dwallach.bib

@incollection{DFWB97,
  author = {Drew Dean and Edward W. Felten and Dan S. Wallach and Dirk Balfanz},
  title = {{Java} Security: Web Browsers and Beyond},
  booktitle = {Internet Besieged: Countering Cyberspace Scofflaws},
  editor = {Dorothy E. Denning and Peter J. Denning},
  year = 1997,
  month = oct,
  publisher = {{ACM} Press},
  address = {New York, NY},
  pages = {241--269},
  url = {https://dl.acm.org/doi/10.5555/275737.275753}
}
@inproceedings{wallach-dimacs97,
  author = {Dan S. Wallach and Jim A. Roskind and Edward W. Felten},
  title = {Flexible, Extensible {Java} Security Using Digital
                  Signatures},
  booktitle = {{DIMACS} Workshop on Network Threats},
  series = {{DIMACS} Series in Discrete Mathematics and
                  Theoretical Computer Science},
  month = dec,
  year = 1996,
  publisher = {American Mathematical Society}
}
@inproceedings{wallach97,
  author = {Dan S. Wallach and Dirk Balfanz and Drew Dean and Edward W. Felten},
  title = {Extensible Security Architectures for {Java}},
  booktitle = {Proceedings of the Sixteenth {ACM} Symposium on Operating System Principles},
  year = 1997,
  address = {Saint-Malo, France},
  month = oct,
  note = {Outstanding paper award},
  url = {https://www.cs.rice.edu/~dwallach/pub/sosp97.pdf}
}
@inproceedings{wallach98,
  author = {Dan S. Wallach and Edward W. Felten},
  title = {Understanding {J}ava Stack Inspection},
  booktitle = {Proceedings of the 1998 {IEEE} Symposium on Security and Privacy},
  month = may,
  year = 1998,
  address = {Oakland, CA},
  pages = {52--63},
  url = {https://www.cs.rice.edu/~dwallach/pub/oakland98.pdf}
}
@phdthesis{wallach-phd,
  author = {Dan S. Wallach},
  title = {A New Approach to Mobile Code Security},
  school = {Princeton University},
  year = 1999,
  address = {Princeton, NJ},
  month = jan,
  url = {https://www.cs.rice.edu/~dwallach/pub/dwallach-thesis.pdf}
}
@inproceedings{fudico04,
  author = {Tsuen-Wan ``Johnny'' Ngan and Animesh Nandi and Atul Singh and Dan S. Wallach and Peter Druschel},
  title = {Designing Incentives-Compatible Peer-to-Peer Systems},
  booktitle = {2nd Bertinoro Workshop on Future Directions in Distributed Computing (FuDiCo 2004)},
  year = 2004,
  address = {Bertinoro, Italy},
  month = jun,
  url = {https://www.cs.rice.edu/~dwallach/pub/fudico2004.html}
}
@inproceedings{coarfa-ndss2002,
  author = {Cristian Coarfa and Peter Druschel and Dan S. Wallach},
  title = {Performance Analysis of {TLS} {Web} Servers},
  year = {2002},
  month = feb,
  booktitle = {Proceedings of the 2002 Network and Distributed System Security Symposium},
  address = {San Diego, CA},
  url = {https://www.cs.rice.edu/~dwallach/pub/ndss2002.html}
}
@article{coarfa2006,
  author = {Cristian Coarfa and Peter Druschel and Dan S. Wallach},
  title = {Performance Analysis of TLS Web Servers},
  journal = {ACM Transactions on Computer Systems},
  volume = 24,
  number = 1,
  month = feb,
  year = 2006,
  url = {https://www.cs.rice.edu/~dwallach/pub/tls-tocs.pdf}
}
@inproceedings{ladd-wireless-iros2002,
  author = {Andrew M. Ladd and Kostas E. Bekris and Guillaume Marceau and Algis Rudys and Dan S. Wallach and Lydia E. Kavraki},
  title = {Using Wireless {Ethernet} for Localization},
  booktitle = {2002 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2002)},
  year = 2002,
  address = {Lausanne, Switzerland},
  month = oct,
  url = {https://www.cs.rice.edu/~dwallach/pub/ladd2002wireless-ethernet-localization.pdf}
}
@article{ladd-wireless-tra2004,
  author = {Andrew M. Ladd and Kostas E. Bekris and Algis Rudys and Dan S. Wallach and Lydia E. Kavraki},
  title = {On the Feasibility of Using Wireless {Ethernet} for Localization},
  journal = {IEEE Transactions on Robotics and Automation},
  year = 2004,
  volume = 20,
  number = 3,
  month = jun,
  pages = {555--559},
  url = {https://www.cs.rice.edu/~dwallach/pub/localization-tra04.pdf}
}
@article{ladd05,
  author = {Andrew M. Ladd and Kostas E. Bekris and Algis Rudys and Lydia E. Kavraki and Dan S. Wallach},
  title = {Robotics-Based Location Sensing Using Wireless {Ethernet}},
  journal = {Wireless Networks},
  volume = 11,
  number = {1-2},
  month = jan,
  year = 2005,
  url = {http://link.springer.com/article/10.1007\%2Fs11276-004-4755-8}
}
@inproceedings{ladd-wireless-mobicom2002,
  author = {Andrew M. Ladd and Kostas E. Bekris and Guillaume Marceau and Algis Rudys and Lydia E. Kavraki and Dan S. Wallach},
  title = {Robotics-Based Location Sensing using Wireless {Ethernet}},
  booktitle = {Eighth ACM International Conference on Mobile Computing and Networking (MOBICOM 2002)},
  year = 2002,
  address = {Atlanta, Georgia},
  month = sep,
  url = {https://www.cs.rice.edu/~dwallach/pub/ladd2002robot-locate-wireless-ethernet.pdf}
}
@inproceedings{tao-wireless2003,
  author = {Ping Tao and Algis Rudys and Andrew Ladd and Dan S. Wallach},
  title = {Wireless {LAN} Location Sensing for Security Applications},
  booktitle = {ACM Workshop on Wireless Security (WiSe 2003)},
  year = 2003,
  address = {San Diego, CA},
  month = sep,
  url = {https://www.cs.rice.edu/~dwallach/pub/wise2003.html}
}
@misc{testimony-senate-2007,
  author = {Dan S. Wallach},
  title = {Testimony Before the Senate Committee on Rules and Administration, Hearing on Electronic Election Reform},
  month = feb,
  year = 2007,
  address = {Washington, DC},
  url = {http://accurate-voting.rice.edu/wp-content/uploads/2007/04/dwallach-senate-testimony-7feb07.pdf}
}
@article{star2013,
  author = {Susan Bell and Josh Benaloh and Michael D. Byrne and Dana DeBeauvoir and Bryce Eakin and Gail Fisher and Philip Kortum and Neal McBurnett and Julian Montoya Michelle Parker and Olivier Pereira and Philip B. Stark and Dan S. Wallach and Michael Winn},
  title = {{STAR-Vote}: A Secure, Transparent, Auditable, and Reliable Voting System},
  journal = {USENIX Journal of Election Technology and Systems (JETS)},
  volume = 1,
  number = 1,
  month = aug,
  year = 2013,
  url = {https://www.usenix.org/conference/evtwote13/star-vote-secure-transparent-auditable-and-reliable-voting-system}
}
@misc{ftc2012,
  author = {Dan S. Wallach},
  title = {Privacy and Tracking on the Internet},
  organization = {FTC Workshop on The Big Picture: Comprehensive Data Collection},
  address = {Washington, DC},
  month = dec,
  year = 2012
}
@article{sharman2021,
  author = {Jonathan Sharman and Claudia Ziegler Acemyan and Philip Kortum and Dan S. Wallach},
  title = {Good examples help; bad tools hurt: Lessons for teaching computer security skills to undergraduates},
  journal = {International Journal of Computer Science Education in Schools},
  year = 2021,
  volume = 5,
  number = 2,
  pages = {74--92},
  month = dec,
  url = {https://www.ijcses.org/index.php/ijcses/article/view/131},
  doi = {10.21585/ijcses.v5i2.131}
}
@misc{ukraine2022,
  author = { Christopher Bronk and Gabriel Collins and Dan S. Wallach},
  title = {Cyber and information warfare in {Ukraine}: What do we know seven months in?},
  organization = {Rice University's Baker Institute for Public Policy},
  address = {Houston, TX},
  month = sep,
  year = 2022,
  doi = {https://doi.org/10.25613/69E1-WZ16},
  url = {https://www.bakerinstitute.org/research/cyber-and-information-warfare-ukraine-what-do-we-know-seven-months},
  note = {Baker Institute Issue Brief 09.06.22}
}
@article{rla-brief2022,
  author = {Matthew Bernhard and Dan S. Wallach},
  title = {{ACM TechBrief}: Election Security - Risk-Limiting Audits},
  journal = {ACM Technology Policy Council},
  year = 2022,
  number = 5,
  month = oct
}
@inproceedings{chi-tls-usability-2019,
  author = {Matthew Bernhard and Jonathan Sharman and Claudia
                  Ziegler Acemyan and Philip Kortum and Dan S. Wallach
                  and J. Alex Halderman},
  title = {On the Usability of {HTTPS} Deployment},
  booktitle = {ACM CHI Conference on Human Factors in Computing Systems},
  year = 2019,
  month = may,
  address = {Glasgow, Scotland}
}
@inproceedings{android-forensics-2019,
  author = {Jaeho Lee and Ang Chen and Dan S. Wallach},
  title = {Total Recall: Persistence of Passwords in {Android}},
  booktitle = {Network and Distributed Systems Security Symposium (NDSS '19)},
  year = 2019,
  month = feb,
  address = {San Diego, CA},
  url = {https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2019_06A-4_Lee_paper.pdf}
}
@inproceedings{seandroid-2018,
  author = {Bumjin Im and Ang Chen and Dan S. Wallach},
  title = {An Historical Analysis of the {SEAndroid} Policy Evolution},
  booktitle = {Annual Computer Security Applications Conference (ACSAC) 2018},
  year = 2018,
  month = dec,
  address = {San Juan, Puerto Rico},
  url = {https://www.cs.rice.edu/~dwallach/pub/acsac-2018.pdf}
}
@article{star-summative-2018,
  author = {Claudia Ziegler Acemyan and Philip Kortum and Michael D. Byrne and Dan S. Wallach},
  title = {Summative Usability Assessments of {STAR-Vote}: A Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use},
  journal = {Human Factors},
  pages = {0018720818812586},
  year = {2018},
  month = dec,
  doi = {10.1177/0018720818812586},
  url = {https://www.cs.rice.edu/~dwallach/pub/star-summative-2018.pdf},
  eprint = {https://doi.org/10.1177/0018720818812586}
}
@article{usable-2fa-2018,
  author = {Claudia Ziegler Acemyan and Philip Kortum and Jeffrey Xiong and Dan S. Wallach},
  title = {{2FA} Might Be Secure, But It’s Not Usable: A Summative Usability Assessment of Google’s Two-factor Authentication ({2FA}) Methods},
  journal = {Proceedings of the Human Factors and Ergonomics Society Annual Meeting},
  volume = {62},
  number = {1},
  pages = {1141-1145},
  year = {2018},
  doi = {10.1177/1541931218621262},
  url = {https://www.cs.rice.edu/~dwallach/pub/2fa-usability-2018.pdf},
  eprint = {https://doi.org/10.1177/1541931218621262}
}
@article{DBLP:journals/corr/RiaziCSWK16,
  author = {M. Sadegh Riazi and
               Beidi Chen and
               Anshumali Shrivastava and
               Dan S. Wallach and
               Farinaz Koushanfar},
  title = {Sub-linear Privacy-preserving Search with Untrusted Server and Semi-honest
               Parties},
  journal = {CoRR},
  volume = {abs/1612.01835},
  year = {2016},
  url = {http://arxiv.org/abs/1612.01835},
  archiveprefix = {arXiv},
  eprint = {1612.01835},
  timestamp = {Wed, 07 Jun 2017 14:40:30 +0200},
  biburl = {https://dblp.org/rec/bib/journals/corr/RiaziCSWK16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{star-telegram-oped-2018,
  author = {Dan S. Wallach},
  title = {We need to protect against vote tampering},
  url = {http://www.star-telegram.com/opinion/opn-columns-blogs/other-voices/article206853604.html},
  journal = {Fort Worth Star-Telegram},
  year = 2018,
  month = mar
}
@misc{testimony-texas-senate-feb18,
  author = {Dan S. Wallach},
  title = {Testimony for the {Texas Senate Select Committee on Election Security}},
  month = feb,
  year = 2018,
  address = {Austin, TX},
  url = {https://www.cs.rice.edu/~dwallach/pub/texas-senate-feb2018.pdf}
}
@inproceedings{android-forensics-2018,
  author = {Jaeho Lee and Dan S. Wallach},
  title = {Removing Secrets from {Android's} {TLS}},
  booktitle = {Network and Distributed Systems Security Symposium (NDSS '18)},
  year = 2018,
  month = feb,
  address = {San Diego, CA},
  url = {https://www.ndss-symposium.org/wp-content/uploads/sites/25/2018/02/ndss2018_01B-3_Lee_paper.pdf}
}
@article{houston-chron-harris-votes-2017,
  author = {Dan S. Wallach},
  title = {Up for debate: Is {Harris County's} vote safe from the {Russians}?},
  journal = {Houston Chronicle},
  year = 2017,
  month = jul,
  url = {http://www.houstonchronicle.com/local/gray-matters/article/Is-Harris-County-s-voting-system-ready-for-the-11297533.php}
}
@article{wired-eac-2017,
  author = {Dan S. Wallach and Justin Talbot-Zorn},
  title = {Want secure elections? Then maybe don't cut security funding},
  journal = {Wired},
  year = 2017,
  month = feb,
  url = {https://www.wired.com/2017/02/want-secure-elections-maybe-dont-cut-security-funding/}
}
@inproceedings{evidence-from-ballots2017,
  author = {Matthew Bernhard and J. Alex Halderman and Ronald Rivest and Poorvi Vora and Peter Ryan and Vanessa Teague and Josh Benaloh and Philip Stark and Dan S. Wallach},
  title = {Public evidence from secret ballots},
  booktitle = {The International Conference for Electronic Voting (E-Vote-ID '17)},
  year = 2017,
  month = oct,
  address = {Bregenz, Austria},
  url = {https://mbernhard.com/papers/voting-sok.pdf}
}
@inproceedings{clash-star2017,
  author = {Olivier Pereira and Dan S. Wallach},
  title = {Clash attacks and the {STAR-Vote} system},
  booktitle = {The International Conference for Electronic Voting (E-Vote-ID '17)},
  year = 2017,
  month = oct,
  address = {Bregenz, Austria},
  url = {https://www.cs.rice.edu/~dwallach/pub/clash-star-2017.pdf}
}
@inproceedings{dfwrs-gc17,
  author = {Adam Pridgen and Simson Garfinkel and Dan S. Wallach},
  title = {Picking up the trash: exploiting generational {GC} for memory analysis},
  booktitle = {Proceedings of the Fourth Annual DFRWS Europe (DFWRS-EU '17)},
  year = 2017,
  month = mar,
  address = {Lake Constance, Germany},
  url = {https://www.dfrws.org/sites/default/files/session-files/paper_picking_up_the_trash_-_exploiting_generational_gc_for_memory_analysis.pdf}
}
@inproceedings{star-ifm17,
  author = {Murat Moran and Dan S. Wallach},
  title = {Verification of {STAR-Vote} and Evaluation of {FDR} and {ProVerif}},
  booktitle = {13th International Conference on Integrated Formal Methods (iFM 2017)},
  year = 2017,
  month = sep,
  address = {Torino, Italy},
  url = {https://www.cs.rice.edu/~dwallach/pub/star-verification-2017.pdf}
}
@inproceedings{foci2017,
  author = {Rima Tanash and Zhouhan Chen and Dan S. Wallach and Melissa Marschall},
  title = {The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed {Turkish} Coup},
  booktitle = {7th USENIX Workshop on Free and Open Communications on the Internet (FOCI '17)},
  year = 2017,
  month = aug,
  address = {Vancouver, B.C., Canada},
  url = {https://www.usenix.org/system/files/conference/foci17/foci17-paper-tanash.pdf}
}
@inproceedings{hicss2017,
  title = {Present but unreachable: reducing persistent latent secrets in {HotSpot JVM}},
  author = {Adam Pridgen and Simson Garfinkel and Dan S. Wallach},
  booktitle = {Hawaii International Conference on System Sciences (HICSS-50)},
  url = {https://www.cs.rice.edu/~dwallach/pub/persistent-but-reachable.pdf},
  month = jan,
  year = 2017
}
@incollection{voting-book2016,
  author = {Susan Bell and Josh Benaloh and Michael D. Byrne and Dana DeBeauvoir and Bryce Eakin and Gail Fisher and Philip Kortum and Neal McBurnett and Julian Montoya Michelle Parker and Olivier Pereira and Philip B. Stark and Dan S. Wallach and Michael Winn},
  title = {{STAR-Vote}: A Secure, Transparent, Auditable, and Reliable Voting System},
  booktitle = {Real-World Electronic Voting: Design, Analysis, and Deployment},
  editor = {Feng Hao and Peter Y. A. Ryan},
  year = 2016,
  month = dec,
  publisher = {{CRC} Press},
  url = {https://www.crcpress.com/Real-world-Electronic-Voting-Design-Analysis-and-Deployment/Hao-Ryan/p/book/9781498714693}
}
@misc{congress2016,
  author = {Dan S. Wallach},
  title = {Testimony Before the {House Committee on Space, Science \& Technology} Hearing, ``{Protecting the 2016 Elections from Cyber and Voting Machine Attacks}''},
  month = sep,
  year = 2016,
  address = {Washington, D.C.},
  url = {https://www.cs.rice.edu/~dwallach/pub/us-house-sst-voting-13sept2016.pdf}
}
@article{chinese-social-media2016,
  title = {Inferring Atmospheric Particulate Matter Concentrations from {Chinese} Social Media Data},
  author = {Zhu Tao and Aynne Kokas and Rui Zhang and Daniel S. Cohan and Dan S. Wallach},
  journal = {PLOS One},
  month = sep,
  year = 2016,
  url = {http://dx.doi.org/10.1371/journal.pone.0161389}
}
@inproceedings{polmeth2016,
  author = {R. S. Tanash and A. Aydoga and Z. Chen and D. S. Wallach and M. Marschall and D. Subramanian and C. Bronk},
  title = {Detecting Influential Users and Communities in Censored Tweets Using Data-Flow Graphs},
  booktitle = {Proceedings of the 33rd Annual Meeting of the Society for Political Methodology (POLMETH 2016)},
  year = 2016,
  address = {Houston, TX},
  url = {http://www.cs.rice.edu/~rst5/twitterTurkey/PolMeth%20Paper%20rev2.pdf}
}
@inproceedings{apsa2016,
  author = {R. S. Tanash and A. Aydoga and Z. Chen and D. S. Wallach and M. Marschall and D. Subramanian and C. Bronk},
  title = {The Dynamics of Social Media Censorship in Transitioning Democracies},
  booktitle = {The 2016 APSA Conference (Divison of Political Elites and Social Media, and Information Technology and Politics)},
  year = 2016,
  address = {Philadelphia, PA},
  url = {https://convention2.allacademic.com/one/apsa/apsa16/index.php?cmd=Online+Program+View+Paper&selected_paper_id=1128566}
}
@inproceedings{fociwww,
  author = {Nicholas Aase and Jedidiah R. Crandall and Alvaro Diaz and Jeffrey Knockel and Jorge Ocana Molinero and Jared Saia and Dan Wallach and Tao Zhu},
  title = {Whiskey, Weed, and Wukan on the {World Wide Web}:  On Measuring Censors' Resources and Motivations},
  booktitle = {FOCI 12: Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet},
  year = {2012},
  url = {https://www.usenix.org/conference/foci12/whiskey-weed-and-wukan-world-wide-web-things-research-online-while-eating}
}
@article{taozhu,
  author = {Tao Zhu and Chris Bronk and Dan S. Wallach},
  title = {An Analysis of Chinese Search Engine Filtering},
  journal = {CoRR},
  volume = {abs/1107.3794},
  year = {2011},
  url = {http://arxiv.org/abs/1107.3794}
}
@inproceedings{quire11,
  author = {Michael Dietz and Shashi Shekhar and Yuliy Pisetsky and Anhei Shu and Dan S. Wallach},
  title = {Quire: Lightweight Provenance for Smart Phone Operating Systems},
  booktitle = {21st USENIX Security Symposium},
  year = 2011,
  address = {San Francisco, CA},
  month = aug,
  url = {https://www.cs.rice.edu/~dwallach/pub/quire2011.html}
}
@inproceedings{spoofing97,
  author = {Edward W. Felten and Dirk Balfanz and Drew Dean and Dan S. Wallach},
  title = {Web Spoofing: An {Internet} Con Game},
  booktitle = {20th National Information Systems Security Conference},
  year = 1997,
  address = {Baltimore, Maryland},
  month = oct,
  url = {http://www.csl.sri.com/users/ddean/papers/spoofing.pdf}
}
@article{Hu03,
  author = {Y. Charlie Hu and Weimin Yu and Alan L. Cox and Dan S. Wallach and Willy Zwaenepoel},
  title = {Runtime Support for Distributed Sharing in Safe Languages},
  journal = {ACM Transactions on Computer Systems},
  volume = {21},
  number = {1},
  year = {2003},
  url = {http://www.ece.purdue.edu/~ychu/publications/tocs.pdf}
}
@inproceedings{everett08chi-dre-usability,
  address = {Florence, Italy},
  author = {Sarah Everett and Kristen Greene and Michael Byrne and Dan Wallach and Kyle Derr and Daniel Sandler and Ted Torous},
  booktitle = {Proceedings of {CHI} 2008},
  month = apr,
  title = {Is Newer Always Better? {The} Usability of Electronic Voting Machines versus Traditional Methods},
  url = {http://www.chi2008.org/ap/112.html},
  year = 2008
}
@manual{dill07sarasota,
  author = {David L. Dill and Dan S. Wallach},
  month = apr,
  title = {Stones Unturned: Gaps in the Investigation of Sarasota's Disputed Congressional Election},
  url = {https://www.cs.rice.edu/~dwallach/pub/sarasota07.html},
  year = {2007}
}
@inproceedings{sandler07auditorium,
  address = {Boston, MA},
  author = {Daniel R. Sandler and Dan S. Wallach},
  booktitle = {Proceedings of the 2nd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '07)},
  month = aug,
  title = {Casting Votes in the {Auditorium}},
  url = {http://accurate-voting.rice.edu/wp-content/uploads/2007/08/evt07-sandler.pdf},
  year = {2007}
}
@unpublished{wallach06webbco,
  author = {Dan S. Wallach},
  month = may,
  note = {Expert Report in {\em Flores v. Lopez}},
  title = {{Security and Reliability of Webb County's ES\&S Voting System and the March '06 Primary Election}},
  url = {http://accurate-voting.rice.edu/wp-content/uploads/2006/09/webb-report2.pdf},
  year = {2006}
}
@inproceedings{kohno04analysis,
  address = {Oakland, CA},
  author = {Tadayoshi Kohno and Adam Stubblefield and Aviel D. Rubin and Dan S. Wallach},
  booktitle = {Proceedings of the 2004 {IEEE} Symposium on Security and Privacy},
  url = {http://doi.ieeecomputersociety.org/10.1109/SECPRI.2004.1301313},
  issn = {1540-7993},
  journal = {IEEE Security \& Privacy Magazine},
  title = {Analysis of an Electronic Voting System},
  year = {2004}
}
@manual{ca-hart-src07,
  author = {Srinivas Inguva and Eric Rescorla and Hovav Shacham and Dan S. Wallach},
  month = jul,
  organization = {California Secretary of State's ``Top to Bottom'' Review},
  title = {Source Code Review of the {Hart} {InterCivic} Voting System},
  url = {http://votingsystems.cdn.sos.ca.gov/oversight/ttbr/Hart-source-public.pdf},
  year = 2007
}
@inproceedings{sandler08votebox,
  address = {San Jose, {CA}},
  author = {Daniel R. Sandler and Kyle Derr and Dan S. Wallach},
  booktitle = {Proceedings of the 17th USENIX Security Symposium (Security '08)},
  month = jul,
  title = {{VoteBox}: A tamper-evident, verifiable electronic voting system},
  year = 2008,
  url = {http://dsandler.org/research/archive/pub/sandler08votebox.pdf}
}
@article{voting-complexity08,
  author = {Dan S. Wallach},
  title = {Voting System Risk Assessment via Computational Complexity Analysis.},
  journal = {William and Mary Bill of Rights Journal},
  year = 2008,
  volume = 17,
  month = dec,
  url = {https://www.cs.rice.edu/~dwallach/pub/wallach-vsra2009.pdf}
}
@inproceedings{remote-voting08,
  author = {Daniel R. Sandler and Dan S. Wallach},
  title = {The case for networked remote voting precincts},
  booktitle = {3rd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '08)},
  year = 2008,
  address = {San Jose, CA},
  month = aug,
  url = {http://dsandler.org/research/archive/pub/sandler08remotebox.pdf}
}
@inproceedings{DFW96a,
  author = {Drew Dean and Edward W. Felten and Dan S. Wallach},
  title = {{Java} Security: From {HotJava} to {Netscape} and Beyond},
  booktitle = {Proceedings of the 1996 {IEEE} Symposium on Security and Privacy},
  address = {Oakland, CA},
  pages = {190--200},
  month = may,
  year = 1996,
  url = {https://www.cs.rice.edu/~dwallach/pub/oakland96.pdf}
}
@inproceedings{crosbypads,
  author = {Scott A. Crosby and Dan S. Wallach},
  title = {Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries},
  booktitle = {Proceedings of ESORICS 2009},
  year = 2009,
  address = {Saint Malo, France},
  month = sep,
  url = {http://accurate-voting.rice.edu/wp-content/uploads/2009/07/pad.pdf}
}
@techreport{crosbyfastsig,
  author = {Scott A. Crosby and Dan S. Wallach},
  title = {High throughput asynchronous algorithms for message authentication},
  institution = {Rice University},
  number = {CS TR10-15},
  address = {Houston, TX},
  month = dec,
  year = 2010,
  url = {http://tamperevident.cs.rice.edu/papers/techreport-fastsig.pdf}
}
@article{Crosby:2011:ADR:2019599.2019602,
  author = {Scott A. Crosby and Dan S. Wallach},
  title = {Authenticated Dictionaries: Real-World Costs and Trade-Offs},
  journal = {ACM Transactions on Information Systems Security (TISSEC)},
  volume = {14},
  number = {2},
  month = sep,
  year = {2011},
  issn = {1094-9224},
  pages = {17:1--17:30},
  articleno = {17},
  numpages = {30},
  url = {http://doi.acm.org/10.1145/2019599.2019602},
  doi = {10.1145/2019599.2019602}
}
@inproceedings{crosbylogging,
  author = {Scott A. Crosby and Dan S. Wallach},
  title = {Efficient data structures for tamper-evident logging},
  booktitle = {Proceedings of the 18th USENIX Security Symposium},
  year = 2009,
  address = {Montreal, Canada},
  month = aug,
  url = {http://static.usenix.org/event/sec09/tech/full_papers/crosby.pdf}
}
@article{crosbyTiming2009,
  author = {Scott A. Crosby and Rudolf H. Riedi and Dan S. Wallach},
  title = {Opportunities and Limits of Remote Timing Attacks},
  journal = {ACM Transactions on Information and Systems Security (TISSEC)},
  volume = 12,
  number = 3,
  month = jan,
  year = 2009,
  url = {https://www.cs.rice.edu/~dwallach/pub/crosby-timing2009.pdf}
}
@inproceedings{Sandler:2008:FET:1382428.1382450,
  author = {Sandler, Daniel and Derr, Kyle and Crosby, Scott and Wallach, Dan S.},
  title = {Finding the Evidence in Tamper-Evident Logs},
  booktitle = {Proceedings of the 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE '08)},
  year = {2008},
  isbn = {978-0-7695-3171-7},
  pages = {69--75},
  numpages = {7},
  url = {http://dx.doi.org/10.1109/SADFE.2008.22},
  doi = {10.1109/SADFE.2008.22}
}
@inproceedings{accountable-wiretapping,
  author = {Adam Bates and Kevin Butler and Micah Sherr and Clay Shields and Patrick Traynor and Dan S. Wallach},
  title = {Accountable Wiretapping -or- {I} Know They Can Hear You Now},
  booktitle = {19th ISOC Network and Distributed System Security Symposium (NDSS 2012)},
  address = {San Diego, CA},
  month = feb,
  year = 2012,
  url = {http://www.internetsociety.org/accountable-wiretapping-or-i-know-they-can-hear-you-now}
}
@article{accountable-wiretapping-journal,
  author = {Adam Bates and Kevin Butler and Micah Sherr and Clay Shields and Patrick Traynor and Dan Wallach},
  journal = {Journal of Computer Security},
  volume = {23},
  pages = {167--195},
  year = {2015},
  title = {{Accountable Wiretapping -or- I Know They Can Hear You Now}},
  url = {https://www.cs.rice.edu/~dwallach/pub/JCS515.pdf}
}
@inproceedings{CGR+02,
  author = {Miguel Castro and Peter Druschel and Ayalvadi Ganesh and Antony Rowstron and Dan S. Wallach},
  title = {Security for structured peer-to-peer overlay networks},
  booktitle = {Fifth Symposium on Operating Systems Design and Implementation (OSDI '02)},
  address = {Boston, MA},
  month = dec,
  year = 2002,
  url = {https://www.cs.rice.edu/~dwallach/pub/osdi2002.html}
}
@techreport{StW01,
  author = {A. Stubblefield and Dan S. Wallach},
  title = {Dagster: {C}ensorship-resistant publishing without replication},
  institution = {Rice University},
  number = {TR01-380},
  year = 2001,
  month = jul,
  url = {https://www.cs.rice.edu/~dwallach/pub/dagster-tr.pdf}
}
@inproceedings{NWD03,
  author = {Tsuen-Wan ``Johnny'' Ngan and Dan S. Wallach and Peter Druschel},
  title = {Enforcing Fair Sharing of Peer-to-Peer Resources},
  booktitle = {Proceedings of the Second International Workshop on Peer-to-Peer Systems},
  year = 2003,
  address = {Berkeley, CA},
  month = feb,
  url = {https://www.cs.rice.edu/~dwallach/pub/iptps2003.html}
}
@inproceedings{FNW03,
  author = {Andrew C. Fuqua and Tsuen-Wan Johnny Ngan and Dan S. Wallach},
  title = {Economic Behavior of Peer-to-Peer Storage Networks},
  booktitle = {Workshop on Economics of Peer-to-Peer Systems},
  year = 2003,
  address = {Berkeley, CA},
  month = jun,
  url = {https://www.cs.rice.edu/~dwallach/pub/econ-p2p-2003.html}
}
@inproceedings{SoftTerm2001,
  author = {Algis Rudys and John Clements and Dan S. Wallach},
  title = {Termination in Language-based Systems},
  booktitle = {Network and Distributed Systems Security Symposium},
  year = 2001,
  address = {San Diego, CA},
  month = feb,
  url = {https://www.cs.rice.edu/~dwallach/pub/ndss2001.html}
}
@article{SoftTerm2002,
  author = {Algis Rudys and Dan S. Wallach},
  title = {Termination in Language-based Systems},
  journal = {ACM Transactions on Information and System Security},
  year = 2002,
  volume = 5,
  number = 2,
  month = may,
  url = {https://www.cs.rice.edu/~dwallach/pub/tissec2002.html}
}
@techreport{beamit2000,
  author = {Adam B. Stublefield and Dan S. Wallach},
  title = {A Security Analysis of {My.MP3.com} and the {Beam-it} Protocol},
  institution = {Department of Computer Science, Rice University},
  year = 2000,
  number = {TR-00-353},
  address = {Houston, TX},
  month = feb,
  url = {https://www.cs.rice.edu/~dwallach/pub/beam-it.html}
}
@inproceedings{sdmi2001,
  author = {Scott A. Craver and Min Wu and Bede Liu and Adam Stubblefield and Ben Swartzlander and Dan S. Wallach and Drew Dean and Edward W. Felten},
  title = {Reading Between the Lines: Lessons from the {SDMI} Challenge},
  booktitle = {10th Usenix Security Symposium},
  year = 2001,
  address = {Washington, D.C.},
  month = aug,
  url = {https://www.usenix.org/legacy/events/sec01/craver.pdf}
}
@inproceedings{dwz2001,
  author = {Eyal {de Lara} and Dan S. Wallach and Willy Zwaenepoel},
  title = {Puppeteer: Component-based Adaptation for Mobile Computing},
  booktitle = {Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS)},
  year = 2001,
  address = {San Francisco, CA},
  month = mar,
  url = {http://www.cs.toronto.edu/~delara/papers/usits2001/}
}
@inproceedings{dwz2002,
  author = {Eyal de Lara and Dan S. Wallach and Willy Zwaenepoel},
  title = {{HATS}: Hierarchical Adaptive Transmission Scheduling},
  booktitle = {Proceedings of the 2002 Multimedia Computing and Networking Conference (MMCN'02)},
  year = 2002,
  address = {San Jose, CA},
  month = jan,
  url = {http://www.cs.toronto.edu/~delara/papers/mmcn2002/}
}
@inproceedings{ddwz2002,
  author = {Yuri Dotsenko and Eyal {de Lara} and Dan S. Wallach and Willy Zwaenepoel},
  title = {Extensible Adaptation via Constraint Solving},
  booktitle = {Proceedings of the 4th IEEE Worwshop on Mobile Computing Systems and Applications},
  year = 2002,
  address = {Callicoon, NY},
  month = jun,
  url = {http://www.cs.toronto.edu/~delara/papers/wmcsa2002/}
}
@inproceedings{dwz2000,
  author = {Eyal {de Lara} and Dan S. Wallach and Willy Zwaenepoel},
  title = {Opportunities for Bandwidth Adaptation in {Microsoft} {Office} Documents},
  booktitle = {Proceedings of the Fourth USENIX Windows Symposium},
  year = 2000,
  address = {Seattle, Washington},
  month = aug,
  url = {http://www.cs.toronto.edu/~delara/papers/usenix_win2000/}
}
@inproceedings{fdswz2001,
  author = {Jason Flinn and Eyal {de Lara} and M. Satyanarayanan and Dan. S. Wallach and Willy Zwaenepoel},
  title = {Reducing the Energy Usage of {Office} Applications},
  booktitle = {Proceedings of {IFIP/ACM} International Conference on Distributed Systems Platforms {(Middleware)}},
  year = 2001,
  address = {Heidelberg, Germany },
  month = nov,
  url = {http://www.cs.toronto.edu/~delara/papers/middleware2001/}
}
@article{wallach-tosem2000,
  author = {Dan S. Wallach and Edward W. Felten and Andrew W. Appel},
  title = {The Security Architecture Formerly Known as Stack Inspection: A Security Mechanism for Language-based Systems},
  journal = {ACM Transactions on Software Engineering and Methodology},
  year = 2000,
  volume = 9,
  number = 4,
  pages = {341--378},
  month = oct,
  url = {https://www.cs.rice.edu/~dwallach/pub/tosem2000.html}
}
@inproceedings{price-oakland2003,
  author = {David W. Price and Algis Rudys and Dan S. Wallach},
  title = {Garbage Collector Memory Accounting in Language-Based Systems},
  booktitle = {Proceedings of the 2003 {IEEE} Symposium on Security and Privacy},
  year = 2003,
  address = {Oakland, CA},
  month = may,
  url = {https://www.cs.rice.edu/~dwallach/pub/oakland2003.html}
}
@inproceedings{rudys-dsn2002,
  author = {Algis Rudys and Dan S. Wallach},
  title = {Transactional Rollback for Language-Based Systems},
  booktitle = {2002 International Conference on Dependable Systems and Networks},
  address = {Washington, D.C.},
  month = jun,
  year = 2002,
  url = {https://www.cs.rice.edu/~dwallach/pub/dsn2002.html}
}
@article{wallach-ieee2001,
  author = {Dan S. Wallach},
  title = {Copy Protection Technology is Doomed},
  journal = {IEEE Computer},
  year = 2001,
  volume = 34,
  number = 10,
  pages = {48--49},
  month = oct,
  url = {https://www.cs.rice.edu/~dwallach/pub/copy-protection.pdf}
}
@techreport{rc4-tr2000,
  author = {Alex Grosul and Dan S. Wallach},
  title = {A Related-Key Cryptanalysis of {RC4}},
  institution = {Department of Computer Science, Rice University},
  year = 2000,
  number = {TR-00-358},
  address = {Houston, TX},
  month = jun,
  url = {https://www.cs.rice.edu/~dwallach/pub/TR00_358.pdf}
}
@inproceedings{rudys-bytecode2002,
  author = {Algis Rudys and Dan S. Wallach},
  title = {Enforcing {Java} Run-Time Properties Using Bytecode Rewriting},
  booktitle = {International Symposium on Software Security},
  year = 2002,
  address = {Tokyo, Japan},
  month = nov,
  url = {https://www.cs.rice.edu/~dwallach/pub/tokyo-bytecode2002.html}
}
@inproceedings{wallach-p2p-survey2002,
  author = {Dan S. Wallach},
  title = {A Survey of Peer-to-Peer Security Issues},
  booktitle = {International Symposium on Software Security},
  year = 2002,
  address = {Tokyo, Japan},
  month = nov,
  url = {https://www.cs.rice.edu/~dwallach/pub/tokyo-p2p2002.html}
}
@inproceedings{crosby03,
  author = {Scott Crosby and Dan S. Wallach},
  title = {Denial of Service via Algorithmic Complexity Attacks},
  booktitle = {12th Usenix Security Symposium},
  year = 2003,
  address = {Washington, D.C.},
  month = aug,
  url = {https://www.usenix.org/legacy/event/sec03/tech/full_papers/crosby/crosby.pdf}
}
@inproceedings{haeberlen-mobicom2004,
  author = {Andreas Haeberlen and Eliot Flannery and Andrew M. Ladd and Algis Rudys and Dan S. Wallach and Lydia E. Kavraki},
  title = {Practical Robust Localization over Large-Scale Wireless {Ethernet} Networks},
  booktitle = {Tenth ACM International Conference on Mobile Computing and Networking (MOBICOM 2004)},
  year = 2004,
  address = {Philadelphia, PA},
  month = sep,
  url = {http://www.cis.upenn.edu/~ahae/papers/mobicom2004.pdf}
}
@article{hackavote2004,
  author = {Jonathan Bannet and David W. Price and Algis Rudys and Justin Singer and Dan S. Wallach},
  title = {{Hack-a-Vote}: Demonstrating Security Issues with Electronic Voting Systems},
  journal = {IEEE Security and Privacy Magazine},
  pages = {32--37},
  year = 2004,
  volume = 2,
  number = 1,
  month = {January / February},
  note = {Also reprinted by ComputerUser, March 2004},
  url = {https://www.cs.rice.edu/~dwallach/pub/hackavote2004.pdf}
}
@misc{testimony-texas-senate04,
  author = {Dan S. Wallach},
  title = {Testimony for the {Texas Senate Committee on State Affairs}},
  month = may,
  year = 2004,
  address = {Austin, TX},
  url = {https://www.cs.rice.edu/~dwallach/pub/dwallach-texas-17may2004.pdf}
}
@misc{testimony-texas-house04,
  author = {Dan S. Wallach},
  title = {Testimony for the {Texas House Committee on Elections}},
  month = mar,
  year = 2004,
  address = {Austin, TX},
  url = {https://www.cs.rice.edu/~dwallach/pub/dwallach-texas-31march2004.pdf}
}
@misc{testimony-ohio04,
  author = {Dan S. Wallach},
  title = {Testimony for the {Ohio Joint Committee on Ballot Security}},
  month = mar,
  year = 2004,
  address = {Columbus, Ohio},
  url = {https://www.cs.rice.edu/~dwallach/pub/dwallach-ohio-18march2004.pdf}
}
@inproceedings{scrivener05,
  author = {Animesh Nandi and Tsuen-Wan ``Johnny'' Ngan and Atul Singh and Peter Druschel and Dan S. Wallach},
  title = {Scrivener: Providing Incentives in Cooperative Content Distribution Systems,},
  booktitle = {ACM/IFIP/USENIX 6th International Middleware Conference (Middleware 2005)},
  year = 2005,
  address = {Grenoble, France},
  month = nov,
  url = {https://www.cs.rice.edu/~dwallach/pub/middleware2005.html}
}
@inproceedings{rational-taxonomy05,
  author = {Seth James Nielson and Scott A. Crosby and Dan S. Wallach},
  title = {A Taxonomy of Rational Attacks},
  booktitle = {4th International Workshop on Peer-to-Peer Systems (IPTPS '05)},
  year = 2005,
  address = {Ithaca, NY},
  month = feb,
  url = {https://www.cs.rice.edu/~dwallach/pub/taxonomy-iptps05.html}
}
@inproceedings{ap3-04,
  author = {Alan Mislove and Gaurav Oberoi and Ansley Post and Charles Reis and Peter Druschel and Dan S. Wallach},
  title = {{AP3}: Cooperative, Decentralized Anonymous Communication},
  booktitle = {11th ACM SIGOPS European Workshop},
  year = 2004,
  address = {Leuven, Belgium},
  month = sep,
  url = {https://www.cs.rice.edu/~dwallach/pub/ap3-sigops04.html}
}
@inproceedings{post-hotos03,
  author = {Alan Mislove and Ansley Post and Charles Reis and Paul Willmann and Peter Druschel and Dan S. Wallach and Xavier Bonnaire and Pierre Sens and Jean-Michel Busca and Luciana Arantes-Bezerra},
  title = {{POST}: A Secure, Resilient, Cooperative Messaging System},
  booktitle = {9th Workshop on Hot Topics in Operating Systems (HotOS IX)},
  year = 2003,
  address = {Lihue, Hawaii},
  month = may,
  url = {https://www.cs.rice.edu/~dwallach/pub/hotos2003.html}
}
@inproceedings{multicast04,
  author = {Tsuen-Wan ``Johnny'' Ngan and Dan S. Wallach and Peter Druschel},
  title = {Incentives-Compatible Peer-to-Peer Multicast},
  booktitle = {2nd Workshop on Economics of Peer-to-Peer Systems},
  year = 2004,
  address = {Cambridge, MA},
  month = jun,
  url = {https://www.cs.rice.edu/~dwallach/pub/econ-p2p-2004.html}
}
@inproceedings{PaulEvansRubinWallach03,
  author = {Nathanael Paul and David Evans and Aviel D. Rubin and Dan S. Wallach},
  title = {Authentication for Remote Voting},
  booktitle = {Workshop on Human-Computer Interaction and Security Systems},
  year = 2003,
  address = {Fort Lauderdale, FL},
  month = apr,
  url = {https://www.cs.rice.edu/~dwallach/pub/remote-voting2003.html}
}
@inproceedings{delara-cofi2003,
  author = {Eyal de Lara and Rajnish Kumar and Dan S. Wallach and Willy Zwaenepoel},
  title = {Collaboration and Multimedia Authoring on Mobile Devices},
  booktitle = {First International Conference on Mobile Systems, Applications, and Services (MobiSys '03)},
  year = 2003,
  address = {San Francisco, CA},
  month = may,
  url = {https://www.cs.rice.edu/~dwallach/pub/ubitools.pdf}
}
@inproceedings{tor-incentives10,
  author = {Tsuen-Wan ``Johnny'' Ngan and Roger Dingledine and Dan S. Wallach},
  title = {Building Incentives into {Tor}},
  booktitle = {Proceedings of Financial Cryptography (FC '10)},
  year = 2010,
  address = {Tenerife, Canary Islands},
  month = jan,
  note = {best paper award},
  url = {http://freehaven.net/anonbib/papers/incentives-fc10.pdf}
}
@inproceedings{vbnano09,
  author = {Ersin \"{O}ks\"{u}zo\u{g}lu and Dan S. Wallach},
  title = {{VoteBox Nano}: A Smaller, Stronger, {FPGA}-based Voting Machine},
  booktitle = {Electronic Voting Technology/Workshop on Trustworthy Elections 2009},
  year = {2009},
  address = {Montreal, Canada},
  month = aug,
  url = {https://www.usenix.org/legacy/event/evtwote09/tech/full_papers/oksuzoglu.pdf}
}
@inproceedings{fethr09,
  author = {Daniel R. Sandler and Dan S. Wallach},
  title = {Birds of a {FETHR}: Open, Decentralized Micropublishing},
  booktitle = {8th International Workshop on Peer-to-Peer Systems (IPTPS '09)},
  year = {2009},
  address = {Boston, MA},
  month = apr,
  url = {http://dsandler.org/brdfdr/doc/iptps-fethr.pdf}
}
@inproceedings{eclipse06,
  author = {Atul Singh and Tsuen-Wan ``Johnny'' Ngan and Peter Druschel and Dan S. Wallach},
  title = {Eclipse Attacks on Overlay Networks: Threats and Defenses},
  booktitle = {IEEE INFOCOM '06},
  year = {2006},
  address = {Barcelona, Spain},
  month = apr,
  url = {https://www.cs.rice.edu/~dwallach/pub/eclipse-infocom06.pdf}
}
@inproceedings{sandler08-passwords,
  author = {Daniel R. Sandler and Dan S. Wallach},
  title = {$<$input type=``password''$>$ must die!},
  booktitle = {Web 2.0 Security \& Privacy (W2SP 2008)},
  year = 2008,
  address = {Oakland, CA},
  month = may,
  url = {http://dsandler.org/research/archive/pub/sandler08password-must-die.pdf}
}
@article{delara05,
  author = {Eyal de Lara and Yogesh Chopra and Rajnish Kumar and Nilesh Vaghela and Dan S. Wallach and Willy Zwaenepoel},
  title = {Iterative Adaptation for Mobile Clients Using Existing {APIs}},
  journal = {IEEE Transactions on Parallel and Distributed Systems (TPDS)},
  year = 2005,
  volume = 16,
  number = 10,
  month = oct,
  url = {http://www.cs.toronto.edu/~delara/papers/tpds/index.html}
}
@inproceedings{liu2015a,
  author = {Yue Liu and David R. Bild and D. Adrian and G. Singh and Robert P. Dick and Dan S. Wallach and Z. Morley Mao},
  title = {Performance and energy consumption analysis of a delay-tolerant network for censorship-resistant communications},
  year = 2015,
  booktitle = {16th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '15)},
  month = jun,
  url = {http://dl.acm.org/citation.cfm?id=2746320}
}
@article{liu2015b,
  author = {Yue Liu and David R. Bild and Robert P. Dick and Z. Morley Mao and Dan S. Wallach},
  title = {The {Mason} test: A defense against {Sybil} attacks in wireless networks without trusted authorities},
  journal = {IEEE Transactions on Mobile Computing},
  year = 2015,
  note = {in press},
  url = {http://robertdick.org/publications/liu-mason.pdf}
}
@article{bild2015a,
  author = {David R. Bild and Yue Liu and Robert P. Dick and Z. Morley Mao and Dan S. Wallach},
  title = {Aggregate characterization of user behavior in {Twitter} and analysis of the retweet graph},
  journal = {ACM Transactions on Internet Technologies},
  volume = 15,
  number = 1,
  month = feb,
  year = 2015,
  url = {http://dl.acm.org/citation.cfm?id=2700060}
}
@inproceedings{bild2011,
  author = {David R. Bild and Yue Liu and Robert P. Dick and Z. Morley Mao and Dan S. Wallach},
  title = {Using predictable mobility patterns to support scalable and secure {MANETs} of handheld devices},
  booktitle = {Sixth International Workshop on Mobility in the Evolving Internet Architecture (MobiArch '11)},
  month = jun,
  year = 2011,
  url = {http://dl.acm.org/citation.cfm?id=1999921}
}
@article{stein2008,
  author = {Robert M. Stein and Greg Vonnahme and Michael Byrne and Dan S. Wallach},
  title = {Voting Technology, Election Administration, and Voter Performance},
  journal = {Election Law Journal},
  volume = 7,
  number = 2,
  month = apr,
  year = 2008,
  url = {https://www.cs.rice.edu/~dwallach/pub/elj2008.pdf}
}
@article{whispr2005,
  author = {Adam B. Stubblefield and Aviel D. Rubin and Dan S. Wallach},
  title = {Managing the Performance Impact of Web Security},
  journal = {Electronic Commerce Research Journal},
  volume = 5,
  number = 1,
  month = feb,
  year = 2005,
  url = {https://www.cs.rice.edu/~dwallach/pub/wispr-scream2005.pdf}
}
@article{DBLP:journals/corr/abs-1109-6874,
  author = {Dustin Bachrach and
               Christopher Nunu and
               Dan S. Wallach and
               Matthew K. Wright},
  title = {{\#}h00t: Censorship Resistant Microblogging},
  journal = {CoRR},
  volume = {abs/1109.6874},
  year = {2011},
  url = {http://arxiv.org/abs/1109.6874},
  timestamp = {Thu, 09 Jul 2015 16:50:06 +0200},
  biburl = {http://dblp.uni-trier.de/rec/bib/journals/corr/abs-1109-6874},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1108-2718,
  author = {Seth James Nielson and
               Dan S. Wallach},
  title = {The BitTorrent Anonymity Marketplace},
  journal = {CoRR},
  volume = {abs/1108.2718},
  year = {2011},
  url = {http://arxiv.org/abs/1108.2718},
  timestamp = {Mon, 05 Dec 2011 18:05:23 +0100},
  biburl = {http://dblp.uni-trier.de/rec/bib/journals/corr/abs-1108-2718},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1108-2716,
  author = {Seth James Nielson and
               Caleb E. Spare and
               Dan S. Wallach},
  title = {Building Better Incentives for Robustness in BitTorrent},
  journal = {CoRR},
  volume = {abs/1108.2716},
  year = {2011},
  url = {http://arxiv.org/abs/1108.2716},
  timestamp = {Mon, 05 Dec 2011 18:05:36 +0100},
  biburl = {http://dblp.uni-trier.de/rec/bib/journals/corr/abs-1108-2716},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{weibo2013,
  author = {Tao Zhu and David Phipps and Adam Pridgen and Jedidiah Crandall and Dan S. Wallach},
  title = {The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions},
  booktitle = {USENIX Security Symposium},
  url = {https://www.usenix.org/conference/usenixsecurity13/velocity-censorship-high-fidelity-detection-microblog-post-deletions},
  year = 2013,
  month = aug,
  address = {Washington, DC}
}
@inproceedings{nlp2012,
  author = {Peiyou Song and Anhei Shu and David Phipps and Dan S. Wallach and Mohit Tiwari and Jedidiah Crandall and George Lugar},
  title = {Language Without Words: A Pointillist Model for Natural Language Processing},
  booktitle = {6th International Conference on Soft Computing and Intelligent Systems (SCIS-ISIS 2012)},
  address = {Kobe, Japan},
  month = dec,
  year = 2012,
  url = {https://www.cs.rice.edu/~dwallach/pub/nlp2012.pdf}
}
@inproceedings{czeskis2012,
  author = {Alexei Czeskis and Michael Dietz and Tadayoshi Kohno and Dan S. Wallach and Dirk Balfanz},
  title = {Strengthening user authentication through opportunistic cryptographic identity assertions},
  booktitle = {19th ACM Conference on Computer and Communications Security (CCS '12)},
  address = {Raleigh, NC},
  month = oct,
  year = 2012,
  url = {http://dl.acm.org/citation.cfm?doid=2382196.2382240}
}
@inproceedings{nlp2012a,
  author = {Peiyou Song and Anhei Shu and Anyu Zhou and Dan S. Wallach and Jedidiah R. Crandall},
  title = {A Pointillism Approach for Natural Language Processing of Social Media},
  booktitle = {Proceedings of the 2012 International Conference on Natural Language Processing and Knowledge Engineering (NLP-KE'12)},
  address = {Hefei, China},
  month = sep,
  year = 2012,
  note = {best paper award},
  url = {https://www.cs.rice.edu/~dwallach/pub/nlp2012a.pdf}
}
@inproceedings{obc2012,
  author = {Michael Dietz and Alexei Czeskis and Dirk Balfanz and Dan S. Wallach},
  title = {Origin-bound certificates: a fresh approach to strong client authentication for the Web},
  booktitle = {USENIX Security Symposium},
  address = {Bellevue, WA},
  month = aug,
  year = 2012,
  url = {https://www.usenix.org/conference/usenixsecurity12/origin-bound-certificates-fresh-approach-strong-client-authentication}
}
@inproceedings{adsplit2012,
  author = {Shashi Shekhar and Michael Dietz and Dan S. Wallach},
  title = {AdSplit: Separating smartphone advertising from applications},
  booktitle = {USENIX Security Symposium},
  address = {Bellevue, WA},
  month = aug,
  year = 2012,
  url = {https://www.usenix.org/conference/usenixsecurity12/adsplit-separating-smartphone-advertising-applications}
}
@article{rebooting2010,
  author = {Dan S. Wallach},
  title = {Viewpoint: Rebooting the CS Publication Process},
  journal = {Communications of the ACM},
  volume = 54,
  number = 10,
  month = oct,
  year = 2011,
  url = {https://www.cs.rice.edu/~dwallach/pub/reboot-2010-06-14.pdf}
}
@inproceedings{trends2011,
  author = {Dan S. Wallach},
  title = {Smartphone Security: Trends and Predictions},
  booktitle = {Secure Application Development (SecAppDev 2011)},
  address = {Leuven, Belgium},
  month = feb,
  year = 2011,
  url = {http://secappdev.org/handouts/2011/Dan%20Wallach/smartphone-security.pdf}
}
@inbook{algorithmid-dos-book2010,
  author = {Scott A. Crosby and Dan S. Wallach},
  chapter = {Algorithmic Denial of Service},
  title = {Encyclopedia of Cryptography and Security},
  publisher = {Springer-Verlag},
  year = 2010,
  edition = 2
}
@article{nacl2010,
  author = {Dan S. Wallach},
  title = {Native Client: A Clever Alternative},
  journal = {Communications of the ACM},
  volume = 53,
  number = 1,
  month = jan,
  year = 2010,
  url = {http://cacm.acm.org/magazines/2010/1/55767-native-client-a-clever-alternative/fulltext}
}
@article{oped2009,
  author = {Dan S. Wallach},
  title = {Polling place burglary raises specter of fraud},
  journal = {Houston Chronicle},
  month = dec,
  year = 2009,
  url = {http://www.chron.com/opinion/outlook/article/Burglary-at-polling-place-raises-the-specter-of-1545854.php}
}
@article{swift2009,
  author = {Dan S. Wallach},
  title = {Technical Perspective: Tools for Information to Flow Securely and Swift-ly},
  journal = {Communications of the ACM},
  volume = 52,
  number = 2,
  month = feb,
  year = 2009,
  url = {https://www.cs.rice.edu/~dwallach/pub/swift-intro.pdf}
}
@article{bronk2009,
  author = {Chris Bronk and Dan Castro and Dan S. Wallach},
  title = {Group Effort Needed to Secure Cyberspace},
  journal = {Houston Chronicle},
  month = jun,
  year = 2009,
  url = {https://www.cs.rice.edu/~dwallach/pub/chron-oped2009.pdf}
}
@article{statesman2004,
  author = {Dan S. Wallach},
  title = {Texas Must Confront Voting Systems' Flaws},
  journal = {Austin American-Statesman},
  month = sep,
  year = 2004,
  url = {https://www.cs.rice.edu/~dwallach/pub/statesman-2sep04.pdf}
}
@article{puf2014,
  title = {Robust and Reverse-Engineering Resilient {PUF} Authentication and Key-Exchange by Substring Matching},
  journal = {IEEE Transactions on Emerging Topics in Computing},
  year = {2014},
  url = {http://aceslab.org/sites/default/files/PUF Journal.pdf},
  author = {Masoud Rostami and Mehrdad Majzoobi and Farinaz Koushanfar and Dan S. Wallach and Srini Devadas}
}
@inproceedings{puf2012,
  title = {Slender {PUF} Protocol: A lightweight, robust, and secure authentication by substring matching},
  booktitle = {International Workshop on Trustworthy Embedded Devices},
  year = {2012},
  month = may,
  doi = {10.1109/SPW.2012.30},
  url = {http://aceslab.org/sites/default/files/4740a033.pdf},
  author = {Mehrdad Majzoobi and Masoud Rostami and Farinaz Koushanfar and Dan S. Wallach and Srinivas Devadas}
}
@article{DBLP:journals/corr/SaniZW14,
  author = {Ardalan Amiri Sani and Lin Zhong and Dan S. Wallach},
  title = {Glider: {A} {GPU} Library Driver for Improved System Security},
  journal = {CoRR},
  volume = {abs/1411.3777},
  year = {2014},
  url = {http://arxiv.org/abs/1411.3777}
}
@incollection{acemyan2015,
  year = {2015},
  booktitle = {Human Aspects of Information Security, Privacy, and Trust},
  volume = {9190},
  series = {Lecture Notes in Computer Science},
  doi = {10.1007/978-3-319-20376-8_41},
  title = {Users' Mental Models for Three End-to-End Voting Systems: {Helios}, {Prêt à Voter}, and {Scantegrity II}},
  url = {http://dx.doi.org/10.1007/978-3-319-20376-8_41},
  publisher = {Springer International Publishing},
  author = {Claudia Z. Acemyan and Philip Kortum and Michael D. Byrne and Dan S. Wallach}
}
@article{acemyan2014,
  author = {Claudia Z. Acemyan and Philip Kortum and Michael D. Byrne and Dan S. Wallach},
  title = {Usability of Voter Verifiable, End-to-end Voting Systems: Baseline Data for {Helios}, {Prêt à Voter}, and {Scantegrity II}},
  journal = {USENIX Journal of Election Technology and Systems (JETS)},
  volume = 2,
  number = 3,
  month = jul,
  year = 2014,
  url = {https://www.usenix.org/sites/default/files/jets_0203_complete.pdf#page=28}
}
@article{acemyan2015b,
  title = {From Error to Error: Why Voters Could not Cast a Ballot and Verify Their Vote With {Helios}, {Prêt à Voter}, and {Scantegrity II}},
  author = {Claudia Z. Acemyan and Philip Kortum and Michael D. Byrne and Dan S. Wallach},
  journal = {USENIX Journal of Election Technology and Systems (JETS)},
  volume = 3,
  number = 2,
  month = aug,
  year = 2015,
  url = {https://www.usenix.org/system/files/jets/issues/0302/overview/jets_0302-acemyan.pdf}
}
@inproceedings{mpeg94,
  author = {Dan S. Wallach and Sharma Kunapalli and Michael F. Cohen},
  title = {Accelerated {MPEG} Compression of Dynamic Polygonal Scenes},
  year = 1994,
  url = {https://www.cs.rice.edu/~dwallach/sg94/},
  booktitle = {Computer Graphics (Proceedings of SIGGRAPH 1994)},
  address = {Orlando, FL},
  month = jul
}
@inproceedings{book2013,
  author = {Theodore Book and Adam Pridgen and Dan S. Wallach},
  title = {Longitudinal Analysis of {Android} Ad Library Permissions},
  booktitle = {Mobile Security Technologies Workshop (MOST)},
  month = may,
  year = 2013,
  address = {San Francisco, CA},
  url = {http://www.mostconf.org/2013/papers/7.pdf}
}
@inproceedings{book2013b,
  author = {Theodore Book and Dan S. Wallach},
  title = {A case of collusion: a study of the interface between ad libraries and their apps},
  booktitle = {Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones \& Mobile Devices (SPSM '13)},
  month = nov,
  year = 2013,
  address = {Berlin, Germany},
  url = {https://www.cs.rice.edu/~dwallach/pub/book2013b.pdf}
}
@article{DBLP:journals/corr/BookW15,
  author = {Theodore Book and Dan S. Wallach},
  title = {An Empirical Study of Mobile Ad Targeting},
  journal = {CoRR},
  volume = {abs/1502.06577},
  year = {2015},
  url = {http://arxiv.org/abs/1502.06577}
}
@inproceedings{milcom2015,
  author = {Judson C. Dressler and Christopher Bronk and Dan S. Wallach},
  title = {Exploiting Military OpSec Through Open-Source Vulnerabilities},
  booktitle = {2015 IEEE Military Communications Conference (MILCOM '15)},
  year = 2015,
  month = oct,
  address = {Tampa, FL},
  url = {https://www.cs.rice.edu/~dwallach/pub/milcom2015.pdf}
}
@inproceedings{twitter2015,
  title = {Known Unknowns: An Analysis of {Twitter} Censorship in {Turkey}},
  author = {Rima S. Tanash and Zhouhan Chen and Tanmay Thakur and Dan S. Wallach and Devika Subramanian},
  booktitle = {Workshop on Privacy in the Electronic Society},
  month = oct,
  year = 2015,
  address = {Denver, CO}
}
@inproceedings{persona2014,
  author = {Michael Dietz and Dan S. Wallach},
  title = {Hardening {Persona}: Improving federated web login},
  booktitle = {Network and Distributed Systems Symposium (NDSS '14)},
  year = 2014,
  month = feb,
  address = {San Diego, CA},
  url = {http://www.internetsociety.org/sites/default/files/08_2_0.pdf}
}
@article{pets2020-monetor,
  author = {Thien-Nam Dinh and Florentin Rochet and Olivier Pereira and Dan S. Wallach},
  title = {Scaling Up Anonymous Communication with Efficient Nanopayment Channels},
  journal = {Proceedings on Privacy Enhancing Technologies},
  year = 2020,
  volume = 2020,
  number = 3,
  pages = {175--203},
  url = {https://petsymposium.org/2020/files/papers/issue3/popets-2020-0048.pdf}
}
@manual{congress-cyber-jan6-2021,
  title = {Another lesson from Jan. 6: Congress must up its cybersecurity game},
  author = {Dan S. Wallach and Chris Bronk},
  organization = {Baker Institute Blog},
  month = jan,
  year = 2021,
  url = {http://blog.bakerinstitute.org/2021/01/21/another-lesson-from-jan-6-congress-must-up-its-cybersecurity-game/}
}
@article{vault-journal-2021,
  author = {Josh Benaloh and Kammi Foote and Philip B. Stark and Vanessa Teague and Dan S. Wallach},
  journal = {IEEE Security \& Privacy},
  title = {{VAULT}-Style Risk-Limiting Audits and the {Inyo} County Pilot},
  year = {2021},
  volume = {19},
  number = {04},
  issn = {1558-4046},
  pages = {8-18},
  doi = {10.1109/MSEC.2021.3075107},
  publisher = {IEEE Computer Society},
  address = {Los Alamitos, CA, USA},
  month = jul,
  url = {https://www.computer.org/csdl/magazine/sp/2021/04/09444551/1u3mFyzeRa0}
}
@article{bmd-live-audits-2020,
  author = {Dan S. Wallach},
  title = {On the security of ballot marking devices},
  journal = {The Ohio State Technology Law Journal},
  year = 2020,
  volume = 16,
  number = 2,
  pages = {558--586},
  url = {https://kb.osu.edu/bitstream/handle/1811/92271/OSTLJ_V16N2_558.pdf}
}
@misc{testimony-texas-senate-mar21,
  author = {Dan S. Wallach},
  title = {Testimony for the {Texas Senate Committee on State Affairs} Concerning {SB} 598 (``Relating to auditable voting systems'')},
  month = mar,
  year = 2021,
  address = {Austin, TX},
  url = {https://www.cs.rice.edu/~dwallach/dwallach-testimony-texas-senate-26march2021.pdf}
}
@misc{testimony-texas-house-apr21,
  author = {Dan S. Wallach},
  title = {Testimony for the {Texas House Elections Committee}},
  month = apr,
  year = 2021,
  address = {Austin, TX},
  url = {https://www.cs.rice.edu/~dwallach/dwallach-testimony-texas-house-8april2021.pdf}
}
@article{DBLP:journals/corr/abs-2012-07917,
  author = {Daniel W. Song and
               Konstantinos Mamouras and
               Ang Chen and
               Nathan Dautenhahn and
               Dan S. Wallach},
  title = {The Design and Implementation of a Verified File System with End-to-End
               Data Integrity},
  journal = {CoRR},
  volume = {abs/2012.07917},
  year = {2020},
  url = {https://arxiv.org/abs/2012.07917},
  archiveprefix = {arXiv},
  eprint = {2012.07917},
  timestamp = {Sat, 02 Jan 2021 15:43:30 +0100},
  biburl = {https://dblp.org/rec/journals/corr/abs-2012-07917.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{doi:10.1177/0018720820946896,
  author = {Philip Kortum and Robert Stein and Claudia Ziegler Acemyan and Dan S. Wallach and Elizabeth Vann},
  title = {How Human Factors Can Help Preserve Democracy in the Age of Pandemics},
  journal = {Human Factors},
  volume = {62},
  number = {7},
  pages = {1077-1086},
  year = {2020},
  doi = {10.1177/0018720820946896},
  note = {PMID: 32741224},
  url = {https://doi.org/10.1177/0018720820946896},
  eprint = {https://doi.org/10.1177/0018720820946896}
}
@manual{ccc-voting-2022,
  title = {Research opportunities in evidence-based elections},
  author = {Josh Benaloh and Philip B. Stark and Vanessa Teague and Melanie Volkamer and Dan S. Wallach},
  organization = {Computing Community Consortium},
  month = jan,
  year = 2022,
  url = {https://cra.org/ccc/wp-content/uploads/sites/2/2022/01/Research-Opportunities-in-Evidence-Based-Elections_Jan-5-Draft-1.pdf}
}

This file was generated by bibtex2html 1.99.