David Molnar

According to our database1, David Molnar authored at least 50 papers between 2000 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
An Analysis of Different Notions of Effectiveness in k-Anonymity.
Proceedings of the Privacy in Statistical Databases, 2020

2018
Getting Fit for the Future: Optimizing Energy Usage in Existing Buildings by Adding Non-Invasive Sensor Networks.
Proceedings of the 27th IEEE International Symposium on Industrial Electronics, 2018

2017
Prepose: Privacy, Security, and Reliability for Gesture-Based Programming.
IEEE Secur. Priv., 2017

2016
Detection of pulmonary nodule growth with dose reduced chest tomosynthesis: a human observer study using simulated nodules.
Proceedings of the Medical Imaging 2016: Image Perception, Observer Performance, and Technology Assessment, San Diego, California, United States, 27 February, 2016

2015
Fast: A Transducer-Based Language for Tree Manipulation.
ACM Trans. Program. Lang. Syst., 2015

SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Data-Parallel String-Manipulating Programs.
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015

Program Boosting: Program Synthesis via Crowd-Sourcing.
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015

A Framework for Understanding and Designing Telepresence.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

2014
Security and privacy for augmented reality systems.
Commun. ACM, 2014

Zero-effort payments: design, deployment, and lessons.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Coupling of Existing Simulations using Bottom-up Modeling of Choreographies.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014

World-Driven Access Control for Continuous Sensing.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Operating System Support for Augmented Reality Applications.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

2012
Symbolic finite state transducers: algorithms and applications.
Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2012

2011
Fast and Precise Sanitizer Analysis with BEK.
Proceedings of the 20th USENIX Security Symposium, 2011

Enabling Security in Cloud Storage SLAs with CloudProof.
Proceedings of the 2011 USENIX Annual Technical Conference, 2011

Using Services and Service Compositions to Enable the Distributed Execution of Legacy Simulation Applications.
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

Workflow-based Distributed Environment for Legacy Simulation Applications.
Proceedings of the ICSOFT 2011, 2011

SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

This is your data on drugs: lessons computer security can learn from the drug war.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

2009
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate.
IACR Cryptol. ePrint Arch., 2009

Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs.
Proceedings of the 18th USENIX Security Symposium, 2009

2008
RFID security and privacy: long-term research or short-term tinkering?
Proceedings of the First ACM Conference on Wireless Network Security, 2008

2006
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine.
IACR Cryptol. ePrint Arch., 2006

Provably Secure Subsitution of Cryptographic Tools.
IACR Cryptol. ePrint Arch., 2006

From Weak to Strong Watermarking.
IACR Cryptol. ePrint Arch., 2006

Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

2005
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags.
IACR Cryptol. ePrint Arch., 2005

The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks.
IACR Cryptol. ePrint Arch., 2005

Security and Privacy Issues in E-passports.
IACR Cryptol. ePrint Arch., 2005

Generic On-Line/Off-Line Threshold Signatures.
IACR Cryptol. ePrint Arch., 2005

Privacy for RFID through trusted computing.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

Towards a model of energy complexity for algorithms [mobile wireless applications].
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Towards understanding algorithmic factors affecting energy consumption: switching complexity, randomness, and preliminary experiments.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2005

Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs.
Proceedings of the Advances in Cryptology, 2005

2004
Why We Can't Be Bothered to Read Privacy Policies - Models of Privacy Economics as a Lemons Market.
Proceedings of the Economics of Information Security, 2004

Radio frequency Id and privacy with information goods.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

Privacy and security in library RFID: issues, practices, and architectures.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2003
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market.
Proceedings of the 5th International Conference on Electronic Commerce, 2003

2002
Homomorphic Signature Schemes.
Proceedings of the Topics in Cryptology, 2002

2001
On patrol: resource allocation, proofs of work, and consequences.
XRDS, 2001

A Reputation System to Increase MIX-Net Reliability.
Proceedings of the Information Hiding, 4th International Workshop, 2001

2000
Signing electronic contracts.
XRDS, 2000

The Free Haven Project: Distributed Anonymous Storage Service.
Proceedings of the Designing Privacy Enhancing Technologies, 2000


  Loading...