Doug Tygar 

spacer line 

Biography
Contact
Publications

 

Publications 

 

Books

  1. Adversarial Machine Learning:  Computer Security and Statistical Machine Learning.  A. Joseph, B. Nelson, B. Rubinstein, J. D. Tygar.  Cambridge University Press, 2013.  (To appear). 

  2. Computer Security in the 21st Century Eds. D. Lee, S. Shieh, and J. D. Tygar.  Springer, March 2005.  (This book includes item 12 below as well as a technical introduction by me and the other editors.)

  3. Waiyādo/Waiyaresu Nettowōku ni Okeru Burōdokyasuto Tsūshin no Sekyuriti ワイヤード/ワイヤレスネットワークにおけるブロードキャスト通信のセキュリテ.  A. Perrig  and J. D. Tygar; translated by Fumio Mizoguchi and the the Science University of Tokyo Information Media Science Research Group with the assistance of J. D. Tygar.  Kyoritsu Shuppan, October 2004.  (This is a Japanese translation of item 4 which also contains new and additional material written by me in Japanese.)

  4. Secure Broadcast Communication in Wired and Wireless Networks A. Perrig and J. D. Tygar.  Springer, October 2002.  (See also item 3.)

  5. Trust in Cyberspace.  National Research Council Committee on Information Systems Trustworthiness (S. Bellovin, W. E. Boebert, M. Branstad, J. R. Catoe, S. Crocker, C. Kaufman, S. Kent, J. Knight, S. McGeady, R. Nelson, A. Schiffman, F. Schneider [ed.], G. Spix, and J. D. Tygar).  National Academy Press, January 1999.

 

Book Chapters (does not incude items listed above)

  1. “Classifier evasion: Models and open problems.” B. Nelson, B. Rubinstein, L. Huang, A. Joseph, and J. D. Tygar. In Privacy and Security Issues in Data Mining and Machine Learning, eds. C. Dimitrakakis, et al.  Springer, July 2011, pp. 92-98.

  2. “Misleading learners: Co-opting your spam filter  B. Nelson, M. Barreno, F. Chi, A. Joseph, B. Rubinstein, U. Saini, C. Sutton, J. D. Tygar, and K. Xia. In Machine Learning in Cyber Trust: Security, Privacy, Reliability, eds. J. Tsai and P.Yu.  Springer, April 2009, pp. 17-51.

  3. “Preface.”  J. D. Tygar.  In DIGIart@eTaiwan談互動創意 (Interaction and Creation in DIGIart@eTaiwan),ed. S. Hsu.  Ylib Publisher, July 2007.

  4. “Case study:  Acoustic keyboard emanations.”  L. Zhuang, F. Zhou, and J. D. Tygar.  In Phishing and Countermeasures:  Understanding the Increasing Problem of Electronic Identity Theft, eds. M. Jakobsson and S. Myers.  Wiley-Interscience, December 2006, pp. 221-240.  (This is a popularized version of item 29.)

  5. “Dynamic security skins.”  R. Dhamija and J. D. Tygar.  In Phishing and Countermeasures:  Understanding the Increasing Problem of Electronic Identity Theft, eds. M. Jakobsson and S. Myers.  Wiley-Interscience, December 2006, pp. 339-351.  (This is a popularized version of item 70.)

  6.  “Why Johnny can’t encrypt:  A usability evaluation of PGP 5.0.”  A. Whitten and J. D. Tygar.  In Security and Usability:  Designing Secure Systems that People Can Use, eds. L. Cranor and G. Simson.  O'Reilly, September 2005, pp. 679-702.  (An earlier version of this paper was published in Proceedings of the 8th USENIX Security Symposium, August 1999, pp. 169-183.  See also item 118.)

  7. “Private matching.”  Y. Li, J. D. Tygar, J. Hellerstein.  In Computer Security in the 21st Century, eds. D. Lee, S. Shieh, and J. D. Tygar.  Springer, March 2005, pp. 25-50.  (See item 2.)  (An early version of this paper appeared as Intel Research Laboratory Berkeley technical report IRB-TR-04-005, February 2004.) 

  8. “Digital cash.”  J. D. Tygar.  In Berkshire Encyclopedia of Human Computer Interaction, ed. W. Bainbridge.  Berkshire Publishing, October 2004, pp. 167-170.

  9.  “Spamming.”  J. D. Tygar.  In Berkshire Encyclopedia of Human Computer Interaction, ed. W. Bainbridge.  Berkshire Publishing, October 2004, pp. 673-675. 

  10. “Viruses.”  J. D. Tygar.  In Berkshire Encyclopedia of Human Computer Interaction, ed. W. Bainbridge.  Berkshire Publishing, October 2004, pp. 788-791. 

  11. “Privacy in sensor webs and distributed information systems.”  J. D. Tygar.  In Software Security:  Theories and Systems, eds. M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa.  Springer, 2003, pp. 84-95.

  12. “Atomicity in electronic commerce.”  J. D. Tygar.  In Internet Besieged, eds. D. Denning and P. Denning.  ACM Press and Addison-Wesley, October 1997, pp. 389-405.  (An expanded earlier version of this paper was published in Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, Keynote paper, May 1996, pp. 8-26; and as Carnegie Mellon University Computer Science technical report CMU-CS-96-112, January 1996.  See also item 39.)

  13. “Cryptographic postage indicia.”  J. D. Tygar, B. Yee, and N. Heintze.   In Concurrency and Parallelism, Programming, Networking, and Security, eds. J. Jaffar and R. Yap.  Springer, 1996, pp. 378-391.  (Preprint also available.  Early versions appeared as Carnegie Mellon University Computer Science technical reports CMU-CS-96-113, January 1996, UC San Diego Computer Science technical report UCSD-TR-CS96-485, and in the 1996 Securicom Proceedings, Paris, June 1996.  See also item 120.)

  14. “Dyad: A system for using physically secure coprocessors.”  J. D. Tygar and B. Yee.  In Technological Strategies for the Protection of Intellectual Property in the Networked Multimedia Environment.  Interactive Multimedia Association, 1994, pp. 121-152.  (An early version appeared as Carnegie Mellon University Computer Science technical report CMU-CS-91-140R, May 1991.)

  15. “A system for self-securing programs.”  J. D. Tygar and B. Yee.  In Carnegie Mellon Computer Science: A 25-Year Commemorative, ed. R. Rashid.  ACM Press and Addison-Wesley, 1991, pp. 163-197.  (Note:  The first printing of this volume had incorrect text due to a production error.)

  16. “Implementing capabilities without a trusted kernel.”  M. Herlihy and J. D. Tygar.  In Dependable Computing for Critical Applications, eds. A. Avizienis and J. Laprie. Springer, January 1991, pp. 283-300.  (Note:  An earlier version appeared in the (IFIP) Proceedings of the International Working Conference on Dependable Computing for Critical Applications, August 1989.)

  17. “Strongbox.”  J. D. Tygar and B. Yee.  In Camelot and Avalon: A Distributed Transaction Facility, eds. J. Eppinger, L. Mummert, and A. Spector.  Morgan-Kaufmann, February 1991, pp. 381-400.

  18. “ITOSS:  An Integrated Toolkit for Operating System Security.” M. Rabin and J. D. Tygar.  In Foundations of Data Organization, eds. W. Litwin and H.-J. Shek.  Springer, June 1989, pp. 2-15.  (Preprint also available.)  (Note:  Earlier, longer versions appeared as Harvard University Aiken Computation Laboratory technical report TR-05-87R and my Ph.D. dissertation.)

  19. “Formal semantics for visual specification of security.”  M. Maimone, J. D. Tygar, and J. Wing.   In Visual Languages and Visual Programming, ed. S. K. Chang.  Plenum, 1990, pp. 97-116.  (An early version was published in Proceedings of the 1988 IEEE Workshop on Visual Programming, pp. 45-51, and as Carnegie Mellon University Computer Science technical report CMU-CS-88-173r, December 1988.)

 

Journal Articles (does not include items listed above)

  1. “A low-bandwidth camera sensor platform with applications in smart camera networks  P. Chen, K. Hong, N. Naikal, S. Sastry, J. D. Tygar, P. Yan, A. Yan, L. Chang, L. Lin, Leon S. Wang, E. Lobaton, S. Oh, and P. Ahammad.  ACM Transactions on Sensor Networks, 9:2, March 2013, pp. 21:1-21:23.

  2. “Query strategies for evading convex-inducing classifiers  B. Nelson, B. Rubinstein, L. Huang, A. Joseph, S. Lee, S. Rao, and J. D. Tygar. Journal of Machine Learning Research, May 2012 (volume 13) pp. 1293-1332.  (Also available as arXiv report 1007.0484v1, July 2010.)

  3. “The security of machine learning  M. Barreno, B. Nelson, A. Joseph, and J. D. Tygar.   Machine Learning, 81:2, November 2010, pp. 121-148.  (An earlier version appeared as UC Berkeley EECS technical report UCB/EECS-2008-43, April 2008.)

  4. “Secure encrypted-data aggregation for wireless sensor networks.” S. Huang, S. Shieh and J. D. Tygar. Wireless Networks, 16:4, May 2010, pp. 915-927.

  5. “Keyboard acoustic emanations revisited.”  L. Zhuang, F. Zhou, and J. D. Tygar.  ACM Transactions on Information and Systems Security, 13:1,  October 2009, pp 3:1-3:26.  (An earlier version appeared in Proceedings of the 12th ACM Conference on Computer and Communications Security, November 2005, pp. 373-382.)  (See also item 9.)

  6. “Stealthy poisoning attacks on PCA-based anomaly detectors.” B. Rubinstein, B. Nelson, L. Huang, A. Joseph, S. Lau, S. Rao, N. Taft, and J. D. Tygar. ACM SIGMETRICS Performance Evaluation Review, 37:2, October 2009, pp. 73-74.

  7. “Injecting heterogeneity through protocol randomization.”  L. Zhuang, J. D. Tygar, R. Dhamija.  In International Journal of Network Security, 4:1, January 2007, pp. 45-58.

  8. “Cyber defense technology networking and evaluation.”  Members of the DETER and EMIST Projects (R. Bajcsy, T. Benzel, M. Bishop, B. Braden, C. Brodley, S. Fahmy, S. Floyd, W. Hardaker, A. Joseph, G. Kesidis, K. Levitt, B. Lindell, P. Liu, D. Miller, R. Mundy, C. Neuman, R. Ostrenga, V. Paxson, P. Porras, C. Rosenberg, S. Sastry, D. Sterne, J. D. Tygar, and S. Wu).  In Communications of the ACM, 47:3, March 2004, pp. 58-61.

  9. “Technological dimensions of privacy in Asia.”  J. D. Tygar.  In Asia-Pacific Review, 10:2, November 2003, pp. 120-145.

  10. “SPINS:  Security protocols for sensor networks.”  A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. Culler.  In [ACM Journal of] Wireless Networks, 8:5, September 2002, pp. 521-534.  (An early version of this paper appears in Proceedings of the 7th Annual International Conference on Mobile Computing and Networks (MOBICOM), July 2001, pp. 189-199.)

  11. “The TESLA broadcast authentication protocol.”  A. Perrig, R. Canneti, J. D. Tygar, and D. Song.  In CryptoBytes, 5:2, Summer/Fall 2002, pp. 2-13.

  12. “SAM:  A flexible and secure auction architecture using trusted hardware.”  A. Perrig, S. Smith, D. Song, and J. D. Tygar.  In Electronic Journal on E-commerce Tools and Applications, 1:1, January 2002 (online journal).  (An early version of this paper appeared in Proceedings of the 1st IEEE International Workshop on Internet Computing and Electronic Commerce, April 2001, pp. 1764-1773.)

  13. “Why isn’t the Internet secure yet?”  J. D. Tygar and A. Whitten.  In ASLIB Proceedings, 52:3, March 2000, pp. 93-97.

  14. “Multi-round anonymous auction protocols.”  H. Kikuchi, M. Harkavy, and J. D. Tygar.  In Institute of Electronics, Information, and Communication Engineers Transactions on Information and Systems, E82-D:4, April 1999, pp. 769-777.  (An early version appeared in Proceedings of of the First IEEE Workshop on Dependable and Real-Time E-Commerce Systems (DARE ’98), June 1998, pp. 62-69. )

  15. “Atomicity in electronic commerce.”  J. D. Tygar.  In ACM NetWorker, 2:2, April/May 1998, pp. 32-43.  (Note:  this is a revision of item 17 published together with a new article:  “An update on electronic commerce.”  In ACM NetWorker, Volume 2, Number 2, April/May 1998, pp. 40-41.)

  16. “A model for secure protocols and their compositions.”  N. Heintze and J. D. Tygar.  In IEEE Transactions on Software Engineering, 22:1, January 1996, pp. 16-30.  (An extended abstract appeared in Proceedings of the 1994 IEEE Symposium on Security and Privacy, May 1994, pp. 2-13.  Another early version appeared as Carnegie Mellon University Computer Science technical report CMU-CS-92-100, January 1992.)

  17. NetBill:  An Internet commerce system optimized for network-delivered services.”  M. Sirbu and J. D. Tygar. In IEEE Personal Communications, 2:4,  August 1995, pp. 34-39.  (An early version appeared in Proceedings of Uniforum ’96, February 1996, pp. 203-226.  Another early version appeared in Proceedings of the 40th IEEE Computer Society International Conference, March 1995, pp. 20-25.)

  18. “Optimal sampling strategies for quicksort.”  C. C. McGeoch and J. D. Tygar.  In Random Structures and Algorithms, 7:4, December 1995, pp. 287-300.  (An early version appeared in Proceedings of the 28th Annual Allerton Conference on Communication, Control, and Computing, October 1990, pp. 62-71.)

  19. “Geometric characterization of series-parallel variable resistor networks.”  R. Bryant, J. D. Tygar, and L. Huang.  In IEEE Transactions on Circuits and Systems 1: Fundamental Theory and Applications, 41:11, November 1994, pp. 686-698.  (Preprint also available.)  (An early version appeared in Proceedings of the 1993 IEEE International Symposium on Circuits and Systems, May 1993, pp. 2678-2681.)

  20.  “Computability and complexity of ray tracing.”  J. Reif, J. D. Tygar, and A. Yoshida. In Discrete and Computational Geometry, 11:3, April 1994, pp. 265-287.  (An early version appeared in Proceedings of the 31st Annual IEEE Symposium on Foundations of Computer Science, October 1990, pp. 106-114.)

  21. “Specifying and checking Unix security constraint.”  A. Heydon and J. D. Tygar. In Computing Systems, 7:1, Winter 1994, pp. 91-112.  (An early version appeared in Proceedings of the 3rd USENIX Security Symposium, September 1992, pp. 211-226, preprint also available.)

  22. “Protecting privacy while preserving access to data.”  L. J. Camp and J. D. Tygar.  In The Information Society, 10:1, January 1994, pp. 59-71.

  23. “Miro: visual specification of security.”  A. Heydon, M. Maimone, J. D. Tygar, J. Wing, and A. Zaremski.  In IEEE Transactions on Software Engineering, 16:10, October 1990, pp. 1185-1197.  (An early version appeared as Carnegie Mellon University Computer Science Department technical report CMU-CS-89-199, December 1989.)

  24. “Efficient parallel pseudo-random number generation.”  J. Reif and J. D. Tygar.  In SIAM Journal of Computation, 17:2, April 1988, pp. 404-411.  (An early version appeared in Proceedings of CRYPTO-85, eds. E. Brickell and H. Williams, Springer, 1986, pp. 433-446.)

  25. “Review of Abstraction and Specification in Program Development.”  J. D. Tygar.  In ACM Computing Reviews, 28:9, September 1987, pp. 454-455.

 

Refereed Conference Papers (does not include items listed above)

  1. “Systematic analysis and evaluation of Web privacy policies and implementations  B. Miller, K. Buck, and J. D. Tygar.  In Proceedings of the 7th International Conference for Internet Technology and Secure Transactions, December 2012, pp. 534-540.

  2. “Robust detection of comment spam using entropy rate  A.  Kantchelian, J.  Ma, L.  Huang, S.  Afroz, A. Jospeh, and J. D. Tygar.  In Proceedings of 5th ACM Workshop on Artificial Intelligence and Security, October 2012, pp. 59-70.

  3. “Adversarial machine learning  L.  Huang, A.  Joseph, B.  Nelson, B. Rubenstein, and J. D. Tygar.  In Proceedings of 4th ACM Workshop on Artificial Intelligence and Security, October 2011, pp. 43-58.

  4. “Near-optimal evasion of convex-inducing classifiers.” B. Nelson, B. Rubinstein, L. Huang, A. Joseph, S. Lau, S. Lee, S. Rao, A. Tran, and J. D. Tygar. In Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, May 2010, pp. 549-556.

  5. “CAPTCHA: Using strangeness in machine translation  T. Yamamoto, J. D. Tygar, and M. Nishigaki.  In Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications, April 2010, pp.430-437. (See also item 116.)

  6. “ANTIDOTE: Understanding and defending against poisoning of anomaly detectors.” B. Rubinstein, B. Nelson, L. Huang, A. Joseph, S. Lau, S. Rao, N. Taft, and J. D. Tygar.  In Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, November 2009, pp. 1-14.

  7. “Wireless Sensor Networks: a Building Block for Mass Creativity and Learning  S. Hsu and J. D. Tygar.  In Proceedings Understanding the Creative Conversation Workshop (Creativity & Cognition 2009), October 2009.

  8. “Conditioned-safe ceremonies and a user study of an application to web authentication.” C. Karlof, J. D. Tygar, and D. Wagner.  In Proceedings of the 16th Annual Network & Distributed System Security Symposium, February 2009.

  9. “Optimal ROC Curve for a Combination of Classifiers  M. Barreno, A. Cardenas and J.D. Tygar.   In Advances in Neural Information Processing Systems (NIPS), December 2008, pp. 57-64.

  10. “Open problems in the security of learning  M. Barreno, P. Bartlett, F. Chi, A. Joseph, B. Nelson, B. Rubinstein, U. Saini, and J. D. Tygar.  In Proceedings of the First ACM Workshop on AISec, October 2008, pp. 19-26.

  11. “Evading anomaly detection through variance injection attacks on PCA.” (Extended abstract).  B. Rubinstein, B. Nelson, L. Huang, A. Joseph, S. Lau, N. Taft, and J. D. Tygar. In Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection, September 2008, pp. 394-395.

  12. “CITRIC: A low-bandwidth wireless camera network platform  P. Chen, P. Ahammad, C. Boyer, S. Huang, L. Lin, E. Lobaton, M. Meingast, S. Oh, S. Wang, P. Yan, A. Yang, C. Yeo, L. Chang, J. D. Tygar, and S. Sastry.  In Proceedings of the 2nd ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC-08), September 2008, pp. 1-10.

  13. “A power-preserving broadcast protocol for WSNs with DoS resistance  C. Ni, T. Hsiang, J. D. Tygar.  In Proceedings of 17th International IEEE Conference on Computer Communications and Networks, August 2008, pp. 1 – 6.

  14. “SWOON: A testbed for secure wireless overlay networks Y. Huang,  J. D. Tygar, H. Lin, L. Yeh, H. Tsai, K. Sklower, S. Shieh, C. Wu, P. Lu, S. Chien, Z. Lin, L. Hsu, C. Hsu, C. Hsu, Y. Wu, and M. Leong.  In Proceedings USENIX Workshop on Cyber Security and Test, July 2008.

  15. “Characterizing botnets from email spam records  L. Zhuang, J. Dunagan, D. Simon, H. Wang, I. Osipkov, G. Hulten and J. D. Tygar.  In Proceedings of First USENIX Workshop on Large Scale Exploits and Emergent Threats (LEET 2008), April 2008.

  16. “Exploiting machine learning to subvert your spam filter. “  B. Nelson, M. Barreno, F. Chi, A. D. Joseph, B. Rubinstein, U. Saini, C. Sutton, J. D. Tygar, and K. Xia.  In Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET  2008), April 2008.

  17. “Dynamic pharming attacks and locked same-origin policies for web browsers  C. Karlof, U. Shankar, J.D. Tygar, and D. Wagner.  In Proceedings of the Fourteenth ACM Conference on Computer and Communications Security (CCS 2007), November 2007, pp. 58-71.

  18.  “Coexistence proof using chain of timestamps for multiple RFID tags  C. Lin, Y. Lai, J. D. Tygar, C. Yang, and C. Chiang.  In Proceedings of Advances in Web and Network Technologies and Information Management, June 2007, pp. 634-643.

  19. “Why phishing works.”  R. Dhamija, J. D. Tygar, and M. Hearst.  In Proceedings of CHI-2006:  Conference on Human Factors in Computing Systems, April 2006, pp. 581-590.

  20. “Can machine learning be secure?”  M. Barreno, B. Nelson, R. Sears, A. Joseph, and J. D. Tygar.  Invited paper.  In Proceedings of the ACM Symposium on Information, Computer, and Communication Security, March 2006, pp. 16-25.

  21. “The battle against phishing:  Dynamic security skins.”  R. Dhamija and J. D. Tygar.  In SOUPS 2005:  Proceedings of the 2005 ACM Symposium on Usable Security and Privacy, ACM International Conference Proceedings Series, ACM Press, July 2005, pp. 77-88.  (See also item 10.)

  22. “Collaborative filtering CAPTCHAs.”  M. Chew and J. D. Tygar.  In Human Interactive Proofs:  Second International Workshop (HIP 2005), eds. H. Baird and D. Lopresti, Springer, May 2005, pp. 66-81.

  23. Phish and HIPs: Human interactive proofs to detect phishing attacks   R. Dhamija and J. D. Tygar.  In Human Interactive Proofs:  Second International Workshop (HIP 2005), eds. H. Baird and D. Lopresti, Springer, May 2005, pp. 127-141.

  24. “Image recognition CAPTCHAs.” M. Chew and J. D. Tygar.  In Proceedings of the 7th International Information Security Conference (ISC 2004), Springer, September 2004, pp. 268-279.  (A longer version appeared as UC Berkeley Computer Science Division technical report UCB/CSD-04-1333, June 2004.)

  25. “Side effects are not sufficient to authenticate software.”  U. Shankar, M. Chew, and J. D. Tygar.  In Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 89-101.  (A version with an additional appendix appeared as UC Berkeley Computer Science Division technical report UCB/CSD-04-1363, September 2004.)

  26. “Statistical monitoring + predictable recovery = Self-*.”  A Fox, E. Kiciman, D. Patterson, R. Katz, M. Jordan, I. Stoica and J. D. Tygar.  In Proceedings of the 2nd Bertinoro Workshop on Future Directions in Distributed Computing (FuDiCo II), June 2004 (online proceedings).

  27. “Distillation codes and their application to DoS resistant multicast authentication.”  C. Karlof, N. Sastry, Y. Li, A. Perrig, and J. D. Tygar.  In Proceedings of the Network and Distributed System Security Conference (NDSS 2004), February 2004, pp. 37-56.

  28. “Privacy and security in the location-enhanced World Wide Web.”  J. Hong, G. Boriello, J. Landay, D. McDonald, B. Schilit, and J. D. Tygar.  In Proceedings of the Workshop on Privacy at Ubicomp 2003, October 2003 (online proceedings).

  29. “The problem with privacy.”  J. D. Tygar.  Keynote paper.  In Proceedings of the 2003 IEEE Workshop on Internet Applications, June 2003, pp. 2-8.

  30. “Safe staging for computer security.”  A. Whitten and J. D. Tygar.  In Proceedings of the 2003 Workshop on Human-Computer Interaction and Security Systems, April 2003. 

  31. “Expander graphs for digital stream authentication and robust overlay networks.”  D. Song, D. Zuckerman, and J. D. Tygar.  In Proceedings of the 2002 IEEE Symposium on Security and Privacy, May 2002, pp. 258-270.

  32. “ELK:  A new protocol for efficient large-group key distribution.”  A. Perrig, D. Song, and J. D. Tygar.  In Proceedings of the 2001 IEEE Symposium on Security and Privacy, May 2001, pp. 247-262.

  33. “Efficient and secure source authentication for multicast.”  A. Perrig, R. Canetti, D. Song, and J. D. Tygar.  In Proceedings of the Internet Society Network and Distributed System Security Symposium (NDSS 2001), February 2001, pp. 35-46.

  34. “Efficient authentication and signing of multicast streams over lossy channels.”  A. Perrig, R. Canetti, J. D. Tygar, and D. Song.  In Proceedings of the 2000 IEEE Symposium on Security and Privacy, May 2000, pp. 56-73.

  35. “Flexible and scalable credential structures:  NetBill implementation and experience.”  Y. Kawakura, M. Sirbu., I. Simpson, and J. D. Tygar.  In Proceedings of the International Workshop on Cryptographic Techniques and E-Commerce, July 1999, pp. 231-245.

  36. “Open problems in electronic commerce.”  J. D. Tygar.  Invited address.  In Proceedings of the 18th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS 1999), May 1999, p. 101.

  37. “Electronic auctions with private bids.”  M. Harkavy, J. D. Tygar, and H. Kikuchi.  In Proceedings of the 3rd USENIX Workshop on Electronic Commerce, September 1998, pp. 61-73.

  38. “Atomicity versus anonymity:  Distributed transactions for electronic commerce.”  J. D. Tygar.  In Proceedings of the 24th International Conference on Very Large Data Bases, August 1998, pp. 1-12.

  39. “Smart cards in hostile environments.”  H. Gobioff, S. Smith, J. D. Tygar, and B. Yee.  In Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996, pp. 23-28.  (An early version appeared as Carnegie Mellon University Computer Science technical report CMU-CS-95-188, September 1995.)

  40. “Anonymous atomic transactions.”  L. J. Camp, M. Harkavy, and B. Yee.  In Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996, pp. 123-133.  (Preprint also available.)  (An early version appeared as Carnegie Mellon University Computer Science technical report CMU-CS-96-156, July 1996.) 

  41. “Model checking electronic commerce protocols.”  N. Heintze, J. D. Tygar, J. Wing, and H. Wong. In Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996, pp. 147-164.

  42. “WWW electronic commerce and Java Trojan horses.”  J. D. Tygar and A. Whitten.  In Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996, pp. 243-250.

  43. “Building blocks for atomicity in electronic commerce.”  J. Su and J. D. Tygar.  In Proceedings of the 6th USENIX Security Symposium, July 1996, pp. 97-102.

  44. “Token and notational money in electronic commerce.”  L. J. Camp, M. Sirbu, and J. D. Tygar.  In Proceedings of the 1st USENIX Workshop on Electronic Commerce, July 1995, pp. 1-12.  (An early version was presented at the Telecommunications Policy Research Conference, October 1994.)

  45. “NetBill security and transaction protocol.”  B. Cox, J. D. Tygar, and M. Sirbu.  In Proceedings of the 1st USENIX Workshop on Electronic Commerce, July 1995, pp. 77-88.

  46. “Secure coprocessors in electronic commerce applications.”  B. Yee and J. D. Tygar.  In Proceedings of the 1st USENIX Workshop on Electronic Commerce, July 1995, pp. 155-170.

  47. “Completely asynchronous optimistic recovery with minimal rollbacks.”  S. Smith, D. Johnson, and J. D. Tygar.  In Proceedings of the 25th IEEE Symposium on Fault-Tolerant Computing, June 1995, pp. 361-370.  (An early version appears as Carnegie Mellon University Computer Science technical report CMU-CS-94-130, March 1994.)

  48. “A fast off-line electronic currency protocol.”  L. Tang and J. D. Tygar. In CARDIS 94: Proceedings of the First IFIP Smart Card Research and Advanced Application Conference, October 1994, pp. 89-100.

  49. “Security and privacy for partial order time.”  S. Smith and J. D. Tygar.  In Proceedings 1994 Parallel and Distributed Computing Systems Conference, October 1994, pp. 70-79.  (Early versions appeared as Carnegie Mellon University Computer Science technical reports CMU-CS-93-116, October 1991 and February 1993, andCMU-CS-94-135, April 1994.)

  50. “Certified electronic mail.”  A. Bahreman and J. D. Tygar.  In Proceedings of the 1994 Network and Distributed Systems Security Conference, February 1994, pp. 3-19.

  51. Miro tools  A. Heydon, M. Maimone, A. Moormann, J. D. Tygar and J. Wing.  In Proceedings of the 3rd IEEE Workshop on Visual Languages, October 1989, pp. 86-91.  (A preprint appeared as Carnegie Mellon University Computer Science technical report CMU-CS-89-159, July 1989.)

  52. Constraining pictures with pictures.”  A. Heydon, M. Maimone, A. Moormann, J. D. Tygar, and J. Wing.  In Information Processing 89: Proceedings of the 11th World Computer Congress, August 1989, pp. 157-162.  (An early version appeared as Carnegie Mellon University Computer Science technical report CMU-CS-88-185, November 1988.)

  53. “How to make replicated data secure.”  M. Herlihy and J. D. Tygar. In Proceedings of CRYPTO-87, ed. C. Pomerance, 1988, pp. 379-391.  (An early version appeared as Carnegie Mellon University Computer Science Technical Report CMU-CS-87-143, August 1987.

  54. “Visual specification of security constraints.”  J. D. Tygar and  J. Wing.  In Proceedings of the 1987 (First IEEE) Workshop on Visual Languages, August 1987, pp. 288-301.  (A preprint appeared as Carnegie Mellon University Computer Science Technical Report CMU-CS-87-122, May 1987.)

  55. “Efficient netlist comparison using hierarchy and randomization.”  J. D. Tygar and R. Ellickson.  In Proceedings of the 22nd ACM/IEEE Design Automation Conference, Las Vegas, NV, July 1985, pp. 702-708.

  56. “Hierarchical logic comparison.” R. Ellickson and J. D. Tygar. In Proceedings of MIDCON ’84, 1984.

 

 Other Conference Publications (does not include items listed above)

  1. “Panel:  Authentication in constrained environments.” M. Burmester, V. Gligor, E. Kranakis, J. D. Tygar and Y. Zheng . Transcribed by B. de Medeiros. In Proceedings First International Workshop: MADNES 2005, September 2005, pp. 186-191.

  2. “When computer security crashes with multimedia.”  [Abstract]  J. D. Tygar.  In Proceedings of the 7th International IEEE Symposium on Multimedia, December 2005, p. 2.

  3. “Notes from the Second USENIX Workshop on Electronic Commerce.”  M. Harkavy, A. Meyers, J. D. Tygar, A. Whitten, and H. Wong.  In Proceedings of the 3rd USENIX Workshop on Electronic Commerce, September 1998, pp. 225-242.

  4. “How are we going to pay for this?  Fee-for-service in distributed systems - research and policy issues.”  C. Clifton, P. Gemmel, E. Means, M. Merges, J. D. Tygar.  In Proceedings of the 15th International Conference on Distributed Computing Systems, May 1995, pp. 344-348.

  5. “Miro:  A visual language for specifying security.” [Abstract]  M. Maimone, A. Moorman, J. D. Tygar, J. Wing. In Proceedings of the (First) USENIX UNIX Security Workshop, August 1988, p. 49.

  6. StrongBox:  Support for self-securing programs.”  [Abstract]  J. D. Tygar, B. Yee, and A. Spector.  In Proceedings of the (First) USENIX UNIX Security Workshop, August 1988, p. 50.

 

Standards Documents (does not include items listed above)

92.       

93.       

94.       

95.       

96.       

97.       

98.       

99.       

100.       

101.       

102.       

103.       

104.       

105.       

106.       

107.       

  1. TESLA: Multicast Source Authentication Transform Introduction.  A. Perrig, D. Song, R. Canetti, J. D. Tygar, B. Briscoe.  IETF RFC 4082.  June 2005.  (Early drafts of this RFC were published in October 2002, and in May, August, and December 2004.)

  2. Performance Criteria for Information-Based Indicia and Security Architecture for Closed IBI Postage Metering Systems (PCIBI-C) (Draft).  United States Postal Service.  January 1999.  (Note:  I was a major contributor to this document.)

  3. Performance Criteria for Information-Based Indicia and Security Architecture for Open IBI Postage Evidence Systems (PCIBI-O) (Draft).  United States Postal Service.  February 2000.  (Note:  I was a major contributor to this document.)

  4. Production, Distribution, and Use of Postal Security Devices and Information Based Indicia.”  United States Postal Service.  Federal Register 65:191, October 2, 2000, pp. 58682-58698.  (Note:  I was a major contributor to this document.)

 

Technical Reports (does not include items listed above)

  1. 機械翻訳の違和感を用いた CAPTCHA の提案 (A proposal of CAPTCHA using strangeness in machine translation).  T. Yamamoto, J. D. Tygar, and M. Nishigaki.  IPSJ SIG Technical Report 2009-CSEC-46 No.38. June 2009.  (See also item 54.)

  2. Compromising PCA-based anomaly detectors for network-wide traffic.  B. Rubinstein, B. Nelson, L. Huang, A. Joseph, S. Lau, N. Taft, and J. D. Tygar.   UC Berkeley, EECS technical report UCB/EECS-2008-73.  May 2008.

  3. Usability of Security:  A Case Study.   A. Whitten and J. D. Tygar.  Carnegie Mellon University Computer Science technical report CMU-CS-98-155, December 1998.  (Note:  this report partly overlaps item 11, but also includes substantial additional material.)

  4. Security for Network Attached Storage Devices.  H. Gobioff, G. Gibson and J. D. Tygar.  Carnegie Mellon University Computer Science technical report CMU-CS-97-185, October 1997.

  5. Cryptography:  It’s Not Just for Electronic Mail Anymore.  J. D. Tygar and B. Yee.  Carnegie Mellon University Computer Science technical report CMU-CS-93-107, March 1993.  (See also item 18 above.)

  6. Median Separators in d Dimension.  J. Sipelstein, S. Smith, and J. D. Tygar . Carnegie Mellon University Computer Science technical report CMU-CS-88-206, December 1988.

  7. When are Best Fit and First Fit Optimal?  C. McGeoch and J. D. Tygar.  Carnegie Mellon University Computer Science technical report CMU-CS-87-168, October 1987.

  8. Display Manager User’s Guide.  J. D. Tygar.   Valid Logic Systems engineering memorandum, VED-050682-1-JDT, May 1982.

  9. Performance analysis of the DANTE Network.  Bell Telephone Laboratories technical memorandum, August 1981.

Patents (does not include items listed above)

  1. Anonymous certified delivery.  L. J. Camp, J. D. Tygar, and M. Harkavy.  US Patent 6,076,078, June 13, 2000.

  2. Method and apparatus for purchasing and delivering digital goods over a network.  M. Sirbu, J. D. Tygar, B. Cox, T. Wagner.  US Patent 5,809,144, September 15, 1998.

Miscellaneous Technical (does not include items listed above)

  1. Security with Privacy.  Briefing from the Information Science and Technology Study Group on Security and Privacy (chair:  J. D. Tygar).  December 2002.

  2. Expert Report of J. D. Tygar ...  A&M Records et al v. Napster....  J. D. Tygar.  (For Hearing) July 2000.

 

Miscellaneous Non-Technical (does not include items listed above)

108.       

109.       

110.       

111.       

112.       

113.       

114.       

115.       

116.       

117.       

118.       

119.       

  1. Welcome Multiculturalism (Letter to the Editor).”  J. D. Tygar.  Taipei Times, November 12, 2004, p. 8.

 

 


© Doug Tygar (web updated 01 July 2013)