Secure routing for structured peer-to-peer overlay networks M Castro, P Druschel, A Ganesh, A Rowstron, DS Wallach ACM SIGOPS Operating Systems Review 36 (SI), 299-314, 2002 | 1283 | 2002 |
Practical robust localization over large-scale 802.11 wireless networks A Haeberlen, E Flannery, AM Ladd, A Rudys, DS Wallach, LE Kavraki Proceedings of the 10th annual international conference on Mobile computing …, 2004 | 1005 | 2004 |
Robotics-based location sensing using wireless ethernet AM Ladd, KE Bekris, A Rudys, G Marceau, LE Kavraki, DS Wallach Proceedings of the 8th annual international conference on Mobile computing …, 2002 | 909 | 2002 |
Analysis of an electronic voting system T Kohno, A Stubblefield, AD Rubin, DS Wallach IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 27-40, 2004 | 836 | 2004 |
Denial of service via algorithmic complexity attacks SA Crosby, DS Wallach 12th USENIX Security Symposium (USENIX Security 03), 2003 | 568 | 2003 |
Quire: Lightweight provenance for smart phone operating systems M Dietz, S Shekhar, Y Pisetsky, A Shu, DS Wallach USENIX security symposium 31, 3, 2011 | 521 | 2011 |
Eclipse attacks on overlay networks: Threats and defenses A Singh, TW Ngan, P Druschel, DS Wallach IEEE, 2006 | 463 | 2006 |
Java security: From HotJava to Netscape and beyond D Dean, EW Felten, DS Wallach Proceedings 1996 IEEE Symposium on Security and Privacy, 190-200, 1996 | 462 | 1996 |
Extensible security architectures for Java DS Wallach, D Balfanz, D Dean, EW Felten Proceedings of the sixteenth ACM symposium on Operating systems principles …, 1997 | 413 | 1997 |
A survey of peer-to-peer security issues DS Wallach International symposium on software security, 42-57, 2002 | 406 | 2002 |
{AdSplit}: Separating smartphone advertising from applications S Shekhar, M Dietz, DS Wallach 21st USENIX Security Symposium (USENIX Security 12), 553-567, 2012 | 362 | 2012 |
On the feasibility of using wireless ethernet for indoor localization AM Ladd, KE Bekris, AP Rudys, DS Wallach, LE Kavraki IEEE Transactions on Robotics and Automation 20 (3), 555-559, 2004 | 357 | 2004 |
Web spoofing: An internet con game EW Felten, D Balfanz, D Dean, DS Wallach Software World 28 (2), 6-8, 1997 | 320 | 1997 |
Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching M Majzoobi, M Rostami, F Koushanfar, DS Wallach, S Devadas 2012 IEEE Symposium on Security and Privacy Workshops, 33-44, 2012 | 260 | 2012 |
Efficient data structures for tamper-evident logging. SA Crosby, DS Wallach USENIX security symposium, 317-334, 2009 | 259 | 2009 |
Understanding Java stack inspection DS Wallach, EW Felten Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998 | 241 | 1998 |
Enforcing fair sharing of peer-to-peer resources TWJ Ngan, DS Wallach, P Druschel Peer-to-Peer Systems II: Second International Workshop, IPTPS 2003, Berkeley …, 2003 | 225 | 2003 |
Longitudinal analysis of android ad library permissions T Book, A Pridgen, DS Wallach arXiv preprint arXiv:1303.0857, 2013 | 224 | 2013 |
Performance analysis of TLS Web servers C Coarfa, P Druschel, DS Wallach ACM Transactions on Computer Systems (TOCS) 24 (1), 39-69, 2006 | 224 | 2006 |
Puppeteer: Component-based adaptation for mobile computing E De Lara, DS Wallach 3rd USENIX Symposium on Internet Technologies and Systems (USITS 01), 2001 | 192 | 2001 |