Seguir
Mark Gondree
Mark Gondree
Dirección de correo verificada de sonoma.edu - Página principal
Título
Citado por
Citado por
Año
A position paper on data sovereignty: The importance of geolocating data in the cloud
ZNJ Peterson, M Gondree, R Beverly
3rd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 11), 2011
1472011
Geolocation of data in the cloud
M Gondree, ZNJ Peterson
Proceedings of the third ACM conference on Data and application security and …, 2013
1092013
Security through play
M Gondree, ZNJ Peterson, T Denning
IEEE Security & Privacy 11 (3), 64-67, 2013
692013
The outcomes of cybersecurity competitions and implications for underrepresented populations
P Pusey, M Gondree, Z Peterson
IEEE Security & Privacy 14 (6), 90-95, 2016
522016
Valuing Security by Getting {[d0x3d!]}: Experiences with a Network Security Board Game
M Gondree, ZNJ Peterson
6th Workshop on Cyber Security Experimentation and Test (CSET 13), 2013
462013
Fixing federal e-voting standards
E Barr, M Bishop, M Gondree
Communications of the ACM 50 (3), 19-24, 2007
462007
This is not a game: Early observations on using alternate reality games for teaching security concepts to {First-Year} undergraduates
T Flushman, M Gondree, ZNJ Peterson
8th Workshop on Cyber Security Experimentation and Test (CSET 15), 2015
432015
DEFY: A deniable, encrypted file system for log-structured storage
TM Peters, MA Gondree, ZNJ Peterson
432015
A cloud-oriented cross-domain security architecture
TD Nguyen, MA Gondree, DJ Shifflett, J Khosalim, TE Levin, CE Irvine
MILITARY COMMUNICATIONS CONFERENCE, 2010-MILCOM 2010, 441-447, 2010
302010
Improved efficiency for private stable matching
M Franklin, M Gondree, P Mohassel
Topics in Cryptology–CT-RSA 2007: The Cryptographers’ Track at the RSA …, 2006
272006
Multi-party indirect indexing and applications
M Franklin, M Gondree, P Mohassel
Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007
182007
MYSEA: the Monterey security architecture
CE Irvine, TD Nguyen, DJ Shifflett, TE Levin, J Khosalim, C Prince, ...
Proceedings of the 2009 ACM workshop on Scalable trusted computing, 39-48, 2009
162009
Communication-efficient private protocols for longest common subsequence
M Franklin, M Gondree, P Mohassel
Cryptographers’ Track at the RSA Conference, 265-278, 2009
162009
Talking about talking about cybersecurity games
M Gondree, ZNJ Peterson, P Pusey
login Usenix Mag. 41 (1), 2016
152016
DoS exploitation of allen-bradley's legacy protocol through fuzz testing
F Tacliad, TD Nguyen, M Gondree
Proceedings of the 3rd Annual Industrial Control System Security Workshop, 24-31, 2017
142017
Longest common subsequence as private search
M Gondree, P Mohassel
Proceedings of the 8th ACM workshop on Privacy in the electronic society, 81-90, 2009
142009
Asset criticality in mission reconfigurable cyber systems and its contribution to key cyber terrain
P Price, N Leyba, M Gondree, Z Staples, T Parker
122017
A critique of the 2002 FEC VSPT e-voting standards
M Gondree, P Wheeler, D DeFigueiredo
Department of Computer Science University of California at Davis, Tech. Rep, 2005
112005
Towards a cross-domain MapReduce framework
TD Nguyen, MA Gondree, J Khosalim, CE Irvine
MILCOM 2013-2013 IEEE Military Communications Conference, 1436-1441, 2013
92013
A position on data sovereignty: The importance of geolocating data in the cloud
ZNJ Peterson, M Gondree, R Beverly
HotCloud: Proceedings of the 3rd USENIX conference of Hot topic in Cloud …, 2011
72011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20