Dan S. Wallach
Dan S. Wallach
Professor, Rice University, Department of Computer Science
Verified email at cs.rice.edu - Homepage
TitleCited byYear
Secure routing for structured peer-to-peer overlay networks
M Castro, P Druschel, A Ganesh, A Rowstron, DS Wallach
ACM SIGOPS Operating Systems Review 36 (SI), 299-314, 2002
Practical robust localization over large-scale 802.11 wireless networks
A Haeberlen, E Flannery, AM Ladd, A Rudys, DS Wallach, LE Kavraki
Proceedings of the 10th annual international conference on Mobile computing …, 2004
Robotics-based location sensing using wireless ethernet
AM Ladd, KE Bekris, A Rudys, LE Kavraki, DS Wallach
Wireless Networks 11 (1-2), 189-204, 2005
Analysis of an electronic voting system
T Kohno, A Stubblefield, AD Rubin, DS Wallach
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 27-40, 2004
Quire: Lightweight provenance for smart phone operating systems
M Dietz, S Shekhar, Y Pisetsky, A Shu, DS Wallach
USENIX security symposium 31, 3, 2011
Java security: From HotJava to Netscape and beyond
D Dean, EW Felten, DS Wallach
Proceedings 1996 IEEE Symposium on Security and Privacy, 190-200, 1996
Denial of Service via Algorithmic Complexity Attacks.
SA Crosby, DS Wallach
USENIX Security Symposium, 29-44, 2003
Extensible security architectures for Java
DS Wallach, D Balfanz, D Dean, EW Felten
Proceedings of the sixteenth ACM symposium on Operating systems principles …, 1997
A survey of peer-to-peer security issues
DS Wallach
International symposium on software security, 42-57, 2002
Eclipse attacks on overlay networks: Threats and defenses
A Singh
On the feasibility of using wireless ethernet for indoor localization
AM Ladd, KE Bekris, AP Rudys, DS Wallach, LE Kavraki
IEEE Transactions on Robotics and Automation 20 (3), 555-559, 2004
Adsplit: Separating smartphone advertising from applications
S Shekhar, M Dietz, DS Wallach
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
Web spoofing: An internet con game
EW Felten, D Balfanz, D Dean, DS Wallach
Software World 28 (2), 6-8, 1997
Understanding Java stack inspection
DS Wallach, EW Felten
Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998
Enforcing fair sharing of peer-to-peer resources
DS Wallach, P Druschel
International Workshop on Peer-to-Peer Systems, 149-159, 2003
Performance analysis of TLS Web servers
C Coarfa, P Druschel, DS Wallach
ACM Transactions on Computer Systems (TOCS) 24 (1), 39-69, 2006
Puppeteer: Component-based adaptation for mobile computing
E De Lara, W Zwaenepoel, DS Wallach
Proceedings of the Third Usenix Symposium on Internet Technologies and Systems, 2001
SAFKASI: A security mechanism for language-based systems
DS Wallach, AW Appel, EW Felten
ACM Transactions on Software Engineering and Methodology (TOSEM) 9 (4), 341-378, 2000
Wireless LAN location-sensing for security applications
P Tao, A Rudys, AM Ladd, DS Wallach
Proceedings of the 2nd ACM workshop on Wireless security, 11-20, 2003
Longitudinal analysis of android ad library permissions
T Book, A Pridgen, DS Wallach
arXiv preprint arXiv:1303.0857, 2013
The system can't perform the operation now. Try again later.
Articles 1–20