Faculty Publications - Doug Tygar


Book chapters or sections

  • B. I. P. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S. Lau, N. Taft, and D. Tygar, "Evading anomaly detection through variance injection attacks on PCA (Winner, RAID '08 Best Poster Award)," in Recent Advances in Intrusion Detection: Proc. 11th Intl. Symp. (RAID 2008), R. Lippmann, E. Kirda, and A. Trachtenberg, Eds., Lecture Notes in Computer Science, Vol. 5230, Berlin, Germany: Springer-Verlag, 2008, pp. 394-394.
  • C. C. Lin, Y. C. Lai, D. Tygar, C. K. Yang, and C. L. Chiang, "Coexistence proof using chain of timestamps for multiple RFID tags," in Advances in Web and Network Technologies, and Information Management, K. C. C. Chang, W. Wang, L. Chen, C. A. Ellis, C. H. Hsu, A. C. Tsoi, and H. Wang, Eds., Lecture Notes in Computer Science, Vol. 4537, Berlin, Germany: Springer-Verlag, 2007, pp. 634-643.
  • A. Whitten and D. Tygar, "Why Johnny can't encrypt: A usability evaluation of PGP 5.0," in Security and Usability: Designing Secure Systems That People Can Use, L. Cranor and S. Garfinkel, Eds., Sebastopol, CA: O'Reilly Media, Inc., 2005, pp. 679-702.
  • Y. Li, D. Tygar, and J. M. Hellerstein, "Private Matching," in Computer Security in the 21st Century, D. T. Lee, S. P. Shieh, and D. Tygar, Eds., New York, NY: Springer Science+Business Media, Inc., 2005, pp. 25-50.

Articles in journals or magazines

Articles in conference proceedings

Technical Reports