Dan S. Wallach
Dan S. Wallach
Professor, Rice University, Department of Computer Science
Verified email at cs.rice.edu - Homepage
TitleCited byYear
Secure routing for structured peer-to-peer overlay networks
M Castro, P Druschel, A Ganesh, A Rowstron, DS Wallach
ACM SIGOPS Operating Systems Review 36 (SI), 299-314, 2002
11622002
Practical robust localization over large-scale 802.11 wireless networks
A Haeberlen, E Flannery, AM Ladd, A Rudys, DS Wallach, LE Kavraki
Proceedings of the 10th annual international conference on Mobile computing …, 2004
8482004
Robotics-based location sensing using wireless ethernet
AM Ladd, KE Bekris, A Rudys, LE Kavraki, DS Wallach
Wireless Networks 11 (1-2), 189-204, 2005
8122005
Analysis of an electronic voting system
T Kohno, A Stubblefield, AD Rubin, DS Wallach
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 27-40, 2004
6862004
Quire: Lightweight provenance for smart phone operating systems
M Dietz, S Shekhar, Y Pisetsky, A Shu, DS Wallach
USENIX security symposium 31, 3, 2011
4462011
Denial of Service via Algorithmic Complexity Attacks.
SA Crosby, DS Wallach
USENIX Security Symposium, 29-44, 2003
4322003
Java security: From HotJava to Netscape and beyond
D Dean, EW Felten, DS Wallach
Proceedings 1996 IEEE Symposium on Security and Privacy, 190-200, 1996
4281996
Extensible security architectures for Java
DS Wallach, D Balfanz, D Dean, EW Felten
SOSP 97, 116-128, 1997
3831997
A survey of peer-to-peer security issues
DS Wallach
International symposium on software security, 42-57, 2002
3642002
Eclipse attacks on overlay networks: Threats and defenses
A Singh
In IEEE INFOCOM, 2006
3322006
On the feasibility of using wireless ethernet for indoor localization
AM Ladd, KE Bekris, AP Rudys, DS Wallach, LE Kavraki
IEEE Transactions on Robotics and Automation 20 (3), 555-559, 2004
3092004
Adsplit: Separating smartphone advertising from applications
S Shekhar, M Dietz, DS Wallach
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
2812012
Web spoofing: An internet con game
EW Felten, D Balfanz, D Dean, DS Wallach
Software World 28 (2), 6-8, 1997
2771997
Understanding Java stack inspection
DS Wallach, EW Felten
Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998
2271998
Enforcing fair sharing of peer-to-peer resources
DS Wallach, P Druschel
International Workshop on Peer-to-Peer Systems, 149-159, 2003
2102003
Performance analysis of TLS Web servers
C Coarfa, P Druschel, DS Wallach
ACM Transactions on Computer Systems (TOCS) 24 (1), 39-69, 2006
1922006
Puppeteer: Component-based adaptation for mobile computing
E De Lara, W Zwaenepoel, DS Wallach
Proceedings of the Third Usenix Symposium on Internet Technologies and Systems, 2001
1812001
SAFKASI: A security mechanism for language-based systems
DS Wallach, AW Appel, EW Felten
ACM Transactions on Software Engineering and Methodology (TOSEM) 9 (4), 341-378, 2000
1562000
Wireless LAN location-sensing for security applications
P Tao, A Rudys, AM Ladd, DS Wallach
Proceedings of the 2nd ACM workshop on Wireless security, 11-20, 2003
1502003
Longitudinal analysis of android ad library permissions
T Book, A Pridgen, DS Wallach
arXiv preprint arXiv:1303.0857, 2013
1472013
The system can't perform the operation now. Try again later.
Articles 1–20