Robotics-Based Location Sensing Using Wireless Ethernet
Ladd, Andrew M., Bekris, Kostas E., Rudys, Algis, Kavraki, Lydia E., Wallach, Dan S.
Published in Wireless networks (01.01.2005)
Published in Wireless networks (01.01.2005)
Get full text
Journal Article
How Human Factors Can Help Preserve Democracy in the Age of Pandemics
Kortum, Philip, Stein, Robert, Acemyan, Claudia Ziegler, Wallach, Dan S., Vann, Elizabeth
Published in Human factors (01.11.2020)
Published in Human factors (01.11.2020)
Get full text
Journal Article
2FA Might Be Secure, But It’s Not Usable: A Summative Usability Assessment of Google’s Two-factor Authentication (2FA) Methods
Acemyan, Claudia Ziegler, Kortum, Philip, Xiong, Jeffrey, Wallach, Dan S.
Published in Proceedings of the Human Factors and Ergonomics Society Annual Meeting (01.09.2018)
Published in Proceedings of the Human Factors and Ergonomics Society Annual Meeting (01.09.2018)
Get full text
Journal Article
Analysis of an electronic voting system
Kohno, T., Stubblefield, A., Rubin, A.D., Wallach, D.S.
Published in IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004 (2004)
Published in IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004 (2004)
Get full text
Conference Proceeding
Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching
Majzoobi, M., Rostami, M., Koushanfar, F., Wallach, D. S., Devadas, S.
Published in 2012 IEEE Symposium on Security and Privacy Workshops (01.05.2012)
Published in 2012 IEEE Symposium on Security and Privacy Workshops (01.05.2012)
Get full text
Conference Proceeding
Managing the Performance Impact of Web Security
Stubblefield, Adam, Rubin, Aviel D., Wallach, Dan S.
Published in Electronic commerce research (01.01.2005)
Published in Electronic commerce research (01.01.2005)
Get full text
Journal Article
Scrivener: Providing Incentives in Cooperative Content Distribution Systems
Nandi, Animesh, Ngan, Tsuen-Wan “Johnny”, Singh, Atul, Druschel, Peter, Wallach, Dan S.
Published in Lecture notes in computer science (2005)
Published in Lecture notes in computer science (2005)
Get full text
Book Chapter
Conference Proceeding
Scaling Up Anonymous Communication with Efficient Nanopayment Channels
Dinh, Thien-Nam, Rochet, Florentin, Pereira, Olivier, Wallach, Dan S.
Published in Proceedings on Privacy Enhancing Technologies (01.07.2020)
Published in Proceedings on Privacy Enhancing Technologies (01.07.2020)
Get full text
Journal Article
On the feasibility of using wireless ethernet for indoor localization
Ladd, A.M., Bekris, K.E., Rudys, A.P., Wallach, D.S., Kavraki, L.E.
Published in IEEE transactions on robotics and automation (01.06.2004)
Published in IEEE transactions on robotics and automation (01.06.2004)
Get full text
Journal Article
Eclipse Attacks on Overlay Networks: Threats and Defenses
Singh, A., Ngan, T.-W., Druschel, P., Wallach, D. S.
Published in Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications (01.04.2006)
Published in Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications (01.04.2006)
Get full text
Conference Proceeding
Understanding Java stack inspection
Wallach, Dan S, Felten, Edward W
Published in Proceedings - IEEE Computer Society Symposium on Research in Security and Privacy (01.01.1998)
Get full text
Published in Proceedings - IEEE Computer Society Symposium on Research in Security and Privacy (01.01.1998)
Journal Article
Java security: from HotJava to netscape and beyond
Dean, Drew, Felten, Edward W, Wallach, Dan S
Published in Proceedings - IEEE Computer Society Symposium on Research in Security and Privacy (01.01.1996)
Get full text
Published in Proceedings - IEEE Computer Society Symposium on Research in Security and Privacy (01.01.1996)
Journal Article