang, Sizhe Chen, David Karamardian, Lulwa Aljeraisy, Dan Hendrycks, David A. Wagner:
Can LLMs Follow Simple Rules? CoRR abs/2311.04235 (2023) - [i39]Julien Piet, Chawin Sitawarin, Vivian Fang, Norman Mu, David A. Wagner:
Mark My Words: Analyzing and Evaluating Language Model Watermarks. CoRR abs/2312.00273 (2023) - [i38]Julien Piet, Maha Alrashed, Chawin Sitawarin, Sizhe Chen, Zeming Wei, Elizabeth Sun, Basel Alomair, David A. Wagner:
Jatmo: Prompt Injection Defense by Task-Specific Finetuning. CoRR abs/2312.17673 (2023) - 2022
- [j21]Nathan Malkin, David A. Wagner, Serge Egelman:
Can Humans Detect Malicious Always-Listening Assistants? A Framework for Crowdsourcing Test Drives. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-28 (2022) - [c176]Norman Mu, Alexander Kirillov, David A. Wagner, Saining Xie:
SLIP: Self-supervision Meets Language-Image Pre-training. ECCV (26) 2022: 529-544 - [c175]Chawin Sitawarin, Zachary J. Golan-Strieb, David A. Wagner:
Demystifying the Adversarial Robustness of Random Transformation Defenses. ICML 2022: 20232-20252 - [c174]Nathan Malkin, David A. Wagner, Serge Egelman:
Runtime Permissions for Privacy in Proactive Intelligent Assistants. SOUPS @ USENIX Security Symposium 2022: 633-651 - [i37]Chawin Sitawarin, Zachary J. Golan-Strieb, David A. Wagner:
Demystifying the Adversarial Robustness of Random Transformation Defenses. CoRR abs/2207.03574 (2022) - [i36]Chawin Sitawarin, Kornrapat Pongmala, Yizheng Chen, Nicholas Carlini, David A. Wagner:
Part-Based Models Improve Adversarial Robustness. CoRR abs/2209.09117 (2022) - [i35]Nabeel Hingun, Chawin Sitawarin, Jerry Li, David A. Wagner:
REAP: A Large-Scale Realistic Adversarial Patch Benchmark. CoRR abs/2212.05680 (2022) - 2021
- [c173]Chawin Sitawarin, Supriyo Chakraborty, David A. Wagner:
SAT: Improving Adversarial Training via Curriculum-Based Loss Smoothing. AISec@CCS 2021: 25-36 - [c172]Zhanyuan Zhang, Yizheng Chen, David A. Wagner:
SEAT: Similarity Encoder by Adversarial Training for Detecting Model Extraction Attack Queries. AISec@CCS 2021: 37-48 - [c171]Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David A. Wagner:
Learning Security Classifiers with Verified Global Robustness Properties. CCS 2021: 477-494 - [c170]Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, David A. Wagner:
Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams. NeurIPS 2021: 15486-15497 - [c169]Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Hopper: Modeling and Detecting Lateral Movement. USENIX Security Symposium 2021: 3093-3110 - [i34]Henry Xu, An Ju, David A. Wagner:
Model-Agnostic Defense for Lane Detection against Adversarial Attack. CoRR abs/2103.00663 (2021) - [i33]Dequan Wang, An Ju, Evan Shelhamer, David A. Wagner, Trevor Darrell:
Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks. CoRR abs/2105.08714 (2021) - [i32]Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David A. Wagner:
Learning Security Classifiers with Verified Global Robustness Properties. CoRR abs/2105.11363 (2021) - [i31]Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Hopper: Modeling and Detecting Lateral Movement (Extended Report). CoRR abs/2105.13442 (2021) - [i30]Norman Mu, Alexander Kirillov, David A. Wagner, Saining Xie:
SLIP: Self-supervision meets Language-Image Pre-training. CoRR abs/2112.12750 (2021) - 2020
- [c168]Michael McCoyd, Won Park, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang, Jason Xinyu Liu, David A. Wagner:
Minority Reports Defense: Defending Against Adversarial Patches. ACNS Workshops 2020: 564-582 - [c167]An Ju, David A. Wagner:
E-ABS: Extending the Analysis-By-Synthesis Robust Classification Model to More Complex Image Domains. AISec@CCS 2020: 25-36 - [c166]Chawin Sitawarin, David A. Wagner:
Minimum-Norm Adversarial Examples on KNN and KNN based Models. SP (Workshops) 2020: 34-40 - [c165]Zhanyuan Zhang, Benson Yuan, Michael McCoyd, David A. Wagner:
Clipped BagNet: Defending Against Sticker Attacks with Clipped Bag-of-features. SP (Workshops) 2020: 55-61 - [i29]Chawin Sitawarin, David A. Wagner:
Minimum-Norm Adversarial Examples on KNN and KNN-Based Models. CoRR abs/2003.06559 (2020) - [i28]Chawin Sitawarin, Supriyo Chakraborty, David A. Wagner:
Improving Adversarial Robustness Through Progressive Hardening. CoRR abs/2003.09347 (2020) - [i27]Michael McCoyd, Won Park, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang, Jason Xinyu Liu, David A. Wagner:
Minority Reports Defense: Defending Against Adversarial Patches. CoRR abs/2004.13799 (2020) - [i26]Neil Shah, Grant Ho, Marco Schweighauser, M. H. Afifi, Asaf Cidon, David A. Wagner:
A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts. CoRR abs/2007.14030 (2020) - [i25]Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, David A. Wagner:
Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams. CoRR abs/2011.09719 (2020)
2010 – 2019
- 2019
- [j20]Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, David A. Wagner:
Privacy Attitudes of Smart Speaker Users. Proc. Priv. Enhancing Technol. 2019(4): 250-271 (2019) - [c164]Nathan Malkin, Serge Egelman, David A. Wagner:
Privacy controls for always-listening devices. NSPW 2019: 78-91 - [c163]Chawin Sitawarin, David A. Wagner:
On the Robustness of Deep K-Nearest Neighbors. IEEE Symposium on Security and Privacy Workshops 2019: 1-7 - [c162]Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. USENIX Security Symposium 2019: 1273-1290 - [i24]Chawin Sitawarin, David A. Wagner:
On the Robustness of Deep K-Nearest Neighbors. CoRR abs/1903.08333 (2019) - [i23]Steven Chen, Nicholas Carlini, David A. Wagner:
Stateful Detection of Black-Box Adversarial Attacks. CoRR abs/1907.05587 (2019) - [i22]Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. CoRR abs/1910.00790 (2019) - 2018
- [j19]Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner, Konstantin Beznosov:
Dynamically Regulating Mobile Application Permissions. IEEE Secur. Priv. 16(1): 64-71 (2018) - [c161]Primal Wijesekera, Joel Reardon, Irwin Reyes, Lynn Tsai, Jung-Wei Chen, Nathan Good, David A. Wagner, Konstantin Beznosov, Serge Egelman:
Contextualizing Privacy Decisions for Better Prediction (and Protection). CHI 2018: 268 - [c160]Inigo Incer, Michael Theodorides, Sadia Afroz, David A. Wagner:
Adversarially Robust Malware Detection Using Monotonic Classification. IWSPA@CODASPY 2018: 54-63 - [c159]Anish Athalye, Nicholas Carlini, David A. Wagner:
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples. ICML 2018: 274-283 - [c158]Nicholas Carlini, David A. Wagner:
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. IEEE Symposium on Security and Privacy Workshops 2018: 1-7 - [c157]Michael McCoyd, David A. Wagner:
Background Class Defense Against Adversarial Examples. IEEE Symposium on Security and Privacy Workshops 2018: 96-102 - [c156]Steven Chen, Won Park, Joanna Yang, David A. Wagner:
Inferring Phone Location State. WiMob 2018: 42-47 - [i21]Nicholas Carlini, David A. Wagner:
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. CoRR abs/1801.01944 (2018) - [i20]Anish Athalye, Nicholas Carlini, David A. Wagner:
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples. CoRR abs/1802.00420 (2018) - 2017
- [j18]Linda Naeun Lee, David Fifield, Nathan Malkin, Ganesh Iyer, Serge Egelman, David A. Wagner:
A Usability Evaluation of Tor Launcher. Proc. Priv. Enhancing Technol. 2017(3): 90 (2017) - [c155]David A. Wagner:
Security and Machine Learning. CCS 2017: 1 - [c154]Nicholas Carlini, David A. Wagner:
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods. AISec@CCS 2017: 3-14 - [c153]Michael Theodorides, David A. Wagner:
Breaking active-set backward-edge CFI. HOST 2017: 85-89 - [c152]Christopher Thompson, David A. Wagner:
A Large-Scale Study of Modern Code Review and Security in Open Source Projects. PROMISE 2017: 83-92 - [c151]Lynn Tsai, Primal Wijesekera, Joel Reardon, Irwin Reyes, Serge Egelman, David A. Wagner, Nathan Good, Jung-Wei Chen:
Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences. SOUPS 2017: 145-162 - [c150]Nicholas Carlini, David A. Wagner:
Towards Evaluating the Robustness of Neural Networks. IEEE Symposium on Security and Privacy 2017: 39-57 - [c149]Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner, Konstantin Beznosov:
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences. IEEE Symposium on Security and Privacy 2017: 1077-1093 - [c148]Grant Ho, Aashish Sharma, Mobin Javed, Vern Paxson, David A. Wagner:
Detecting Credential Spearphishing in Enterprise Settings. USENIX Security Symposium 2017: 469-485 - [c147]Thurston H. Y. Dang, Petros Maniatis, David A. Wagner:
Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers. USENIX Security Symposium 2017: 815-832 - [i19]Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David A. Wagner, Konstantin Beznosov:
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences. CoRR abs/1703.02090 (2017) - [i18]Nicholas Carlini, David A. Wagner:
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods. CoRR abs/1705.07263 (2017) - [i17]Nicholas Carlini, David A. Wagner:
MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples. CoRR abs/1711.08478 (2017) - 2016
- [j17]David A. Wagner:
Fairness and the coin flip: technical perspective. Commun. ACM 59(4): 75 (2016) - [c146]Christopher Thompson, David A. Wagner:
Securing Recognizers for Rich Video Applications. SPSM@CCS 2016: 53-62 - [c145]Grant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, Dawn Song, David A. Wagner:
Smart Locks: Lessons for Securing Commodity Internet of Things Devices. AsiaCCS 2016: 461-472 - [c144]Jethro G. Beekman, John L. Manferdelli, David A. Wagner:
Attestation Transparency: Building secure Internet services for legacy clients. AsiaCCS 2016: 687-698 - [c143]Nathan Malkin, Serge Egelman, David A. Wagner:
Recovering High-Value Secrets with SGX and Social Authentication. WAY@SOUPS 2016 - [c142]Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David A. Wagner, Wenchao Zhou:
Hidden Voice Commands. USENIX Security Symposium 2016: 513-530 - [i16]Nicholas Carlini, David A. Wagner:
Defensive Distillation is Not Robust to Adversarial Examples. CoRR abs/1607.04311 (2016) - [i15]Michael McCoyd, David A. Wagner:
Spoofing 2D Face Detection: Machines See People Who Aren't There. CoRR abs/1608.02128 (2016) - [i14]Nicholas Carlini, David A. Wagner:
Towards Evaluating the Robustness of Neural Networks. CoRR abs/1608.04644 (2016) - 2015
- [c141]Thurston H. Y. Dang, Petros Maniatis, David A. Wagner:
The Performance Cost of Shadow Stacks and Stack Canaries. AsiaCCS 2015: 555-566 - [c140]Rebecca S. Portnoff, Linda Naeun Lee, Serge Egelman, Pratyush Mishra, Derek Leung, David A. Wagner:
Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights. CHI 2015: 1649-1658 - [c139]Nicholas Carlini, Antonio Barresi, Mathias Payer, David A. Wagner, Thomas R. Gross:
Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. USENIX Security Symposium 2015: 161-176 - [c138]Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David A. Wagner, Konstantin Beznosov:
Android Permissions Remystified: A Field Study on Contextual Integrity. USENIX Security Symposium 2015: 499-514 - [i13]Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David A. Wagner, Konstantin Beznosov:
Android Permissions Remystified: A Field Study on Contextual Integrity. CoRR abs/1504.03747 (2015) - [i12]Linda Naeun Lee, Serge Egelman, Joong Hwa Lee, David A. Wagner:
Risk Perceptions for Wearable Devices. CoRR abs/1504.05694 (2015) - 2014
- [c137]David A. Wagner:
Developing Social Capital in Online Communities: The Challenge of Fluidity. AMCIS 2014 - [c136]Serge Egelman, Sakshi Jain, Rebecca S. Portnoff, Kerwell Liao, Sunny Consolvo, David A. Wagner:
Are You Ready to Lock? CCS 2014: 750-761 - [c135]Joshua Tan, Khanh Nguyen, Michael Theodorides, Heidi Negrón-Arroyo, Christopher Thompson, Serge Egelman, David A. Wagner:
The effect of developer-specified explanations for permission requests on smartphone user behavior. CHI 2014: 91-100 - [c134]Nicholas Carlini, David A. Wagner:
ROP is Still Dangerous: Breaking Modern Defenses. USENIX Security Symposium 2014: 385-399 - 2013
- [c133]Elizabeth Ha, David A. Wagner:
Do Android users write about electric sheep? Examining consumer reviews in Google Play. CCNC 2013: 149-157 - [c132]Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler, David A. Wagner:
An Empirical Study on the Effectiveness of Security Code Review. ESSoS 2013: 197-212 - [c131]Cynthia Sturton, Rohit Sinha, Thurston H. Y. Dang, Sakshi Jain, Michael McCoyd, Wei Yang Tan, Petros Maniatis, Sanjit A. Seshia, David A. Wagner:
Symbolic software model validation. MEMOCODE 2013: 97-108 - [c130]Christopher Thompson, Maritza L. Johnson, Serge Egelman, David A. Wagner, Jennifer King:
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources. SOUPS 2013: 1:1-1:14 - [c129]Matthew Finifter, Devdatta Akhawe, David A. Wagner:
An Empirical Study of Vulnerability Rewards Programs. USENIX Security Symposium 2013: 273-288 - [c128]Eric Kim, Nicholas Carlini, Andrew Chang, George Yiu, Kai Wang, David A. Wagner:
Improved Support for Machine-assisted Ballot-level Audits. EVT/WOTE 2013 - [c127]Erika Chin, David A. Wagner:
Bifocals: Analyzing WebView Vulnerabilities in Android Applications. WISA 2013: 138-159 - [p1]Serge Egelman, Adrienne Porter Felt, David A. Wagner:
Choice Architecture and Smartphone Privacy: There's a Price for That. The Economics of Information Security and Privacy 2013: 211-236 - 2012
- [j16]Philip B. Stark, David A. Wagner:
Evidence-Based Elections. IEEE Secur. Priv. 10(5): 33-41 (2012) - [c126]Adrienne Porter Felt, Serge Egelman, David A. Wagner:
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns. SPSM@CCS 2012: 33-44 - [c125]Drew Fisher, Leah Dorner, David A. Wagner:
Short paper: location privacy: user behavior in the field. SPSM@CCS 2012: 51-56 - [c124]David Kantola, Erika Chin, Warren He, David A. Wagner:
Reducing attack surfaces for intra-application communication in android. SPSM@CCS 2012: 69-80 - [c123]Paul Pearce, Adrienne Porter Felt, Gabriel Nunez, David A. Wagner:
AdDroid: privilege separation for applications and advertisers in Android. AsiaCCS 2012: 71-72 - [c122]Rohit Sinha, Cynthia Sturton, Petros Maniatis, Sanjit A. Seshia, David A. Wagner:
Verification with small and short worlds. FMCAD 2012: 68-77 - [c121]Erika Chin, Adrienne Porter Felt, Vyas Sekar, David A. Wagner:
Measuring user confidence in smartphone security and privacy. SOUPS 2012: 1 - [c120]Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, David A. Wagner:
Android permissions: user attention, comprehension, and behavior. SOUPS 2012: 3 - [c119]Patrick Baxter, Anne Edmundson, Keishla Ortiz, Ana Maria Quevedo, Samuel Rodríguez, Cynthia Sturton, David A. Wagner:
Automated Analysis of Election Audit Logs. EVT/WOTE 2012 - [c118]Nicholas Carlini, Adrienne Porter Felt, David A. Wagner:
An Evaluation of the Google Chrome Extension Security Architecture. USENIX Security Symposium 2012: 97-111 - [c117]Adrienne Porter Felt, Serge Egelman, Matthew Finifter, Devdatta Akhawe, David A. Wagner:
How to Ask for Permission. HotSec 2012 - [c116]Kai Wang, Nicholas Carlini, Eric Kim, Ivan Motyashov, Daniel Nguyen, David A. Wagner:
Operator-Assisted Tabulation of Optical Scan Ballots. EVT/WOTE 2012 - [c115]Serge Egelman, Adrienne Porter Felt, David A. Wagner:
Choice Architecture and Smartphone Privacy: There's a Price for That. WEIS 2012 - 2011
- [j15]Moses D. Liskov, Ronald L. Rivest, David A. Wagner:
Tweakable Block Ciphers. J. Cryptol. 24(3): 588-613 (2011) - [c114]Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steve Hanna, David A. Wagner:
A survey of mobile malware in the wild. SPSM@CCS 2011: 3-14 - [c113]Adrienne Porter Felt, Matthew Finifter, Joel Weinberger, David A. Wagner:
Diesel: applying privilege separation to database access. AsiaCCS 2011: 416-422 - [c112]Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David A. Wagner:
Android permissions demystified. CCS 2011: 627-638 - [c111]Erika Chin, Adrienne Porter Felt, Kate Greenwood, David A. Wagner:
Analyzing inter-application communication in Android. MobiSys 2011: 239-252 - [c110]Cynthia Sturton, Matthew Hicks, David A. Wagner, Samuel T. King:
Defeating UCI: Building Stealthy and Malicious Hardware. IEEE Symposium on Security and Privacy 2011: 64-77 - [c109]Theron Ji, Eric Kim, Raji Srikantan, Alan Tsai, Arel Cordero, David A. Wagner:
An Analysis of Write-in Marks on Optical Scan Ballots. EVT/WOTE 2011 - [c108]Adrienne Porter Felt, Kate Greenwood, David A. Wagner:
The Effectiveness of Application Permissions. WebApps 2011 - 2010
- [c107]Adrian Mettler, David A. Wagner, Tyler Close:
Joe-E: A Security-Oriented Subset of Java. NDSS 2010 - [c106]Adrian Mettler, David A. Wagner:
Class properties for security review in an object-capability subset of Java: (short paper). PLAS 2010: 7 - [c105]Arel Cordero, Theron Ji, Alan Tsai, Keaton Mowery, David A. Wagner:
Efficient User-Guided Ballot Image Verification. EVT/WOTE 2010 - [c104]Akshay Krishnamurthy, Adrian Mettler, David A. Wagner:
Fine-grained privilege separation for web applications. WWW 2010: 551-560
2000 – 2009
- 2009
- [j14]Hsin-Yi Tsai, Yu-Lun Huang, David A. Wagner:
A graph approach to quantitative analysis of control-flow obfuscating transformations. IEEE Trans. Inf. Forensics Secur. 4(2): 257-267 (2009) - [c103]Cynthia Sturton, Susmit Jha, Sanjit A. Seshia, David A. Wagner:
On voting machine design for verification and testability. CCS 2009: 463-476 - [c102]Chris Karlof, J. Doug Tygar, David A. Wagner:
Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication. NDSS 2009 - [c101]Chris Karlof, J. D. Tygar, David A. Wagner:
Conditioned-safe ceremonies and a user study of an application to web authentication. SOUPS 2009 - [c100]Erika Chin, David A. Wagner:
Efficient character-level taint tracking for Java. SWS 2009: 3-12 - [c99]David Molnar, Xue Cong Li, David A. Wagner:
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs. USENIX Security Symposium 2009: 67-82 - [c98]Cynthia Sturton, David A. Wagner:
Weight, Weight, Don't Tell Me: Using Scales to Select Ballots for Auditing. EVT/WOTE 2009 - 2008
- [j13]Dan Tsafrir, Tomer Hertz, David A. Wagner, Dilma Da Silva:
Portably solving file races with hardness amplification. ACM Trans. Storage 4(3): 9:1-9:30 (2008) - [j12]Dan Tsafrir, Dilma Da Silva, David A. Wagner:
The Murky Issue of Changing Process Identity: Revising "Setuid Demystified". login Usenix Mag. 33(3) (2008) - [c97]Matthew Finifter, Adrian Mettler, Naveen Sastry, David A. Wagner:
Verifiable functional purity in java. CCS 2008: 161-174 - [c96]Dan Tsafrir, Tomer Hertz, David A. Wagner, Dilma Da Silva:
Portably Solving File TOCTTOU Races with Hardness Amplification. FAST 2008: 189-206 - [c95]Nicolas T. Courtois, Gregory V. Bard, David A. Wagner:
Algebraic and Slide Attacks on KeeLoq. FSE 2008: 97-115 - [c94]Chris Karlof, J. Doug Tygar, David A. Wagner:
A User Study Design for Comparing the Security of Registration Protocols. UPSEC 2008 - [c93]Arel Cordero, David A. Wagner:
Replayable Voting Machine Audit Logs. EVT 2008 - [c92]J. Alex Halderman, Eric Rescorla, Hovav Shacham, David A. Wagner:
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems. EVT 2008 - [e2]David A. Wagner:
Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings. Lecture Notes in Computer Science 5157, Springer 2008, ISBN 978-3-540-85173-8 [contents] - 2007
- [j11]Matt Bishop, David A. Wagner:
Risks of e-voting. Commun. ACM 50(11): 120 (2007) - [c91]Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner:
Dynamic pharming attacks and locked same-origin policies for web browsers. CCS 2007: 58-71 - [c90]Karl Chen, David A. Wagner:
Large-scale analysis of format string vulnerabilities in Debian Linux. PLAS 2007: 75-84 - [c89]Philippe Golle, David A. Wagner:
Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract). S&P 2007: 66-70 - [c88]Nicholas Hopper, David Molnar, David A. Wagner:
From Weak to Strong Watermarking. TCC 2007: 362-382 - [e1]Ray Martinez, David A. Wagner:
2007 USENIX/ACCURATE Electronic Voting Technology Workshop, EVT'07, Boston, MA, USA, August 6, 2007. USENIX Association 2007 [contents] - [i11]Nicolas T. Courtois, Gregory V. Bard, David A. Wagner:
Algebraic and Slide Attacks on KeeLoq. IACR Cryptol. ePrint Arch. 2007: 62 (2007) - 2006
- [j10]Raphael Chung-Wei Phan, David A. Wagner:
Security considerations for incremental hash functions based on pair block chaining. Comput. Secur. 25(2): 131-136 (2006) - [c87]David A. Wagner:
Cryptographic Protocols for Electronic Voting. CRYPTO 2006: 393 - [c86]Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David A. Wagner:
Private Circuits II: Keeping Secrets in Tamperable Circuits. EUROCRYPT 2006: 308-327 - [c85]Umesh Shankar, David A. Wagner:
Preventing Secret Leakage from fork(): Securing Privilege-Separated Applications. ICC 2006: 2268-2275 - [c84]Chris Crutchfield, David Molnar, David Turner, David A. Wagner:
Generic On-Line/Off-Line Threshold Signatures. Public Key Cryptography 2006: 58-74 - [c83]David A. Wagner:
Object capabilities for security. PLAS 2006: 1-2 - [c82]David Molnar, Tadayoshi Kohno, Naveen Sastry, David A. Wagner:
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract). S&P 2006: 365-370 - [c81]Ka-Ping Yee, David A. Wagner, Marti A. Hearst, Steven M. Bellovin:
Prerendered User Interfaces for Higher-Assurance Electronic Voting. EVT 2006 - [i10]David Molnar, Tadayoshi Kohno, Naveen Sastry, David A. Wagner:
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine. IACR Cryptol. ePrint Arch. 2006: 81 (2006) - [i9]Philippe Golle, David A. Wagner:
Cryptanalysis of a Cognitive Authentication Scheme. IACR Cryptol. ePrint Arch. 2006: 258 (2006) - [i8]Nicholas Hopper, David Molnar, David A. Wagner:
From Weak to Strong Watermarking. IACR Cryptol. ePrint Arch. 2006: 430 (2006) - 2005
- [j9]Zhendong Su, David A. Wagner:
A class of polynomially solvable range constraints for interval analysis without widenings. Theor. Comput. Sci. 345(1): 122-138 (2005) - [c80]Benjamin Schwarz, Hao Chen, David A. Wagner, Jeremy Lin, Wei Tu, Geoff Morrison, Jacob West:
Model Checking An Entire Linux Distribution for Security Violations. ACSAC 2005: 13-22 - [c79]Jason Waddle, David A. Wagner:
Fault Attacks on Dual-Rail Encoded Systems. ACSAC 2005: 483-494 - [c78]Lillie Coney, Joseph Lorenzo Hall, Poorvi L. Vora, David A. Wagner:
Towards a privacy measurement criterion for voting systems. DG.O 2005: 287-288 - [c77]David Molnar, Matt Piotrowski, David Schultz, David A. Wagner:
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. ICISC 2005: 156-168 - [c76]Stark C. Draper, Prakash Ishwar, David Molnar, Vinod M. Prabhakaran, Kannan Ramchandran, Daniel Schonberg, David A. Wagner:
An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography. Information Hiding 2005: 327-341 - [c75]David Molnar, Andrea Soppera, David A. Wagner:
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. Selected Areas in Cryptography 2005: 276-290 - [c74]Ari Juels, David Molnar, David A. Wagner:
Security and Privacy Issues in E-passports. SecureComm 2005: 74-88 - [c73]David A. Wagner:
Pushdown Model Checking for Security. SPIN 2005: 1 - [c72]Chris Karlof, Naveen Sastry, David A. Wagner:
Cryptographic Voting Protocols: A Systems Perspective. USENIX Security Symposium 2005 - [c71]David Molnar, Andrea Soppera, David A. Wagner:
Privacy for RFID through trusted computing. WPES 2005: 31-34 - [i7]Ari Juels, David Molnar, David A. Wagner:
Security and Privacy Issues in E-passports. IACR Cryptol. ePrint Arch. 2005: 95 (2005) - [i6]David Molnar, Andrea Soppera, David A. Wagner:
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. IACR Cryptol. ePrint Arch. 2005: 315 (2005) - [i5]David Molnar, Matt Piotrowski, David Schultz, David A. Wagner:
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. IACR Cryptol. ePrint Arch. 2005: 368 (2005) - [i4]Chris Crutchfield, David Molnar, David Turner, David A. Wagner:
Generic On-Line/Off-Line Threshold Signatures. IACR Cryptol. ePrint Arch. 2005: 418 (2005) - 2004
- [j8]Adrian Perrig, John A. Stankovic, David A. Wagner:
Security in wireless sensor networks. Commun. ACM 47(6): 53-57 (2004) - [j7]David R. Jefferson, Aviel D. Rubin, Barbara Simons, David A. Wagner:
Analyzing internet voting security. Commun. ACM 47(10): 59-64 (2004) - [c70]David A. Wagner:
Cryptanalysis of a provably secure CRT-RSA algorithm. CCS 2004: 92-97 - [c69]David Molnar, David A. Wagner:
Privacy and security in library RFID: issues, practices, and architectures. CCS 2004: 210-219 - [c68]Jason Waddle, David A. Wagner:
Towards Efficient Second-Order Power Analysis. CHES 2004: 1-15 - [c67]David A. Wagner:
Towards a Unifying View of Block Cipher Cryptanalysis. FSE 2004: 16-33 - [c66]Mihir Bellare, Phillip Rogaway, David A. Wagner:
The EAX Mode of Operation. FSE 2004: 389-407 - [c65]Hao Chen, Drew Dean, David A. Wagner:
Model Checking One Million Lines of C Code. NDSS 2004 - [c64]David A. Wagner:
Resilient aggregation in sensor networks. SASN 2004: 78-87 - [c63]Chris Karlof, Naveen Sastry, David A. Wagner:
TinySec: a link layer security architecture for wireless sensor networks. SenSys 2004: 162-175 - [c62]Zhendong Su, David A. Wagner:
A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings. TACAS 2004: 280-295 - [c61]Mark Johnson, David A. Wagner, Kannan Ramchandran:
On Compressing Encrypted Data without the Encryption Key. TCC 2004: 491-504 - [c60]Robert Johnson, David A. Wagner:
Finding User/Kernel Pointer Bugs with Type Inference. USENIX Security Symposium 2004: 119-134 - [c59]Nathan Good, David Molnar, Jennifer M. Urban, Deirdre K. Mulligan, Elizabeth Miles, Laura Quilter, David A. Wagner:
Radio frequency Id and privacy with information goods. WPES 2004: 41-42 - [c58]Naveen Sastry, David A. Wagner:
Security considerations for IEEE 802.15.4 networks. Workshop on Wireless Security 2004: 32-42 - 2003
- [j6]Chris Karlof, David A. Wagner:
Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1(2-3): 293-315 (2003) - [j5]Nancy Cam-Winget, Russell Housley, David A. Wagner, Jesse Walker:
Security flaws in 802.11 data link protocols. Commun. ACM 46(5): 35-39 (2003) - [c57]Chris Karlof, David A. Wagner:
Hidden Markov Model Cryptanalysis. CHES 2003: 17-34 - [c56]Yuval Ishai, Amit Sahai, David A. Wagner:
Private Circuits: Securing Hardware against Probing Attacks. CRYPTO 2003: 463-481 - [c55]David A. Wagner:
Cryptanalysis of an Algebraic Privacy Homomorphism. ISC 2003: 234-239 - [c54]Naveen Sastry, Umesh Shankar, David A. Wagner:
Secure verification of location claims. Workshop on Wireless Security 2003: 1-10 - [i3]Mihir Bellare, Phillip Rogaway, David A. Wagner:
EAX: A Conventional Authenticated-Encryption Mode. IACR Cryptol. ePrint Arch. 2003: 69 (2003) - [i2]Phillip Rogaway, David A. Wagner:
A Critique of CCM. IACR Cryptol. ePrint Arch. 2003: 70 (2003) - [i1]David A. Wagner:
A Security Evaluation of Whitenoise. IACR Cryptol. ePrint Arch. 2003: 218 (2003) - 2002
- [c53]Hao Chen, David A. Wagner:
MOPS: an infrastructure for examining security properties of software. CCS 2002: 235-244 - [c52]David A. Wagner, Paolo Soto:
Mimicry attacks on host-based intrusion detection systems. CCS 2002: 255-264 - [c51]Moses D. Liskov, Ronald L. Rivest, David A. Wagner:
Tweakable Block Ciphers. CRYPTO 2002: 31-46 - [c50]David A. Wagner:
A Generalized Birthday Problem. CRYPTO 2002: 288-303 - [c49]Robert Johnson, David Molnar, Dawn Xiaodong Song, David A. Wagner:
Homomorphic Signature Schemes. CT-RSA 2002: 244-262 - [c48]Nikita Borisov, Monica Chew, Robert Johnson, David A. Wagner:
Multiplicative Differentials. FSE 2002: 17-33 - [c47]Lars R. Knudsen, David A. Wagner:
Integral Cryptanalysis. FSE 2002: 112-127 - [c46]Stephen Thomas, David A. Wagner:
Insecurity in ATM-based passive optical networks. ICC 2002: 2803-2805 - [c45]Will Ivancic, David A. Wagner, Aviel D. Rubin, E. Paul Ratazzi, James P. G. Sterbenz:
Securing Wireless and Mobile Networks - Is It Possible? INFOCOM 2002 - [c44]Dawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David A. Wagner:
Cool security trends. SACMAT 2002: 53 - [c43]Ben Reichardt, David A. Wagner:
Markov Truncated Differential Cryptanalysis of Skipjack. Selected Areas in Cryptography 2002: 110-128 - [c42]Hao Chen, David A. Wagner, Drew Dean:
Setuid Demystified. USENIX Security Symposium 2002: 171-190 - 2001
- [j4]Lars R. Knudsen, David A. Wagner:
On the structure of Skipjack. Discret. Appl. Math. 111(1-2): 103-116 (2001) - [c41]Scott A. Crosby, Ian Goldberg, Robert Johnson, Dawn Xiaodong Song, David A. Wagner:
A Cryptanalysis of the High-Bandwidth Digital Content Protection System. Digital Rights Management Workshop 2001: 192-200 - [c40]Andre Scedrov, Ran Canetti, Joshua D. Guttman, David A. Wagner, Michael Waidner:
Relating Cryptography and Cryptographic Protocols. CSFW 2001: 111-114 - [c39]Nikita Borisov, Ian Goldberg, David A. Wagner:
Intercepting mobile communications: the insecurity of 802.11. MobiCom 2001: 180-189 - [c38]David A. Wagner:
Static Analysis and Software Assurance. SAS 2001: 431 - [c37]David A. Wagner, Drew Dean:
Intrusion Detection via Static Analysis. S&P 2001: 156-168 - [c36]Umesh Shankar, Kunal Talwar, Jeffrey S. Foster, David A. Wagner:
Detecting Format String Vulnerabilities with Type Qualifiers. USENIX Security Symposium 2001 - [c35]Dawn Xiaodong Song, David A. Wagner, Xuqing Tian:
Timing Analysis of Keystrokes and Timing Attacks on SSH. USENIX Security Symposium 2001 - 2000
- [j3]John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Side Channel Cryptanalysis of Product Ciphers. J. Comput. Secur. 8(2/3): 141-158 (2000) - [c34]Niels Ferguson, Bruce Schneier, David A. Wagner:
Security Weaknesses in a Randomized Stream Cipher. ACISP 2000: 234-241 - [c33]Bruce Schneier, John Kelsey, Doug Whiting, David A. Wagner, Niels Ferguson:
Comments on Twofish as an AES Candidate. AES Candidate Conference 2000: 355-356 - [c32]David A. Wagner:
Cryptanalysis of the Yi-Lam Hash. ASIACRYPT 2000: 483-488 - [c31]David A. Wagner, Ian Goldberg:
Proofs of Security for the Unix Password Hashing Algorithm. ASIACRYPT 2000: 560-572 - [c30]Alex Biryukov, David A. Wagner:
Advanced Slide Attacks. EUROCRYPT 2000: 589-606 - [c29]Alex Biryukov, Adi Shamir, David A. Wagner:
Real Time Cryptanalysis of A5/1 on a PC. FSE 2000: 1-18 - [c28]Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Michael Stay, David A. Wagner, Doug Whiting:
Improved Cryptanalysis of Rijndael. FSE 2000: 213-230 - [c27]David A. Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken:
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities. NDSS 2000 - [c26]Dawn Xiaodong Song, David A. Wagner, Adrian Perrig:
Practical Techniques for Searches on Encrypted Data. S&P 2000: 44-55
1990 – 1999
- 1999
- [c25]Bruce Schneier, Mudge, David A. Wagner:
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2). CQRE 1999: 192-203 - [c24]Lars R. Knudsen, Matthew J. B. Robshaw, David A. Wagner:
Truncated Differentials and Skipjack. CRYPTO 1999: 165-180 - [c23]John Kelsey, Bruce Schneier, David A. Wagner:
Mod n Cryptanalysis, with Applications Against RC5P and M6. FSE 1999: 139-155 - [c22]David A. Wagner:
The Boomerang Attack. FSE 1999: 156-170 - [c21]Alex Biryukov, David A. Wagner:
Slide Attacks. FSE 1999: 245-259 - [c20]Ian Goldberg, Steven D. Gribble, David A. Wagner, Eric A. Brewer:
The Ninja Jukebox. USENIX Symposium on Internet Technologies and Systems 1999 - 1998
- [j2]Ian Goldberg, David A. Wagner:
TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web. First Monday 3(4) (1998) - [c19]Chris Hall, David A. Wagner, John Kelsey, Bruce Schneier:
Building PRFs from PRPs. CRYPTO 1998: 370-389 - [c18]John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Side Channel Cryptanalysis of Product Ciphers. ESORICS 1998: 97-110 - [c17]Chris Hall, John Kelsey, Bruce Schneier, David A. Wagner:
Cryptanalysis of SPEED. Financial Cryptography 1998: 309-310 - [c16]Don Coppersmith, David A. Wagner, Bruce Schneier, John Kelsey:
Cryptanalysis of TWOPRIME. FSE 1998: 32-48 - [c15]John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Cryptanalytic Attacks on Pseudorandom Number Generators. FSE 1998: 168-188 - [c14]David A. Wagner:
Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation. FSE 1998: 254-269 - [c13]David A. Wagner:
Differential Cryptanalysis of KHF. FSE 1998: 293-296 - [c12]Bruce Schneier, John Kelsey, Doug Whiting, David A. Wagner, Chris Hall:
On the Twofish Key Schedule. Selected Areas in Cryptography 1998: 27-42 - [c11]David A. Wagner, Leonie Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier:
Cryptanalysis of ORYX. Selected Areas in Cryptography 1998: 296-305 - [c10]Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David A. Wagner:
Cryptanalysis of SPEED. Selected Areas in Cryptography 1998: 319-338 - 1997
- [c9]Ian Goldberg, David A. Wagner, Eric A. Brewer:
Privacy-enhancing technologies for the Internet. COMPCON 1997: 103-109 - [c8]David A. Wagner, Bruce Schneier, John Kelsey:
Cryptanalysis of the Cellular Encryption Algorithm. CRYPTO 1997: 526-537 - [c7]John Kelsey, Bruce Schneier, David A. Wagner:
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. ICICS 1997: 233-246 - [c6]John Kelsey, Bruce Schneier, Chris Hall, David A. Wagner:
Secure Applications of Low-Entropy Keys. ISW 1997: 121-134 - [c5]John Kelsey, Bruce Schneier, David A. Wagner:
Protocol Interactions and the Chosen Protocol Attack. Security Protocols Workshop 1997: 91-104 - 1996
- [j1]Eric M. Gross, David A. Wagner:
KD trees and Delaunay-based linear interpolation for function learning: a comparison to neural networks with error backpropagation. IEEE Trans. Control. Syst. Technol. 4(6): 649-653 (1996) - [c4]John Kelsey, Bruce Schneier, David A. Wagner:
Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. CRYPTO 1996: 237-251 - [c3]David A. Wagner, Steven M. Bellovin:
A "bump in the stack" encryptor for MS-DOS systems. NDSS 1996: 155-161 - [c2]Ian Goldberg, David A. Wagner, Randi Thomas, Eric A. Brewer:
A Secure Environment for Untrusted Helper Applications. USENIX Security Symposium 1996 - 1993
- [c1]Dirk Grunwald, Gary J. Nutt, Anthony M. Sloane, David A. Wagner, Benjamin G. Zorn:
A Testbed for Studying Parallel Programs and Parallel Execution Architectures. MASCOTS 1993: 95-106
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint