Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: David Molnar
@inproceedings{DBLP:conf/psd/SarcevicMM20, author = {Tanja Sarcevic and David Molnar and Rudolf Mayer}, editor = {Josep Domingo{-}Ferrer and Krishnamurty Muralidhar}, title = {An Analysis of Different Notions of Effectiveness in k-Anonymity}, booktitle = {Privacy in Statistical Databases - {UNESCO} Chair in Data Privacy, International Conference, {PSD} 2020, Tarragona, Spain, September 23-25, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12276}, pages = {121--135}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57521-2\_9}, doi = {10.1007/978-3-030-57521-2\_9}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/psd/SarcevicMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isie/SauterTDMLKDSW18, author = {Thilo Sauter and Albert Treytl and Konrad Diwold and David Molnar and Daniel Lechner and Lukas Krammer and Bernhard Derler and Christian Seidl and Florian Wenig}, title = {Getting Fit for the Future: Optimizing Energy Usage in Existing Buildings by Adding Non-Invasive Sensor Networks}, booktitle = {27th {IEEE} International Symposium on Industrial Electronics, {ISIE} 2018, Cairns, Australia, June 13-15, 2018}, pages = {963--968}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISIE.2018.8433768}, doi = {10.1109/ISIE.2018.8433768}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isie/SauterTDMLKDSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/FigueiredoMVL17, author = {Lucas Silva Figueiredo and David Molnar and Margus Veanes and Benjamin Livshits}, title = {Prepose: Privacy, Security, and Reliability for Gesture-Based Programming}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {2}, pages = {14--23}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.44}, doi = {10.1109/MSP.2017.44}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/FigueiredoMVL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/miipop/SodermanJVNMMSM16, author = {Christina S{\"{o}}derman and {\AA}se Johnsson and Jenny Vikgren and Rauni Rossi Norrlund and David Molnar and Maral Mirzai and Angelica Svalkvist and Lars Gunnar M{\aa}nsson and Magnus B{\aa}th}, editor = {Craig K. Abbey and Matthew A. Kupinski}, title = {Detection of pulmonary nodule growth with dose reduced chest tomosynthesis: a human observer study using simulated nodules}, booktitle = {Medical Imaging 2016: Image Perception, Observer Performance, and Technology Assessment, San Diego, California, United States, 27 February - 3 March 2016}, series = {{SPIE} Proceedings}, volume = {9787}, pages = {97870P}, publisher = {{SPIE}}, year = {2016}, url = {https://doi.org/10.1117/12.2216950}, doi = {10.1117/12.2216950}, timestamp = {Wed, 09 May 2018 18:47:54 +0200}, biburl = {https://dblp.org/rec/conf/miipop/SodermanJVNMMSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FigueiredoLMV16, author = {Lucas Silva Figueiredo and Benjamin Livshits and David Molnar and Margus Veanes}, title = {Prepose: Privacy, Security, and Reliability for Gesture-Based Programming}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {122--137}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.16}, doi = {10.1109/SP.2016.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/FigueiredoLMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/DAntoniVLM15, author = {Loris D'Antoni and Margus Veanes and Benjamin Livshits and David Molnar}, title = {Fast: {A} Transducer-Based Language for Tree Manipulation}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {38}, number = {1}, pages = {1:1--1:32}, year = {2015}, url = {https://doi.org/10.1145/2791292}, doi = {10.1145/2791292}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toplas/DAntoniVLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscw/RaeVTM15, author = {Irene Rae and Gina Venolia and John C. Tang and David Molnar}, editor = {Dan Cosley and Andrea Forte and Luigina Ciolfi and David McDonald}, title = {A Framework for Understanding and Designing Telepresence}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer Supported Cooperative Work {\&} Social Computing, {CSCW} 2015, Vancouver, BC, Canada, March 14 - 18, 2015}, pages = {1552--1566}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2675133.2675141}, doi = {10.1145/2675133.2675141}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscw/RaeVTM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/VeanesMML15, author = {Margus Veanes and Todd Mytkowicz and David Molnar and Benjamin Livshits}, editor = {Sriram K. Rajamani and David Walker}, title = {Data-Parallel String-Manipulating Programs}, booktitle = {Proceedings of the 42nd Annual {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, {POPL} 2015, Mumbai, India, January 15-17, 2015}, pages = {139--152}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2676726.2677014}, doi = {10.1145/2676726.2677014}, timestamp = {Mon, 08 Apr 2024 08:19:10 +0200}, biburl = {https://dblp.org/rec/conf/popl/VeanesMML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/CochranDLMV15, author = {Robert A. Cochran and Loris D'Antoni and Benjamin Livshits and David Molnar and Margus Veanes}, editor = {Sriram K. Rajamani and David Walker}, title = {Program Boosting: Program Synthesis via Crowd-Sourcing}, booktitle = {Proceedings of the 42nd Annual {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, {POPL} 2015, Mumbai, India, January 15-17, 2015}, pages = {677--688}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2676726.2676973}, doi = {10.1145/2676726.2676973}, timestamp = {Wed, 23 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/popl/CochranDLMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/VilkMLORMWG15, author = {John Vilk and David Molnar and Benjamin Livshits and Eyal Ofek and Christopher J. Rossbach and Alexander Moshchuk and Helen J. Wang and Ran Gal}, title = {SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {431--446}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.33}, doi = {10.1109/SP.2015.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/VilkMLORMWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/KoscherKM15, author = {Karl Koscher and Tadayoshi Kohno and David Molnar}, editor = {Aur{\'{e}}lien Francillon and Thomas Ptacek}, title = {{SURROGATES:} Enabling Near-Real-Time Dynamic Analyses of Embedded Systems}, booktitle = {9th {USENIX} Workshop on Offensive Technologies, {WOOT} '15, Washington, DC, USA, August 10-11, 2015}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/woot15/workshop-program/presentation/koscher}, timestamp = {Mon, 01 Feb 2021 08:41:51 +0100}, biburl = {https://dblp.org/rec/conf/woot/KoscherKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/RoesnerKM14, author = {Franziska Roesner and Tadayoshi Kohno and David Molnar}, title = {Security and privacy for augmented reality systems}, journal = {Commun. {ACM}}, volume = {57}, number = {4}, pages = {88--96}, year = {2014}, url = {https://doi.org/10.1145/2580723.2580730}, doi = {10.1145/2580723.2580730}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/RoesnerKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RoesnerMMKW14, author = {Franziska Roesner and David Molnar and Alexander Moshchuk and Tadayoshi Kohno and Helen J. Wang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {World-Driven Access Control for Continuous Sensing}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1169--1181}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660319}, doi = {10.1145/2660267.2660319}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RoesnerMMKW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/WeissKMS14, author = {Andreas Wei{\ss} and Dimka Karastoyanova and David Molnar and Siegfried Schmauder}, editor = {Erhard Pl{\"{o}}dereder and Lars Grunske and Eric Schneider and Dominik Ull}, title = {Coupling of Existing Simulations using Bottom-up Modeling of Choreographies}, booktitle = {44. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Big Data - Komplexit{\"{a}}t meistern, {INFORMATIK} 2014, Stuttgart, Germany, September 22-26, 2014}, series = {{LNI}}, volume = {{P-232}}, pages = {101--112}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/2770}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/WeissKMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/SmowtonLMSW14, author = {Christopher Smowton and Jacob R. Lorch and David Molnar and Stefan Saroiu and Alec Wolman}, editor = {A. J. Brush and Adrian Friday and Julie A. Kientz and James Scott and Junehwa Song}, title = {Zero-effort payments: design, deployment, and lessons}, booktitle = {Proceedings of the 2014 {ACM} International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '14, Seattle, WA, USA, September 13-17, 2014}, pages = {763--774}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2632048.2632067}, doi = {10.1145/2632048.2632067}, timestamp = {Tue, 26 Mar 2024 11:01:21 +0100}, biburl = {https://dblp.org/rec/conf/huc/SmowtonLMSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/DAntoniVLM14, author = {Loris D'Antoni and Margus Veanes and Benjamin Livshits and David Molnar}, editor = {Michael F. P. O'Boyle and Keshav Pingali}, title = {Fast: a transducer-based language for tree manipulation}, booktitle = {{ACM} {SIGPLAN} Conference on Programming Language Design and Implementation, {PLDI} '14, Edinburgh, United Kingdom - June 09 - 11, 2014}, pages = {384--394}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2594291.2594309}, doi = {10.1145/2594291.2594309}, timestamp = {Thu, 24 Jun 2021 16:19:30 +0200}, biburl = {https://dblp.org/rec/conf/pldi/DAntoniVLM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotos/DAntoniDJKLMMORSVW13, author = {Loris D'Antoni and Alan M. Dunn and Suman Jana and Tadayoshi Kohno and Benjamin Livshits and David Molnar and Alexander Moshchuk and Eyal Ofek and Franziska Roesner and T. Scott Saponas and Margus Veanes and Helen J. Wang}, editor = {Petros Maniatis}, title = {Operating System Support for Augmented Reality Applications}, booktitle = {14th Workshop on Hot Topics in Operating Systems, HotOS XIV, Santa Ana Pueblo, New Mexico, USA, May 13-15, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/hotos13/session/d\%27antoni}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/hotos/DAntoniDJKLMMORSVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JanaMMDLWO13, author = {Suman Jana and David Molnar and Alexander Moshchuk and Alan M. Dunn and Benjamin Livshits and Helen J. Wang and Eyal Ofek}, editor = {Samuel T. King}, title = {Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {415--430}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/jana}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/JanaMMDLWO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/VeanesHLMB12, author = {Margus Veanes and Pieter Hooimeijer and Benjamin Livshits and David Molnar and Nikolaj S. Bj{\o}rner}, editor = {John Field and Michael Hicks}, title = {Symbolic finite state transducers: algorithms and applications}, booktitle = {Proceedings of the 39th {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, {POPL} 2012, Philadelphia, Pennsylvania, USA, January 22-28, 2012}, pages = {137--150}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2103656.2103674}, doi = {10.1145/2103656.2103674}, timestamp = {Thu, 14 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/popl/VeanesHLMB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SaxenaML11, author = {Prateek Saxena and David Molnar and Benjamin Livshits}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {{SCRIPTGARD:} automatic context-sensitive sanitization for large-scale legacy web applications}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {601--614}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046776}, doi = {10.1145/2046707.2046776}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SaxenaML11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoft/SonntagHKMS11, author = {Mirko Sonntag and Sven Hotta and Dimka Karastoyanova and David Molnar and Siegfried Schmauder}, editor = {Mar{\'{\i}}a Jos{\'{e}} Escalona Cuaresma and Boris Shishkov and Jos{\'{e}} Cordeiro}, title = {Workflow-based Distributed Environment for Legacy Simulation Applications}, booktitle = {{ICSOFT} 2011 - Proceedings of the 6th International Conference on Software and Data Technologies, Volume 1, Seville, Spain, 18-21 July, 2011}, pages = {91--94}, publisher = {SciTePress}, year = {2011}, timestamp = {Wed, 28 Sep 2011 18:26:31 +0200}, biburl = {https://dblp.org/rec/conf/icsoft/SonntagHKMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/servicewave/SonntagHKMS11, author = {Mirko Sonntag and Sven Hotta and Dimka Karastoyanova and David Molnar and Siegfried Schmauder}, editor = {Witold Abramowicz and Ignacio Mart{\'{\i}}n Llorente and Mike Surridge and Andrea Zisman and Julien Vayssi{\`{e}}re}, title = {Using Services and Service Compositions to Enable the Distributed Execution of Legacy Simulation Applications}, booktitle = {Towards a Service-Based Internet - 4th European Conference, ServiceWave 2011, Poznan, Poland, October 26-28, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6994}, pages = {242--253}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24755-2\_23}, doi = {10.1007/978-3-642-24755-2\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/servicewave/SonntagHKMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/PopaLMWZ11, author = {Raluca Ada Popa and Jacob R. Lorch and David Molnar and Helen J. Wang and Li Zhuang}, editor = {Jason Nieh and Carl A. Waldspurger}, title = {Enabling Security in Cloud Storage SLAs with CloudProof}, booktitle = {2011 {USENIX} Annual Technical Conference, Portland, OR, USA, June 15-17, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/usenixatc11/enabling-security-cloud-storage-slas-cloudproof}, timestamp = {Mon, 01 Feb 2021 08:43:25 +0100}, biburl = {https://dblp.org/rec/conf/usenix/PopaLMWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HooimeijerLMSV11, author = {Pieter Hooimeijer and Benjamin Livshits and David Molnar and Prateek Saxena and Margus Veanes}, title = {Fast and Precise Sanitizer Analysis with {BEK}}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Hooimeijer.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/HooimeijerLMSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/MolnarEC10, author = {David Molnar and Serge Egelman and Nicolas Christin}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {This is your data on drugs: lessons computer security can learn from the drug war}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {143--149}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900566}, doi = {10.1145/1900546.1900566}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/MolnarEC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/EgelmanMCAHK10, author = {Serge Egelman and David Molnar and Nicolas Christin and Alessandro Acquisti and Cormac Herley and Shriram Krishnamurthi}, title = {Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays}, booktitle = {9th Annual Workshop on the Economics of Information Security, {WEIS} 2010, Harvard University, Cambridge, MA, USA, June 7-8, 2010}, year = {2010}, url = {http://weis2010.econinfosec.org/papers/session3/weis2010\_egelman.pdf}, timestamp = {Thu, 22 Jul 2021 16:15:46 +0200}, biburl = {https://dblp.org/rec/conf/weis/EgelmanMCAHK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/MolnarS10, author = {David Molnar and Stuart E. Schechter}, title = {Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud}, booktitle = {9th Annual Workshop on the Economics of Information Security, {WEIS} 2010, Harvard University, Cambridge, MA, USA, June 7-8, 2010}, year = {2010}, url = {http://weis2010.econinfosec.org/papers/session5/weis2010\_schechter.pdf}, timestamp = {Thu, 22 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/weis/MolnarS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/StevensSALMOW09, author = {Marc Stevens and Alexander Sotirov and Jacob Appelbaum and Arjen K. Lenstra and David Molnar and Dag Arne Osvik and Benne de Weger}, editor = {Shai Halevi}, title = {Short Chosen-Prefix Collisions for {MD5} and the Creation of a Rogue {CA} Certificate}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {55--69}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_4}, doi = {10.1007/978-3-642-03356-8\_4}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/StevensSALMOW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MolnarLW09, author = {David Molnar and Xue Cong Li and David A. Wagner}, editor = {Fabian Monrose}, title = {Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs}, booktitle = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings}, pages = {67--82}, publisher = {{USENIX} Association}, year = {2009}, url = {http://www.usenix.org/events/sec09/tech/full\_papers/molnar.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MolnarLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StevensSALMOW09, author = {Marc Stevens and Alexander Sotirov and Jacob Appelbaum and Arjen K. Lenstra and David Molnar and Dag Arne Osvik and Benne de Weger}, title = {Short Chosen-Prefix Collisions for {MD5} and the Creation of a Rogue {CA} Certificate}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2009}, url = {http://eprint.iacr.org/2009/111}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/StevensSALMOW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TsudikBJKMPR08, author = {Gene Tsudik and Mike Burmester and Ari Juels and Alfred Kobsa and David Molnar and Roberto Di Pietro and Melanie R. Rieback}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {{RFID} security and privacy: long-term research or short-term tinkering?}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {160}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352560}, doi = {10.1145/1352533.1352560}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/TsudikBJKMPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HopperMW07, author = {Nicholas Hopper and David Molnar and David A. Wagner}, editor = {Salil P. Vadhan}, title = {From Weak to Strong Watermarking}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {362--382}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_20}, doi = {10.1007/978-3-540-70936-7\_20}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HopperMW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CrutchfieldMTW06, author = {Chris Crutchfield and David Molnar and David Turner and David A. Wagner}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Generic On-Line/Off-Line Threshold Signatures}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {58--74}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_5}, doi = {10.1007/11745853\_5}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CrutchfieldMTW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MolnarKSW06, author = {David Molnar and Tadayoshi Kohno and Naveen Sastry and David A. Wagner}, title = {Tamper-Evident, History-Independent, Subliminal-Free Data Structures on {PROM} Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract)}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {365--370}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.39}, doi = {10.1109/SP.2006.39}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/MolnarKSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KissnerM06, author = {Lea Kissner and David Molnar}, title = {Provably Secure Subsitution of Cryptographic Tools}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2006}, url = {http://eprint.iacr.org/2006/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KissnerM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MolnarKSW06, author = {David Molnar and Tadayoshi Kohno and Naveen Sastry and David A. Wagner}, title = {Tamper-Evident, History-Independent, Subliminal-Free Data Structures on {PROM} Storage -or- How to Store Ballots on a Voting Machine}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2006}, url = {http://eprint.iacr.org/2006/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MolnarKSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HopperMW06, author = {Nicholas Hopper and David Molnar and David A. Wagner}, title = {From Weak to Strong Watermarking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2006}, url = {http://eprint.iacr.org/2006/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HopperMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GentryMR05, author = {Craig Gentry and David Molnar and Zulfikar Ramzan}, editor = {Bimal K. Roy}, title = {Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3788}, pages = {662--681}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593447\_36}, doi = {10.1007/11593447\_36}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GentryMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dialm/JainMR05, author = {Ravi Jain and David Molnar and Zulfikar Ramzan}, editor = {Suman Banerjee and Samrat Ganguly}, title = {Towards understanding algorithmic factors affecting energy consumption: switching complexity, randomness, and preliminary experiments}, booktitle = {Proceedings of the {DIALM-POMC} Joint Workshop on Foundations of Mobile Computing, Cologne, Germany, September 2, 2005}, pages = {70--79}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1080810.1080823}, doi = {10.1145/1080810.1080823}, timestamp = {Thu, 27 Apr 2023 08:33:19 +0200}, biburl = {https://dblp.org/rec/conf/dialm/JainMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MolnarPSW05, author = {David Molnar and Matt Piotrowski and David Schultz and David A. Wagner}, editor = {Dongho Won and Seungjoo Kim}, title = {The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {156--168}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_14}, doi = {10.1007/11734727\_14}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MolnarPSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DraperIMPRSW05, author = {Stark C. Draper and Prakash Ishwar and David Molnar and Vinod M. Prabhakaran and Kannan Ramchandran and Daniel Schonberg and David A. Wagner}, editor = {Mauro Barni and Jordi Herrera{-}Joancomart{\'{\i}} and Stefan Katzenbeisser and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {An Analysis of Empirical {PMF} Based Tests for Least Significant Bit Image Steganography}, booktitle = {Information Hiding, 7th International Workshop, {IH} 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3727}, pages = {327--341}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11558859\_24}, doi = {10.1007/11558859\_24}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/DraperIMPRSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/MolnarSW05, author = {David Molnar and Andrea Soppera and David A. Wagner}, editor = {Bart Preneel and Stafford E. Tavares}, title = {A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of {RFID} Tags}, booktitle = {Selected Areas in Cryptography, 12th International Workshop, {SAC} 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3897}, pages = {276--290}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11693383\_19}, doi = {10.1007/11693383\_19}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/MolnarSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/JuelsMW05, author = {Ari Juels and David Molnar and David A. Wagner}, title = {Security and Privacy Issues in E-passports}, booktitle = {First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005}, pages = {74--88}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/SECURECOMM.2005.59}, doi = {10.1109/SECURECOMM.2005.59}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/JuelsMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/JainMR05, author = {Ravi Jain and David Molnar and Zulfikar Ramzan}, title = {Towards a model of energy complexity for algorithms [mobile wireless applications]}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2005, March 13-17, 2005, New Orleans, Louisiana, {USA}}, pages = {1884--1890}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/WCNC.2005.1424799}, doi = {10.1109/WCNC.2005.1424799}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/JainMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/MolnarSW05, author = {David Molnar and Andrea Soppera and David A. Wagner}, editor = {Vijay Atluri and Sabrina De Capitani di Vimercati and Roger Dingledine}, title = {Privacy for {RFID} through trusted computing}, booktitle = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005}, pages = {31--34}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102199.1102206}, doi = {10.1145/1102199.1102206}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/MolnarSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuelsMW05, author = {Ari Juels and David Molnar and David A. Wagner}, title = {Security and Privacy Issues in E-passports}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2005}, url = {http://eprint.iacr.org/2005/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuelsMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MolnarSW05, author = {David Molnar and Andrea Soppera and David A. Wagner}, title = {A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of {RFID} Tags}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {315}, year = {2005}, url = {http://eprint.iacr.org/2005/315}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MolnarSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MolnarPSW05, author = {David Molnar and Matt Piotrowski and David Schultz and David A. Wagner}, title = {The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {368}, year = {2005}, url = {http://eprint.iacr.org/2005/368}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MolnarPSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrutchfieldMTW05, author = {Chris Crutchfield and David Molnar and David Turner and David A. Wagner}, title = {Generic On-Line/Off-Line Threshold Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {418}, year = {2005}, url = {http://eprint.iacr.org/2005/418}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CrutchfieldMTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MolnarW04, author = {David Molnar and David A. Wagner}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {Privacy and security in library {RFID:} issues, practices, and architectures}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {210--219}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030112}, doi = {10.1145/1030083.1030112}, timestamp = {Fri, 13 Nov 2020 16:10:44 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MolnarW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/GoodMUMMQW04, author = {Nathan Good and David Molnar and Jennifer M. Urban and Deirdre K. Mulligan and Elizabeth Miles and Laura Quilter and David A. Wagner}, editor = {Vijay Atluri and Paul F. Syverson and Sabrina De Capitani di Vimercati}, title = {Radio frequency Id and privacy with information goods}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2004, Washington, DC, USA, October 28, 2004}, pages = {41--42}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029179.1029193}, doi = {10.1145/1029179.1029193}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/GoodMUMMQW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/VilaGM04, author = {Tony Vila and Rachel Greenstadt and David Molnar}, editor = {L. Jean Camp and Stephen Lewis}, title = {Why We Can't Be Bothered to Read Privacy Policies - Models of Privacy Economics as a Lemons Market}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {143--153}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_11}, doi = {10.1007/1-4020-8090-5\_11}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/VilaGM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMicec/VilaGM03, author = {Tony Vila and Rachel Greenstadt and David Molnar}, editor = {Norman M. Sadeh and Mary Jo Dively and Robert J. Kauffman and Yannis Labrou and Onn Shehory and Rahul Telang and Lorrie Faith Cranor}, title = {Why we can't be bothered to read privacy policies models of privacy economics as a lemons market}, booktitle = {Proceedings of the 5th International Conference on Electronic Commerce, {ICEC} 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003}, series = {{ACM} International Conference Proceeding Series}, volume = {50}, pages = {403--407}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948005.948057}, doi = {10.1145/948005.948057}, timestamp = {Tue, 06 Apr 2021 12:12:56 +0200}, biburl = {https://dblp.org/rec/conf/ACMicec/VilaGM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JohnsonMSW02, author = {Robert Johnson and David Molnar and Dawn Xiaodong Song and David A. Wagner}, editor = {Bart Preneel}, title = {Homomorphic Signature Schemes}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {244--262}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_17}, doi = {10.1007/3-540-45760-7\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/JohnsonMSW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Molnar01, author = {David Molnar}, title = {On patrol: resource allocation, proofs of work, and consequences}, journal = {{XRDS}}, volume = {7}, number = {3}, pages = {28--31}, year = {2001}, url = {https://doi.org/10.1145/367884.367899}, doi = {10.1145/367884.367899}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Molnar01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DingledineFHM01, author = {Roger Dingledine and Michael J. Freedman and David Hopwood and David Molnar}, editor = {Ira S. Moskowitz}, title = {A Reputation System to Increase MIX-Net Reliability}, booktitle = {Information Hiding, 4th International Workshop, {IHW} 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2137}, pages = {126--141}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45496-9\_10}, doi = {10.1007/3-540-45496-9\_10}, timestamp = {Wed, 16 Mar 2022 23:55:28 +0100}, biburl = {https://dblp.org/rec/conf/ih/DingledineFHM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Molnar00, author = {David Molnar}, title = {Signing electronic contracts}, journal = {{XRDS}}, volume = {7}, number = {1}, year = {2000}, url = {https://doi.org/10.1145/351092.351096}, doi = {10.1145/351092.351096}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Molnar00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/diau/DingledineFM00, author = {Roger Dingledine and Michael J. Freedman and David Molnar}, editor = {Hannes Federrath}, title = {The Free Haven Project: Distributed Anonymous Storage Service}, booktitle = {Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2009}, pages = {67--95}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44702-4\_5}, doi = {10.1007/3-540-44702-4\_5}, timestamp = {Wed, 16 Mar 2022 23:55:03 +0100}, biburl = {https://dblp.org/rec/conf/diau/DingledineFM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.