|
|
|
Books
- D. T. Lee, S. P. Shieh, and D. Tygar, Eds., Computer Security in the 21st Century, New York, NY: Springer, 2005. [abstract]
- D. T. Lee, S. P. Shieh, and D. Tygar, Eds., Computer Security in the 21st Century, New York, NY: Springer, 2005. [abstract]
- A. Perrig and D. Tygar, Secure Broadcast Communication in Wired and Wireless Networks, Boston, MA: Kluwer Academic Publishers (Springer), 2003. [abstract]
- A. Perrig and D. Tygar, Secure Broadcast Communication in Wired and Wireless Networks, Boston, MA: Kluwer Academic Publishers (Springer), 2002. [abstract]
- NRC Com. on Information Systems Trustworthiness, Trust in Cyberspace, F. B. Schneider, Ed., Washington, D.C.: National Academy Press, 1999. [abstract]
- D. Tygar and NRC Committee, Trust in Cyberspace, F. B. Schneider, Ed., Washington, D.C.: National Academy Press, 1999. [abstract]
Book chapters or sections
- B. I. P. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S. Lau, N. Taft, and D. Tygar, "Evading anomaly detection through variance injection attacks on PCA (Winner, RAID '08 Best Poster Award)," in Recent Advances in Intrusion Detection: Proc. 11th Intl. Symp. (RAID 2008), R. Lippmann, E. Kirda, and A. Trachtenberg, Eds., Lecture Notes in Computer Science, Vol. 5230, Berlin, Germany: Springer-Verlag, 2008, pp. 394-394.
- C. C. Lin, Y. C. Lai, D. Tygar, C. K. Yang, and C. L. Chiang, "Coexistence proof using chain of timestamps for multiple RFID tags," in Advances in Web and Network Technologies, and Information Management, K. C. C. Chang, W. Wang, L. Chen, C. A. Ellis, C. H. Hsu, A. C. Tsoi, and H. Wang, Eds., Lecture Notes in Computer Science, Vol. 4537, Berlin, Germany: Springer-Verlag, 2007, pp. 634-643.
- A. Whitten and D. Tygar, "Why Johnny can't encrypt: A usability evaluation of PGP 5.0," in Security and Usability: Designing Secure Systems That People Can Use, L. Cranor and S. Garfinkel, Eds., Sebastopol, CA: O'Reilly Media, Inc., 2005, pp. 679-702.
- Y. Li, D. Tygar, and J. M. Hellerstein, "Private Matching," in Computer Security in the 21st Century, D. T. Lee, S. P. Shieh, and D. Tygar, Eds., New York, NY: Springer Science+Business Media, Inc., 2005, pp. 25-50.
Articles in journals or magazines
- L. Zhuang, D. Tygar, and R. Dhamija, "Injecting heterogeneity through protocol randomization," Intl. J. Network Security, vol. 4, no. 1, pp. 45-58, Jan. 2007.
- R. Bajcsy, A. D. Joseph, V. Paxson, D. Tygar, S. S. Sastry, and other DETER/EMIST Members, "Cyber defense technology networking and evaluation," Communications of the ACM Special Issue: Emerging Technologies for Homeland Security, vol. 47, no. 3, pp. 58-61, March 2004.
- A. Perrig, R. Canetti, D. Tygar, and D. Song, "The TESLA broadcast authentication protocol," RSA Cryptobytes, vol. 5, no. 2, pp. 2-13, 2002.
- A. Perrig, R. Szewczyk, D. Tygar, V. Wen, and D. E. Culler, "MOBICOM 2001 Award Paper: SPINS: Secuity protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, Sep. 2002.
- A. Perrig, R. Canetti, D. Tygar, and D. Song, "The TESLA broadcast authentication protocol," RSA CryptoBytes, vol. 5, no. 2, pp. 1-13, Aug. 2002.
- N. Heintze and D. Tygar, "A model for secure protocols and their compositions," IEEE Trans. Software Engineering, vol. 22, no. 1, pp. 16-30, Jan. 1996.
Articles in conference proceedings
- A. Kantchelian, J. Ma, L. Huang, S. Afroz, A. D. Joseph, and D. Tygar, "Robust detection of comment spam using entropy rate," in Proceedings of the 5th ACM workshop on Security and artificial intelligence, AISec'12, New York, NY, USA: ACM, 2012, pp. 59--70.
- M. Barreno, P. Bartlett, F. J. Chi, A. D. Joseph, B. Nelson, B. I. P. Rubinstein, U. Saini, and D. Tygar, "Open problems in the security of learning (Position Paper)," in Proc. 1st ACM Workshop on AISec (AISec 2008), New York, NY: The Association for Computing Machinery, Inc., 2008, pp. 19-26.
- P. Chen, P. Ahammad, C. boyer, S. I. Huang, L. Lin, E. Lobaton, M. meingast, S. Oh, S. Wang, P. Yan, A. Y. Yang, C. Yeo, L. C. Chang, D. Tygar, and S. S. Sastry, "CITRIC: A low-bandwidth wireless camera network platform," in Proc. 2nd ACM/IEEE Intl. Conf. on Distributed Smart Cameras (ICDSC 2008), Piscataway, NJ: IEEE Press, 2008, pp. 10 pg.
- L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, I. Osipkov, G. Hulten, and D. Tygar, "Characterizing botnets from email spam records," in Proc. 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEFT 2008), Berkeley, CA: USENIX Association, 2008, pp. 9 pg..
- B. Nelson, M. Barreno, F. J. Chi, A. D. Joseph, B. I. P. Rubinstein, U. Saini, C. Sutton, D. Tygar, and K. Xia, "Exploiting machine learning to subvert your spam filter," in Proc. 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEFT 2008), Berkeley, CA: USENIX Association, 2008, pp. 9 pg.
- C. Karlof, D. Tygar, and D. Wagner, "A user study design for comparing the security of registration protocols," in Proc. 1st USENIX Conf. on Usability, Psychology, and Security (UPSEC 2008), E. Churchill and R. Dhamija, Eds., Berkeley, CA: USENIX Association, 2008, pp. Art. 12.
- C. Karlof, U. Shankar, D. Tygar, and D. Wagner, "Dynamic pharming attacks and locked same-origin policies for web browsers," in Proc. 14th ACM Conf. on Computer and Communications Security (CCS 2007), S. De Capitani di Vimerca, P. Syverson, and D. Evans, Eds., New York, NY: The Association for Computing Machinery, Inc., 2007, pp. 58-71.
- M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and D. Tygar, "Can Machine Learning Be Secure? (Invited Talk)," in Proc. 2006 ACM Symp. on Information, Computer and Communications Security, New York, NY: ACM Press, 2006, pp. 16-25.
- R. Dhamija and D. Tygar, "The battle against phishing: Dynamic security skins," in Proc. 2005 ACM Symp. on Usable Privacy and Security (SOUPS 2005), Vol. 93, New York, NY: ACM Press, 2005, pp. 77-88.
- D. Song, D. Zuckerman, and D. Tygar, "Expander graphs for digital stream authentication and robust overlay networks," in Proc. 2002 IEEE Symp. on Security and Privacy (SP '02), Los Alamitos, CA: IEEE Computer Society, 2002, pp. 258-270.
- A. Perrig, D. Song, and D. Tygar, "ELK, a new protocol for Efficient Large-group Key distribution," in Proc. 2001 IEEE Symp. on Security and Privacy (SP '01), Los Alamitos, CA: IEEE Computer Society, 2001, pp. 247-262.
- A. Perrig, S. Smith, D. Song, and D. Tygar, "SAM: A flexible and secure auction architecture using trusted hardware," in Proc. 15th Intl. Parallel and Distributed Processing Symp. (IPDPS 2001), Los Alamitos, CA: IEEE Computer Society, 2001, pp. 1764-1773.
- A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and secure source authentication for multicast," in Proc. 8th Annual Symp. on Network and Distributed System Security (NDSS '01), Reston, VA: Internet Society, 2001, pp. 12 pg.
- A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and secure source authentication for multicast," in Proc. 8th Annual Symp. on Network and Distributed System Security (NDSS 2001), Reston, VA: Internet Society, 2001, pp. 35-46.
- A. Perrig, R. Canetti, D. Tygar, and D. Song, "Efficient authentication and signing of multicast streams over lossy channels," in Proc. 2000 IEEE Symp. on Security and Privacy (SP '00), Los Alamitos, CA: IEEE Computer Society, 2000, pp. 56-73.
- A. Perrig, D. Tygar, D. Song, and R. Canetti, "Efficient authentication and signing of multicast streams over lossy channels," in Proc. 2000 IEEE Symp. on Security and Privacy, Los Alamitos, CA: IEEE Computer Society Press, 2000, pp. 56-75.
- M. Harkavy, D. Tygar, and H. Kikuchi, "Electronic auctions with private bids," in Proc. 3rd USENIX Workshop on Electronic Commerce, Berkeley, CA: USENIX Association, 1998, pp. 61-74.
- D. Tygar, "Atomicity in electronic commerce," in Proc. 15th Annual ACM Symp. on Principles of Distributed Computing, New York, NY: ACM Press, 1996, pp. 8-26.
- B. Yee and D. Tygar, "Secure coprocessors in electronic commerce applications," in Proc. 1st USENIX Workshop on Electronic Commerce, Berkeley, CA: USENIX, 1995, pp. 155-170.
- B. Cox, D. Tygar, and M. Sirbu, "NetBill security and transaction protocol," in Proc. 1st USENIX Workshop on Electronic Commerce, Berkeley, CA: USENIX Association, 1995, pp. 12 pp..
- M. Sirbu and D. Tygar, "NetBill: An Internet commerce system optimized for network delivered services," in Digest of Technical Papers, 40th IEEE Computer Society Intl. Conf. (COMPCON '95): 'Technologies for the Information Superhighway', Los Alamitos, CA: IEEE Computer Society, 1995, pp. 20-25.
Technical Reports
- B. I. P. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S. Lau, N. Taft, and D. Tygar, "Compromising PCA-based Anomaly Detectors for Network-Wide Traffic," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2008-73, May 2008. [abstract]
- P. W. Chen, P. Ahammad, C. Boyer, S. Huang, L. Lin, E. J. Lobaton, M. L. Meingast, S. Oh, S. Wang, P. Yan, A. Yang, C. Yeo, L. Chang, D. Tygar, and S. S. Sastry, "CITRIC: A Low-Bandwidth Wireless Camera Network Platform," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2008-50, May 2008. [abstract]
- M. Barreno, B. A. Nelson, A. D. Joseph, and D. Tygar, "The Security of Machine Learning," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2008-43, April 2008. [abstract]
- C. K. Karlof, U. Shankar, D. Tygar, and D. Wagner, "Dynamic pharming attacks and the locked same-origin policies for web browsers," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2007-52, May 2007. [abstract]
- C. K. Karlof, U. Shankar, D. Tygar, and D. Wagner, "Locked cookies: Web authentication security against phishing, pharming, and active attacks," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2007-25, Feb. 2007. [abstract]
- Y. Li, D. Tygar, and J. M. Hellerstein, "Private Matching," Intel Research Berkeley, Tech. Rep. IRB-TR-04-005, Feb. 2004.
Patents
- L. J. Camp, J. D. Tygar, and M. R. Harkavy, "Anonymous certified delivery," U.S. Patent 6,076,078. June 2000.
- M. A. Sirbu, J. D. Tygar, B. T. H. Cox, and T. Wagner, "Method and apparatus for purchasing and delivering digital goods over a network," U.S. Patent 5,809,144. Sep. 1998.
Miscellaneous
|
|
|