Daniel Zappala

According to our database1, Daniel Zappala authored at least 68 papers between 1992 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Distrust of big tech and a desire for privacy: Understanding the motivations of people who have voluntarily adopted secure email.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

2022
Let's Authenticate: Automated Certificates for User Authentication.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Automatic Detection of Fake Key Attacks in Secure Messaging.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Secure Messaging Authentication Ceremonies Are Broken.
IEEE Secur. Priv., 2021

SoK: Securing Email - A Stakeholder-Based Analysis.
Proceedings of the Financial Cryptography and Data Security, 2021

2019
A Usability Study of Four Secure Email Tools Using Paired Participants.
ACM Trans. Priv. Secur., 2019

"Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in Signal.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

I Don't Even Have to Bother Them!: Using Social Media to Automate the Authentication Ceremony in Secure Messaging.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
The Secure Socket API: TLS as an Operating System Service.
login Usenix Mag., 2018

Securing Email.
CoRR, 2018

The Secure Socket API: TLS as an Operating System Service.
Proceedings of the 27th USENIX Security Symposium, 2018

When is a Tree Really a Truck? Exploring Mental Models of Encryption.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

A Comparative Usability Study of Key Management in Secure Email.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

2017
TLS Inspection: How Often and Who Cares?
IEEE Internet Comput., 2017

TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication.
Proceedings of the 26th USENIX Security Symposium, 2017

Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Layering Security at Global Control Points to Secure Unmodified Software.
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017

2016
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication.
CoRR, 2016

Private Webmail 2.0: Simple and Easy-to-Use Secure Email.
Proceedings of the 29th Annual Symposium on User Interface Software and Technology, 2016

Social Authentication for End-to-End Encryption.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

User Attitudes Toward the Inspection of Encrypted Traffic.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Content-based security for the web.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

Condensing Steam: Distilling the Diversity of Gamer Behavior.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

TLS Proxies: Friend or Foe?
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Analyzing the Political Sentiment of Tweets in Farsi.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

"We're on the Same Page": A Usability Study of Secure Email Using Pairs of Novice Users.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

A case study of a systematic attack design method for critical infrastructure cyber-physical systems.
Proceedings of the 2016 American Control Conference, 2016

2015
At Least Tell Me: User Attitudes Toward the Inspection of Encrypted Traffic.
CoRR, 2015

Why Johnny Still, Still Can't Encrypt: Evaluating the Usability of a Modern PGP Client.
CoRR, 2015

MessageGuard: A Browser-based Platform for Usable, Content-Based Encryption Research.
CoRR, 2015

Helping Johnny Understand and Avoid Mistakes: A Comparison of Automatic and Manual Encryption in Email.
CoRR, 2015

Johnny and Jane: Analyzing Secure Email Using Two Novice Users.
CoRR, 2015

2014
POSTER: TLS Proxies: Friend or Foe?
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2012
Quality selection for Dynamic Adaptive Streaming over HTTP with Scalable Video Coding.
Proceedings of the Third Annual ACM SIGMM Conference on Multimedia Systems, 2012

WiFu: A composable toolkit for experimental wireless transport protocols.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

2011
Experimental Performance Evaluation of ATP in a Wireless Mesh Network.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

First-principles modeling of wireless networks for rate control.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

2010
A convex optimization approach to decentralized rate control in wireless networks with partial interference.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

2009
Reducing Source Load in BitTorrent.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

2008
Link quality prediction for wireless devices with multiple radios.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

HxH: a hop-by-hop transport protocol for multi-hop wireless networks.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

A hybrid architecture for massively multiplayer online games.
Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games, 2008

Scalable multicast routing for ad hoc networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Hop-by-hop multicast transport for mobile ad hoc wireless networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Autonomous and Intelligent Radio Switching for heterogeneous wireless networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

2007
RIA: An RF Interference Avoidance Algorithm for Heterogeneous Wireless Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

To Repair or Not To Repair: Helping Ad-hoc Routing Protocols to Distinguish Mobility from Congestion.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2005
A Scenario-Based Performance Evaluation of Multicast Routing Protocols for Ad Hoc Networks.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

Using n-trees for scalable event ordering in peer-to-peer games.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2005

The Scalability of Swarming Peer-to-Peer Content Delivery.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

2004
Alternate path routing for multicast.
IEEE/ACM Trans. Netw., 2004

Spanners and message distribution in networks.
Discret. Appl. Math., 2004

The multicast address allocation problem: theory and practice.
Comput. Networks, 2004

Low latency and cheat-proof event ordering for peer-to-peer games.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2004

A fully distributed architecture for massively multiplayer online games.
Proceedings of the 3rd Workshop on Network and System Support for Games, 2004

Cluster Computing on the Fly: P2P Scheduling of Idle Cycles in the Internet.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

2002
An Evaluation of Shared Multicast Trees with Multiple Cores.
Telecommun. Syst., 2002

Performance evaluation of path searching heuristics for multicast QoS routing.
Proceedings of the 11th International Conference on Computer Communications and Networks, 2002

Modeling the multicast address allocation problem.
Proceedings of the Global Telecommunications Conference, 2002

A theoretical framework for the multicast address allocation problem.
Proceedings of the Global Telecommunications Conference, 2002

2001
An Evaluation of Shared Multicast Trees with Multiple Active Cores.
Proceedings of the Networking, 2001

Using SSM proxies to provide efficient multiple-source multicast delivery.
Proceedings of the Global Telecommunications Conference, 2001

1999
Cyclic Block Allocation: A New Scheme for Hierarchical Multicast Address Allocation.
Proceedings of the Networked Group Communication, 1999

1996
Source Demand Routing: Packet Format and Forwarding Specification (Version 1).
RFC, May, 1996

1993
RSVP: a new resource ReSerVation Protocol.
IEEE Netw., 1993

1992
Exploiting locality to provide adaptive routing of real-time flows in global internets (abstract).
Comput. Commun. Rev., 1992


  Loading...