Dan S. Wallach - Publications

Affiliations: 
Rice University, Houston, TX 
Area:
Computer Science

36/57 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Kortum P, Stein R, Acemyan CZ, Wallach DS, Vann E. How Human Factors Can Help Preserve Democracy in the Age of Pandemics. Human Factors. 18720820946896. PMID 32741224 DOI: 10.1177/0018720820946896  0.307
2018 Acemyan CZ, Kortum P, Byrne MD, Wallach DS. Summative Usability Assessments of STAR-Vote: A Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use. Human Factors. 18720818812586. PMID 30512968 DOI: 10.1177/0018720818812586  0.315
2017 Pridgen A, Garfinkel S, Wallach DS. Picking up the trash: Exploiting generational GC for memory analysis Digital Investigation. 20. DOI: 10.1016/J.Diin.2017.01.002  0.31
2015 Bates A, Butler KRB, Sherr M, Shields C, Traynor P, Wallach D. Accountable wiretapping-or-I know they can hear you now Journal of Computer Security. 23: 167-195. DOI: 10.3233/Jcs-140515  0.382
2015 Bild DR, Liu Y, Dick RP, Mao ZM, Wallach DS. Aggregate characterization of user behavior in Twitter and analysis of the retweet graph Acm Transactions On Internet Technology. 15. DOI: 10.1145/2700060  0.339
2015 Liu Y, Bild DR, Dick RP, Mao ZM, Wallach DS. The mason test: A defense against sybil attacks in wireless networks without trusted authorities Ieee Transactions On Mobile Computing. 14: 2376-2391. DOI: 10.1109/Tmc.2015.2398425  0.417
2014 Rostami M, Majzoobi M, Koushanfar F, Wallach DS, Devadas S. Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching Ieee Transactions On Emerging Topics in Computing. 2: 37-49. DOI: 10.1109/Tetc.2014.2300635  0.369
2011 Crosby SA, Wallach DS. Authenticated dictionaries: Real-world costs and trade-offs Acm Transactions On Information and System Security. 14. DOI: 10.1145/2019599.2019602  0.751
2011 Wallach DS. Rebooting the CS publication process Communications of the Acm. 54: 32-35. DOI: 10.1145/2001269.2001283  0.315
2011 Bild DR, Liu Y, Dick RP, Mao ZM, Wallach DS. Using predictable mobility patterns to support scalable and secure MANETs of handheld devices Mobisys'11 - Compilation Proceedings of the 9th International Conference On Mobile Systems, Applications, and Services and Co-Located Workshops - Mobiarch 2011 Workshop, Mobiarch'11. 13-18. DOI: 10.1145/1999916.1999921  0.334
2010 Wallach D. Technical perspective native client: A clever alternative Communications of the Acm. 53: 90. DOI: 10.1145/1629175.1629202  0.342
2009 Crosby SA, Wallach DS, Riedi RH. Opportunities and Limits of Remote Timing Attacks Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455526.1455530  0.757
2009 Crosby SA, Wallach DS. Super-efficient aggregating history-independent persistent authenticated dictionaries Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5789: 671-688. DOI: 10.1007/978-3-642-04444-1_41  0.747
2006 Coarfa C, Druschel P, Wallach DS. Performance analysis of TLS web servers Acm Transactions On Computer Systems. 24: 39-69. DOI: 10.1145/1124153.1124155  0.364
2006 Singh A, Ngan TW, Druschel P, Wallach DS. Eclipse attacks on overlay networks: Threats and defenses Proceedings - Ieee Infocom. DOI: 10.1109/INFOCOM.2006.231  0.742
2005 de Lara E, Chopra Y, Kumar R, Vaghela N, Wallach DS, Zwaenepoel W. Iterative adaptation for mobile clients using existing APIs Ieee Transactions On Parallel and Distributed Systems. 16: 966-981. DOI: 10.1109/Tpds.2005.124  0.379
2005 Stubblefield A, Rubin AD, Wallach DS. Managing the performance impact of web security Electronic Commerce Research. 5: 99-116. DOI: 10.1023/B:Elec.0000045975.59531.08  0.399
2005 Ladd AM, Bekris KE, Rudys A, Kavraki LE, Wallach DS. Robotics-based location sensing using wireless ethernet Wireless Networks. 11: 189-204. DOI: 10.1007/S11276-004-4755-8  0.74
2005 Nandi A, Ngan TW, Singh A, Druschel P, Wallach DS. Scrivener: Providing incentives in cooperative content distribution systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3790: 270-291. DOI: 10.1007/11587552_14  0.771
2005 Nielson SJ, Crosby SA, Wallach DS. A taxonomy of rational attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3640: 36-46. DOI: 10.1007/11558989_4  0.673
2004 Ladd AM, Bekris KE, Rudys AP, Wallach DS, Kavraki LE. On the feasibility of using wireless Ethernet for indoor localization Ieee Transactions On Robotics and Automation. 20: 555-559. DOI: 10.1109/Tra.2004.824948  0.742
2004 Bannet J, Price DW, Rudys A, Singer J, Wallach DS. Hack-a-Vote: Security Issues with Electronic Voting Systems Ieee Security and Privacy. 2: 32-37. DOI: 10.1109/MSECP.2004.1264851  0.705
2004 Haeberlen A, Rudys A, Flannery E, Wallach DS, Ladd AM, Kavraki LE. Practical robust localization over large-scale 802.11 wireless networks Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 70-84.  0.735
2003 Hu YC, Yu W, Cox A, Wallach D, Zwaenepoel W. Run-time support for distributed sharing in safe languages Acm Transactions On Computer Systems. 21: 1-35. DOI: 10.1145/592637.592638  0.359
2003 Price DW, Rudys A, Wallach DS. Garbage collector memory accounting in language-based systems Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 263-274. DOI: 10.1109/SECPRI.2003.1199342  0.702
2003 Tao P, Rudys A, Ladd AM, Wallach DS. Wireless LAN Location-Sensing for Security Applications Proceedings of the Workshop On Wireless Security. 11-20.  0.738
2003 Rudys A, Wallach DS. Enforcing Java run-time properties using bytecode rewriting Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2609: 185-200.  0.728
2003 Ngan TW, Wallach DS, Druschel P. Enforcing fair sharing of peer-to-peer resources Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2735: 149-159.  0.784
2003 Wallach DS. A survey of peer-to-peer security issues Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2609: 42-57.  0.376
2002 Rudys A, Wallach DS. Termination in language-based systems Acm Transactions On Information and System Security. 5: 138-168. DOI: 10.1145/505586.505589  0.728
2002 Rudys A, Wallach DS. Transaction rollback for language-based systems Proceedings of the 2002 International Conference On Dependable Systems and Networks. 439-448. DOI: 10.1109/DSN.2002.1028929  0.739
2002 Ladd AM, Bekris KE, Marceau G, Rudys A, Wallach DS, Kavraki LE. Using wireless ethernet for localization Ieee International Conference On Intelligent Robots and Systems. 1: 402-408.  0.742
2001 Flinn J, De Lara E, Satyanarayanan M, Wallach DS, Zwaenepoel W. Reducing the energy usage of office applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2218: 252-272. DOI: 10.1007/3-540-45518-3_14  0.313
2000 Wallach DS, Appel AW, Felten EW. SAFKASI: A security mechanism for language-based systems Acm Transactions On Software Engineering and Methodology. 9: 341-378. DOI: 10.1145/363516.363520  0.388
2000 de Lara E, Wallach D, Zwaenepoel W. Puppeteer Acm Sigops Operating Systems Review. 34: 33. DOI: 10.1145/346152.346224  0.331
2000 Charlie Hu Y, Yu W, Cox AL, Wallach DS, Zwaenepoel W. Run-time support for distributed sharing in typed languages Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1915: 192-206. DOI: 10.1007/3-540-40889-4_15  0.343
Low-probability matches (unlikely to be authored by this person)
2002 De Lara E, Wallach DS, Zwaenepoel W. HATS: Hierarchical Adaptive Transmission Scheduling for multi-application adaptation Proceedings of Spie - the International Society For Optical Engineering. 4673: 100-114. DOI: 10.1117/12.449973  0.281
1997 Wallach DS, Balfanz D, Dean D, Felten EW. Extensible Security Architectures for Java Operating Systems Review (Acm). 31: 116-128.  0.273
2001 Wallach DS. Copy protection technology is doomed Computer. 34: 48-49. DOI: 10.1109/2.955098  0.264
2008 Stein RM, Vonnahme G, Byrne M, Wallach D. Voting Technology, Election Administration, and Voter Performance Election Law Journal. 7: 123-135. DOI: 10.1089/Elj.2008.7203  0.262
2009 Wallach D. Technical perspective: Tools for information to flow securely and Swift-ly Communications of the Acm. 52: 78. DOI: 10.1145/1461928.1461948  0.26
2012 Majzoobi M, Rostami M, Koushanfar F, Wallach DS, Devadas S. Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching Proceedings - Ieee Cs Security and Privacy Workshops, Spw 2012. 33-44. DOI: 10.1109/SPW.2012.30  0.25
2016 Tao Z, Kokas A, Zhang R, Cohan DS, Wallach D. Inferring Atmospheric Particulate Matter Concentrations from Chinese Social Media Data. Plos One. 11: e0161389. PMID 27649530 DOI: 10.1371/Journal.Pone.0161389  0.216
2015 Dressler JC, Bronk C, Wallach DS. Exploiting military OpSec through open-source vulnerabilities Proceedings - Ieee Military Communications Conference Milcom. 2015: 450-458. DOI: 10.1109/MILCOM.2015.7357484  0.199
2013 Book T, Wallach DS. A case of collusion: A study of the interface between ad libraries and their apps Proceedings of the Acm Conference On Computer and Communications Security. 79-85. DOI: 10.1145/2516760.2516762  0.199
2000 de Lara E, Wallach D, Zwaenepoel W. Puppeteer Acm Sigops Operating Systems Review. 34: 40. DOI: 10.1145/346152.346276  0.197
2014 Wallach D. Techn Communications of the Acm. 57: 98. DOI: 10.1145/2576234  0.196
2015 Tanash RS, Chen Z, Thakur T, Wallach DS, Subramanian D. Known unknowns: An analysis of twitter censorship in Turkey Wpes 2015 - Proceedings of the 2015 Acm Workshop On Privacy in the Electronic Society, Co-Located With Ccs 2015. 11-20. DOI: 10.1145/2808138.2808147  0.175
2020 Kortum P, Stein R, Acemyan CZ, Wallach DS, Vann E. How Human Factors Can Help Preserve Democracy in the Age of Pandemics. Human Factors. 18720820946896. PMID 32741224 DOI: 10.1177/0018720820946896  0.173
2001 De Lara E, Wallach DS, Zwaenepoel W. Architectures for adaptation systems Proceedings of the Workshop On Hot Topics in Operating Systems - Hotos. 167.  0.147
2005 Shieh SW, Wallach DS. Ad hoc and P2P security Ieee Internet Computing. 9: 14-15. DOI: 10.1109/MIC.2005.128  0.139
2015 Acemyan CZ, Kortum P, Byrne MD, Wallach DS. Users’ mental models for three end-to-end voting systems: Helios, Prêt à Voter, and Scantegrity II Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9190: 463-474. DOI: 10.1007/978-3-319-20376-8_41  0.119
2004 Mislove A, Oberoi G, Post A, Reis C, Druschel P, Wallach DS. AP3: Cooperative, decentralized anonymous communication Proceedings of the 11th Workshop On Acm Sigops European Workshop, Ew 11. DOI: 10.1145/1133572.1133578  0.089
2002 Dotsenko Y, De Lara E, Wallach DS, Zwaenepoel W. Extensible adaptation via constraint solving Proceedings - 4th Ieee Workshop On Mobile Computing Systems and Applications, Wmcsa 2002. 117-127. DOI: 10.1109/MCSA.2002.1017491  0.085
2012 Song P, Shu A, Phipps D, Tiwari M, Wallach DS, Crandall JR, Luger GF. Language without words: A pointillist model for natural language processing 6th International Conference On Soft Computing and Intelligent Systems, and 13th International Symposium On Advanced Intelligence Systems, Scis/Isis 2012. 11-15. DOI: 10.1109/SCIS-ISIS.2012.6505413  0.081
2010 Johnny Ngan TW, Dingledine R, Wallach DS. Building incentives into tor Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6052: 238-256. DOI: 10.1007/978-3-642-14577-3_19  0.068
2004 Kohno T, Stubblefield A, Rubin AD, Wallach DS. Analysis of an electronic voting system Proceedings - Ieee Symposium On Security and Privacy. 2004: 27-40. DOI: 10.1109/SECPRI.2004.1301313  0.042
Hide low-probability matches.