J. D. Tygar

According to our database1, J. D. Tygar authored at least 94 papers between 1985 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Organisational culture, procedural countermeasures, and employee security behaviour: A qualitative study.
Inf. & Comput. Security, 2017

2016
Evasion and Hardening of Tree Ensemble Classifiers.
Proceedings of the 33nd International Conference on Machine Learning, 2016

The Effect of Organisational Culture on Employee Security Behaviour: A Qualitative Study.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

Reviewer Integration and Performance Measurement for Malware Detection.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Security Analytics in the Context of Adversarial Machine Learning.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

2015
Investigation of Employee Security Behaviour: A Grounded Theory Approach.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015

Remote Operating System Classification over IPv6.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015

2014
Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Large-Margin Convex Polytope Machine.
Proceedings of the Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, 2014

Adversarial Active Learning.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013
A low-bandwidth camera sensor platform with applications in smart camera networks.
TOSN, 2013

Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371).
Dagstuhl Manifestos, 2013


2012
Query Strategies for Evading Convex-Inducing Classifiers.
Journal of Machine Learning Research, 2012

Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371).
Dagstuhl Reports, 2012

Systematic analysis and evaluation of web privacy policies and implementations.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Robust detection of comment spam using entropy rate.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

2011
Adversarial Machine Learning.
IEEE Internet Computing, 2011

Secure group key management using uni-directional proxy re-encryption schemes.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Adversarial machine learning.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

2010
Secure encrypted-data aggregation for wireless sensor networks.
Wireless Networks, 2010

The security of machine learning.
Machine Learning, 2010

Near-Optimal Evasion of Convex-Inducing Classifiers.
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010

Classifier Evasion: Models and Open Problems.
Proceedings of the Privacy and Security Issues in Data Mining and Machine Learning, 2010

CAPTCHA Using Strangeness in Machine Translation.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Stealthy poisoning attacks on PCA-based anomaly detectors.
SIGMETRICS Performance Evaluation Review, 2009

A power-preserving broadcast protocol for wireless sensor networks.
IJSNet, 2009

OSNP: Secure wireless authentication protocol using one-time key.
Computers & Security, 2009

Conditioned-safe ceremonies and a user study of an application to web authentication.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication.
Proceedings of the Network and Distributed System Security Symposium, 2009

ANTIDOTE: understanding and defending against poisoning of anomaly detectors.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

2008
SWOON: A Testbed for Secure Wireless Overlay Networks.
Proceedings of the Workshop on Cyber Security and Test, 2008

Evading Anomaly Detection through Variance Injection Attacks on PCA.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Characterizing Botnets from Email Spam Records.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

Exploiting Machine Learning to Subvert Your Spam Filter.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

A User Study Design for Comparing the Security of Registration Protocols.
Proceedings of the Usability, Psychology, and Security, 2008

CITRIC: A low-bandwidth wireless camera network platform.
Proceedings of the 2008 Second ACM/IEEE International Conference on Distributed Smart Cameras, 2008

A Power-Preserving Broadcast Protocol for WSNs with DoS Resistance.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

Open problems in the security of learning.
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008

2007
Injecting Heterogeneity Through Protocol Randomization.
I. J. Network Security, 2007

Optimal ROC Curve for a Combination of Classifiers.
Proceedings of the Advances in Neural Information Processing Systems 20, 2007

Dynamic pharming attacks and locked same-origin policies for web browsers.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

2006
Why phishing works.
Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

Can machine learning be secure?
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction.
RFC, June, 2005

The battle against phishing: Dynamic Security Skins.
Proceedings of the 1st Symposium on Usable Privacy and Security, 2005

Panel: Authentication in Constrained Environments.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

When Computer Security Crashes into Multimedia.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005

Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks.
Proceedings of the Human Interactive Proofs, Second International Workshop, 2005

Collaborative Filtering CAPTCHAs.
Proceedings of the Human Interactive Proofs, Second International Workshop, 2005

Keyboard acoustic emanations revisited.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Cyber defense technology networking and evaluation.
Commun. ACM, 2004

Side Effects Are Not Sufficient to Authenticate Software.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Distillation Codes and Applications to DoS Resistant Multicast Authentication.
Proceedings of the Network and Distributed System Security Symposium, 2004

Image Recognition CAPTCHAs.
Proceedings of the Information Security, 7th International Conference, 2004

2003
Secure broadcast communication in wired and wireless networks.
Springer, ISBN: 978-0-7923-7650-7, 2003

2002
SPINS: Security Protocols for Sensor Networks.
Wireless Networks, 2002

Expander Graphs for Digital Stream Authentication and Robust Overlay Networks.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Privacy in Sensor Webs and Distributed Information Systems.
Proceedings of the Software Security -- Theories and Systems, 2002

2001
ELK, A New Protocol for Efficient Large-Group Key Distribution.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Efficient and Secure Source Authentication for Multicast.
Proceedings of the Network and Distributed System Security Symposium, 2001

SPINS: security protocols for sensor netowrks.
Proceedings of the MOBICOM 2001, 2001

SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

2000
Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

1999
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999

Open Problems in Electronic Commerce.
Proceedings of the Eighteenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, May 31, 1999

1998
Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce.
Proceedings of the VLDB'98, 1998

Electronic Auctions with Private Bids.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998

1997
Limits of Microtransaction Systems.
Proceedings of the Next Generation Information Technologies and Systems (NGITS '97), Third International Workshop, Neve Ilan, Israel, June 30, 1997

1996
Atomicity in Electronic Commerce.
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996

Cryptographic Postage Indicia.
Proceedings of the Concurrency and Parallelism, 1996

1995
Optimal Sampling Strategies for Quicksort.
Random Struct. Algorithms, 1995

Token and Notational Money in Electronic Commerce.
Proceedings of the First USENIX Workshop on Electronic Commerce, 1995

How are We Going to Pay for This? Fee-for-Service in Distributed Systems: Research and Policy Issues (Panel).
Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, British Columbia, Canada, May 30, 1995

Completely Asynchronous Optimistic Recovery with Minimal Rollbacks.
Proceedings of the Digest of Papers: FTCS-25, 1995

NetBill: An Internet Commerce System Optimized for Network Delivered Services.
Proceedings of the COMPCON '95: Technologies for the Information Superhighway, 1995

1994
Providing Auditing While Protecting Privacy.
Inf. Soc., 1994

Computability and Complexity of Ray Tracing.
Discrete & Computational Geometry, 1994

Specifying and Checking UNIX Security Constraints.
Computing Systems, 1994

A model for secure protocols and their compositions.
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

1993
Geometric characterization of series-parallel variable resistor networks.
Proceedings of the 1993 IEEE International Symposium on Circuits and Systems, 1993

1990
Miró: Visual Specification of Security.
IEEE Trans. Software Eng., 1990

The Computability and Complexity of Optical Beam Tracing
Proceedings of the 31st Annual Symposium on Foundations of Computer Science, 1990

1989
Micro tools.
Proceedings of the IEEE Workshop on Visual Languages, 1989

Constraining Pictures with Pictures.
IFIP Congress, 1989

ITOSS: An Integrated Toolkit For Operating System Security.
Proceedings of the Foundations of Data Organization and Algorithms, 1989

1988
Efficient Parallel Pseudorandom Number Generation.
SIAM J. Comput., 1988

Miro semantics for security.
Proceedings of the IEEE Workshop on Visual Languages, 1988

1987
How to Make Replicated Data Secure.
Proceedings of the Advances in Cryptology, 1987

1985
Efficient netlist comparison using hierarchy and randomization.
Proceedings of the 22nd ACM/IEEE conference on Design automation, 1985

Efficient Parallel Pseudo-Random Number Generation.
Proceedings of the Advances in Cryptology, 1985


  Loading...