|
|
|
Doug Tygar
Professor
Research Areas
Research Centers
Teaching Schedule
(Fall 2013)
Biography
Doug Tygar is Professor of Computer Science at UC Berkeley and also a Professor of Information Management at UC Berkeley. He works in the areas of computer security, privacy, and electronic commerce. His current research includes privacy, security issues in sensor webs, digital rights management, and usable computer security. His awards include a National Science Foundation Presidential Young Investigator Award, an Okawa Foundation Fellowship, a teaching award from Carnegie Mellon, and invited keynote addresses at PODC, PODS, VLDB, and many other conferences. Doug Tygar has written three books; his book Secure Broadcast Communication in Wired and Wireless Networks (with Adrian Perrig) is a standard reference and has been translated to Japanese. He designed cryptographic postage standards for the US Postal Service and has helped build a number of security and electronic commerce systems including: Strongbox, Dyad, Netbill, and Micro-Tesla. He served as chair of the Defense Department's ISAT Study Group on Security with Privacy, and was a founding board member of ACM's Special Interest Group on Electronic Commerce. He helped create and remains an active member of TRUST (Team for Research in Ubiquitous Security Technologies). TRUST is a new National Science Foundation Science and Technology Center with headquarters at UC Berkeley and involving faculty from Berkeley, Carnegie Mellon, Cornell, Stanford, and Vanderbilt. Before coming to UC Berkeley, Dr. Tygar was tenured faculty at Carnegie Mellon's Computer Science Department, where he continues to hold an Adjunct Professor position. He received his doctorate from Harvard and his undergraduate degree from Berkeley.
Selected Publications
- M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and D. Tygar, "Can Machine Learning Be Secure? (Invited Talk)," in Proc. 2006 ACM Symp. on Information, Computer and Communications Security, New York, NY: ACM Press, 2006, pp. 16-25.
- A. Whitten and D. Tygar, "Why Johnny can't encrypt: A usability evaluation of PGP 5.0," in Security and Usability: Designing Secure Systems That People Can Use, L. Cranor and S. Garfinkel, Eds., Sebastopol, CA: O'Reilly Media, Inc., 2005, pp. 679-702.
- R. Dhamija and D. Tygar, "The battle against phishing: Dynamic security skins," in Proc. 2005 ACM Symp. on Usable Privacy and Security (SOUPS 2005), Vol. 93, New York, NY: ACM Press, 2005, pp. 77-88.
- D. T. Lee, S. P. Shieh, and D. Tygar, Eds., Computer Security in the 21st Century, New York, NY: Springer, 2005.
- R. Bajcsy, A. D. Joseph, V. Paxson, D. Tygar, S. S. Sastry, and other DETER/EMIST Members, "Cyber defense technology networking and evaluation," Communications of the ACM Special Issue: Emerging Technologies for Homeland Security, vol. 47, no. 3, pp. 58-61, March 2004.
- A. Perrig and D. Tygar, Secure Broadcast Communication in Wired and Wireless Networks, Boston, MA: Kluwer Academic Publishers (Springer), 2002.
- A. Perrig, R. Szewczyk, D. Tygar, V. Wen, and D. E. Culler, "MOBICOM 2001 Award Paper: SPINS: Secuity protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, Sep. 2002.
- A. Perrig, R. Canetti, D. Tygar, and D. Song, "The TESLA broadcast authentication protocol," RSA CryptoBytes, vol. 5, no. 2, pp. 1-13, Aug. 2002.
- A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and secure source authentication for multicast," in Proc. 8th Annual Symp. on Network and Distributed System Security (NDSS 2001), Reston, VA: Internet Society, 2001, pp. 35-46.
- A. Perrig, D. Tygar, D. Song, and R. Canetti, "Efficient authentication and signing of multicast streams over lossy channels," in Proc. 2000 IEEE Symp. on Security and Privacy, Los Alamitos, CA: IEEE Computer Society Press, 2000, pp. 56-75.
- D. Tygar and NRC Committee, Trust in Cyberspace, F. B. Schneider, Ed., Washington, D.C.: National Academy Press, 1999.
- M. Harkavy, D. Tygar, and H. Kikuchi, "Electronic auctions with private bids," in Proc. 3rd USENIX Workshop on Electronic Commerce, Berkeley, CA: USENIX Association, 1998, pp. 61-74.
- D. Tygar, "Atomicity in electronic commerce," in Proc. 15th Annual ACM Symp. on Principles of Distributed Computing, New York, NY: ACM Press, 1996, pp. 8-26.
- N. Heintze and D. Tygar, "A model for secure protocols and their compositions," IEEE Trans. Software Engineering, vol. 22, no. 1, pp. 16-30, Jan. 1996.
- B. Yee and D. Tygar, "Secure coprocessors in electronic commerce applications," in Proc. 1st USENIX Workshop on Electronic Commerce, Berkeley, CA: USENIX, 1995, pp. 155-170.
- B. Cox, D. Tygar, and M. Sirbu, "NetBill security and transaction protocol," in Proc. 1st USENIX Workshop on Electronic Commerce, Berkeley, CA: USENIX Association, 1995, pp. 12 pp..
- M. Sirbu and D. Tygar, "NetBill: An Internet commerce system optimized for network delivered services," in Digest of Technical Papers, 40th IEEE Computer Society Intl. Conf. (COMPCON '95): 'Technologies for the Information Superhighway', Los Alamitos, CA: IEEE Computer Society, 1995, pp. 20-25.
|
|
|
|