Sandy Clark

According to our database1, Sandy Clark authored at least 15 papers between 2005 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Smearing Fingerprints: Changing the Game of Web Tracking with Composite Privacy.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Smearing Fingerprints: Changing the Game of Web Tracking and Differential Privacy (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

2014
Moving Targets: Security and Rapid-Release in Firefox.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Going Bright: Wiretapping without Weakening Communications Infrastructure.
IEEE Secur. Priv., 2013

2012
Collaborative Red Teaming for Anonymity System Evaluation.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

The Casino and the OODA Loop - Why Our Protocols Always Eventually Fail.
Proceedings of the Security Protocols XX, 2012

2011
Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System.
Proceedings of the 20th USENIX Security Symposium, 2011

One-Way Cryptography.
Proceedings of the Security Protocols XIX, 2011

2010
Blood in the Water - Are there Honeymoon Effects Outside Software?
Proceedings of the Security Protocols XVIII, 2010

Blood in the Water (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Can they hear me now?: a security analysis of law enforcement wiretaps.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Security Evaluation of ES&S Voting Machines and Election Management System.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Bridging the Gap between Vulnerabilities and Threats in Electronic Voting - Abstract.
Proceedings of the Security Protocols XVI, 2008

2005
Signaling Vulnerabilities in Wiretapping Systems.
IEEE Secur. Priv., 2005


  Loading...