USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 12 results:
Filters: Author is J.D. Tygar [Clear All Filters]
Characterizing Botnets from Email Spam Records. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08).
.
2008. SWOON: A Testbed for Secure Wireless Overlay Networks. Workshop on Cyber Security Experimentation and Test (CSET 08).
.
2008. A User Study Design for Comparing the Security of Registration Protocols. Usability, Psychology, and Security 2008 (UPSEC 08).
.
2008. Side Effects Are Not Sufficient to Authenticate Software. 13th USENIX Security Symposium (USENIX Security 04).
.
2004. Anonymous Atomic Transactions. 2nd USENIX Workshop on Electronic Commerce (EC 96).
.
1996. Building Blocks for Atomicity in Electronic Commerce. 6th USENIX Security Symposium (USENIX Security 96).
.
1996. Model Checking Electronic Commerce Protocols. 2nd USENIX Workshop on Electronic Commerce (EC 96).
.
1996. Smart Cards in Hostile Environments. 2nd USENIX Workshop on Electronic Commerce (EC 96).
.
1996. WWW Electronic Commerce and Java Trojan Horses. 2nd USENIX Workshop on Electronic Commerce (EC 96).
.
1996. NetBill Security and Transaction Protocol. First USENIX Workshop on Electronic Commerce ( First USENIX Workshop on Electronic Commerce).
.
1995. Secure Coprocessors in Electronic Commerce Applications. First USENIX Workshop on Electronic Commerce ( First USENIX Workshop on Electronic Commerce).
.
1995. Token and Notational Money in Electronic Commerce. First USENIX Workshop on Electronic Commerce ( First USENIX Workshop on Electronic Commerce).
.
1995.