Doug Tygar 

 

Biography
Blog
Contact
Publications
Research
Security
Teaching

 

Publications 

 

Books

  1. Computer Security in the 21st Century Eds. D. Lee, S. Shieh, and J. D. Tygar.  Springer, 2005.  (This book includes item 7 below as well as a technical introduction by me and the other editors.)
     

  2. Secure Broadcast Communication in Wired and Wireless NetworksA. Perrig and J. D. Tygar.  Springer (Kluwer), 2003.  Also, a Japanese translation with additional material appeared as Waiyādo/Waiyaresu Nettowōku ni Okeru Burōdokyasuto Tsūshin no Sekyuriti (ワイヤード/ワイヤレスネットワークにおけるブロードキャスト通信のセキュリティ).  Translated by Fumio Mizoguchi and the Science University of Tokyo Information Media Science Research Group.  Kyoritsu Shuppan, 2004. 
     

  3. Trust in Cyberspace.  National Research Council Committee on Information Systems Trustworthiness (S. Bellovin, W. E. Boebert, M. Branstad, J. R. Catoe, S. Crocker, C. Kaufman, S. Kent, J. Knight, S. McGeady, R. Nelson, A. Schiffman, F. Schneider [ed.], G. Spix, and J. D. Tygar).  National Academy Press, 1999.

 

Book Chapters  (does not include items listed above)

  1.  Case Study:  Acoustic Keyboard Emanations.”  L. Zhuang, F. Zhou, and J. D. Tygar.  In Phishing and Countermeasures:  Understanding the Increasing Problem of Electronic Identity Theft, eds. M. Jakobsson and S. Myers.  Wiley-Interscience, 2007, pp. 221-240.  (This is a popularized version of item 41.)
     

  2.  Dynamic Security Skins.”  R. Dhamija and J. D. Tygar..  In Phishing and Countermeasures:  Understanding the Increasing Problem of Electronic Identity Theft, eds. M. Jakobsson and S. Myers.  Wiley-Interscience, 2007, pp. 339-351.  (This is a popularized version of item 42.)
     

  3. Why Johnny can’t encrypt:  A usability evaluation of PGP 5.0.”  A. Whitten and J. D. Tygar.  In Security and Usability:  Designing Secure Systems that People Can Use, eds. L. Cranor and G. Simson.  O'Reilly, 2005, pp. 679-702.  (An earlier version of the paper was published in Proceedings of the 8th USENIX Security Symposium, August 1999, pp. 169-183.  See also item 87.)
     

  4. Private matching.”  Y. Li, J. D. Tygar, J. Hellerstein.  In Computer Security in the 21st Century, eds. D. Lee, S. Shieh, and J. D. Tygar.  Springer, 2005, pp. 25-50.  (See item 1.)  (An early version of this paper appeared as Intel Research Laboratory Berkeley technical report IRB-TR-04-005, February 2004.) 
     

  5. Digital cash.”  J. D. Tygar.  In Berkshire Encyclopedia of Human Computer Interaction, ed. W. Bainbridge.  Berkshire Publishing, 2004, pp. 167-170.
     

  6. Spamming.”  J. D. Tygar.  In Berkshire Encyclopedia of Human Computer Interaction, ed. W. Bainbridge.  Berkshire Publishing, 2004, pp. 673-675. 
     

  7. Viruses.”  J. D. Tygar.  In Berkshire Encyclopedia of Human Computer Interaction, ed. W. Bainbridge.  Berkshire Publishing, 2004, pp. 788-791. 
     

  8. Privacy in sensor webs and distributed information systems.”  J. D. Tygar.  In Software Security, eds. M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa.  Springer, 2003, pp. 84-95.
     

  9. Atomicity in electronic commerce.”  J. D. Tygar.  In Internet Besieged,  eds. D. Denning and P. Denning.  ACM Press and Addison-Wesley, 1997, pp. 389-405.  (An expanded earlier version of this paper was published in Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, Keynote paper, May 1996, pp. 8-26; and as Carnegie Mellon University Computer Science technical report CMU-CS-96-112, January 1996.  See also item 28.)
     

  10. Cryptographic postage indicia.”  J. D. Tygar, B. Yee, and N. Heintze.   In Concurrency and Parallelism, Programming, Networking, and Security, eds. J. Jaffar and R. Yap.  Springer, 1996, pp. 378-391.  (Preprint also available.  Early versions appeared as Carnegie Mellon University Computer Science technical reports CMU-CS-96-113, January 1996, UC San Diego Computer Science technical report UCSD-TR-CS96-485, and in the 1996 Securicom Proceedings, Paris, 1996.  See also item 89.)
     

  11. Dyad: A system for using physically secure coprocessors.”  J. D. Tygar and B. Yee.  In Technological Strategies for the Protection of Intellectual Property in the Networked Multimedia Environment.  Interactive Multimedia Association, 1994, pp. 121-152.  (An early version appeared as Carnegie Mellon University Computer Science technical report CMU-CS-91-140R, May 1991.)
     

  12. A system for self-securing programs.”  J. D. Tygar and B. Yee.  In Carnegie Mellon Computer Science: A 25-Year Commemorative, ed. R. Rashid.  ACM Press and Addison-Wesley, 1991, pp. 163-197.  (Note:  The first printing of this volume had incorrect text due to a production error.)
     

  13. Implementing capabilities without a trusted kernel.”  M. Herlihy and J. D. Tygar.  In Dependable Computing for Critical Applications, eds. A. Avizienis and J. Laprie. Springer, 1991, pp. 283-300.  (Note:  An early version appeared in the (IFIP) Proceedings of the International Working Conference on Dependable Computing for Critical Applications, August 1989.)
     

  14. Strongbox.”  J. D. Tygar and B. Yee.  In Camelot and Avalon: A Distributed Transaction Facility, eds. J. Eppinger, L. Mummert, and A. Spector.  Morgan-Kaufmann, 1991, pp. 381-400.
     

  15. ITOSS:  An Integrated Toolkit for Operating System Security.” M. Rabin and J. D. Tygar.  In Foundations of Data Organization, eds. W. Litwin and H.-J. Shek.  Springer, 1990, pp. 2-15.  (Preprint also available.)  (Note:  Earlier, longer versions appeared as Harvard University Aiken Computation Laboratory technical report TR-05-87R and my Ph.D. dissertation.)
     

  16. Formal Semantics for Visual Specification of Security.”  M. Maimone, J. D. Tygar, and J. Wing.   In Visual Languages and Visual Programming, ed. S. K. Chang.  Plenum, 1990, pp. 97-116.  (An early version was published in Proceedings of the 1988 IEEE Workshop on Visual Programming, pp. 45-51, and as Carnegie Mellon University Computer Science technical report CMU-CS-88-173r, December 1988.)

 

Journal Articles (does not include items listed above)

  1. “Injecting Heterogeneity through Protocol Randomization.”  L. Zhuang, J. D. Tygar, R. Dhamija.  In International Journal of Network Security, 4:1, January 2007, pp. 45-58.
     

  2. Cyber defense technology networking and evaluation.”  Members of the DETER and EMIST Projects (R. Bajcsy, T. Benzel, M. Bishop, B. Braden, C. Brodley, S. Fahmy, S. Floyd, W. Hardaker, A. Joseph, G. Kesidis, K. Levitt, B. Lindell, P. Liu, D. Miller, R. Mundy, C. Neuman, R. Ostrenga, V. Paxson, P. Porras, C. Rosenberg, S. Sastry, D. Sterne, J. D. Tygar, and S. Wu).  In Communications of the ACM, 47:3, March 2004, pp. 58-61.
     

  3. Technological dimensions of privacy in Asia.”  J. D. Tygar.  In Asia-Pacific Review, 10:2, November 2003, pp. 120-145.
     

  4. SPINS:  Security protocols for sensor networks.”  A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. Culler.  In [ACM Journal of] Wireless Networks, 8:5, September 2002, pp. 521-534.  (An early version of this paper appears in Proceedings of the 7th Annual International Conference on Mobile Computing and Networks (MOBICOM), July 2001, pp. 189-199.)
     

  5. The TESLA broadcast authentication protocol.”  A. Perrig, R. Canneti, J. D. Tygar, and D. Song.  In CryptoBytes, 5:2, Summer/Fall 2002, pp. 2-13.
     

  6. SAM:  A flexible and secure auction architecture using trusted hardware.”  A. Perrig, S. Smith, D. Song, and J. D. Tygar.  In Electronic Journal on E-commerce Tools and Applications, 1:1, January 2002 (online journal).  (An early version of this paper appeared in Proceedings of the 1st IEEE International Workshop on Internet Computing and Electronic Commerce, April 2001, pp. 1764-1773.)
     

  7. “Why isn’t the internet secure yet?”  J. D. Tygar and A. Whitten.  In ASLIB Proceedings, 52:3, March 2000, pp. 93-97.  (Preprint also available.)
     

  8. Multi-round anonymous auction protocols.”  H. Kikuchi, M. Harkavy, and J. D. Tygar.  In Institute of Electronics, Information, and Communication Engineers Transactions on Information and Systems, E82-D:4, April 1999, pp. 769-777.  (An early version appeared in Proceedings of of the First IEEE Workshop on Dependable and Real-Time E-Commerce Systems (DARE ’98), June 1998, pp. 62-69. )
     

  9. Atomicity in electronic commerce.”  J. D. Tygar.  In ACM NetWorker, 2:2, April/May 1998, pp. 32-43.  (Note:  this is a revision of item 12 published together with a new article:  “An update on electronic commerce.”  In ACM NetWorker, Volume 2, Number 2, April/May 1998, pp. 40-41.)
     

  10. A model for secure protocols and their compositions.”  N. Heintze and J. D. Tygar.  In IEEE Transactions on Software Engineering, 22:1, January 1996, pp. 16-30.  (An extended abstract appeared in Proceedings of the 1994 IEEE Symposium on Security and Privacy, May 1994, pp. 2-13.  Another early version appeared as Carnegie Mellon University Computer Science technical report CMU-CS-92-100, January 1992.)
     

  11. NetBill: An Internet commerce system optimized for network-delivered services.”   M. Sirbu and J. D. Tygar. In IEEE Personal Communications, 2:4,  August 1995, pp. 34-39.  (An early version appeared in Proceedings of Uniforum ’96, February 1996, pp. 203-226.  Another early version appeared in Proceedings of the 40th IEEE Computer Society International Conference,  Spring 1995, pp. 20-25.)
     

  12. Optimal sampling strategies for quicksort.”  C. C. McGeoch and J. D. Tygar.  In Random Structures and Algorithms, 7:4, 1995, pp. 287-300.  (An early version appeared in Proceedings of the 28th Annual Allerton Conference on Communication, Control, and Computing, October 1990, pp. 62-71.)
     

  13. Geometric characterization of series-parallel variable resistor networks.”  R. Bryant, J. D. Tygar, and L. Huang.  In IEEE Transactions on Circuits and Systems 1: Fundamental Theory and Applications, 41:11, November 1994, pp. 686-698.  (Preprint also available.)  (An early version appeared in Proceedings of the 1993 IEEE International Symposium on Circuits and Systems, May 1993, pp. 2678-2681.)
     

  14. Computability and complexity of ray tracing.”  J. Reif, J. D. Tygar, and A. Yoshida. In Discrete and Computational Geometry, 11:3, April 1994, pp. 265-287.  (An early version appeared in Proceedings of the 31st Annual IEEE Symposium on Foundations of Computer Science, October 1990, pp. 106-114.)
     

  15. Specifying and checking Unix security constraints.”  A. Heydon and J. D. Tygar. In Computing Systems, 7:1, Winter 1994, pp. 91-112.  (An early version appeared in Proceedings of the 3rd USENIX Security Symposium, September 1992, pp. 211-226, preprint also available.)
     

  16. Protecting privacy while preserving access to data.”  L. J. Camp and J. D. Tygar.  In The Information Society, 10:1, January 1994, pp. 59-71.
     

  17. Miro: visual specification of security.”  A. Heydon, M. Maimone, J. D. Tygar, J. Wing, and A. Zaremski.  In IEEE Transactions on Software Engineering, 16:10, October 1990, pp. 1185-1197.  (An early version appeared as Carnegie Mellon University Computer Science Department technical report CMU-CS-89-199, December 1989.)
     

  18. Efficient parallel pseudo-random number generation.”  J. Reif and J. D. Tygar.  In SIAM Journal of Computation, 17:2, April 1988, pp. 404-411.  (An early version appeared in Proceedings of CRYPTO-85, eds. E. Brickell and H. Williams, Springer, 1986, pp. 433-446.)
     

  19. Review of Abstraction and Specification in Program Development.”  J. D. Tygar.  In ACM Computing Reviews, 28:9, September 1987, pp. 454-455.

 

 Refereed Conference Papers (does not include items listed above)

  1. Why Phishing Works.”  R. Dhamija, J. D. Tygar, and M. Hearst.  To appear in Proceedings of CHI-2006:  Conference on Human Factors in Computing Systems, April 2006.
     

  2. Can Machine Learning Be Secure?”  M. Barreno, B. Nelson, R. Sears, A. Joseph, and J. D. Tygar.  Invited paper.  To appear in Proceedings of the ACM Symposium on Information, Computer, and Communication Security, March 2006.
     

  3. Keyboard Acoustic Emanations Revisited.”  L. Zhuang, F. Zhou, and J. D. Tygar.  In Proceedings of the 12th ACM Conference on Computer and Communications Security, November 2005, pp. 373-382.  (See also item 4.)
     

  4. The Battle Against Phishing:  Dynamic Security Skins.”  R. Dhamija and J. D. Tygar.  In SOUPS 2005:  Proceedings of the 2005 ACM Symposium on Usable Security and Privacy, ACM International Conference Proceedings Series, ACM Press, July 2005, pp. 77-88.  (See also item 5.)
     

  5. Collaborative filtering CAPTCHAs.”  M. Chew and J. D. Tygar.  In Human Interactive Proofs:  Second International Workshop (HIP 2005), eds. H. Baird and D. Lopresti, Springer, May 2005,  pp. 66-81.
     

  6. Phish and HIPs: Human interactive proofs to detect phishing attacks.”  R. Dhamija and J. D. Tygar.  In Human Interactive Proofs:  Second International Workshop (HIP 2005), eds. H. Baird and D. Lopresti, Springer, May 2005, pp. 127-141.
     

  7. Image recognition CAPTCHAs.” M. Chew and J. D. Tygar.  In Proceedings of the 7th International Information Security Conference (ISC 2004), Springer, September 2004, pp. 268-279.  (A longer version appeared as UC Berkeley Computer Science Division technical report UCB/CSD-04-1333, June 2004.)
     

  8. Side effects are not sufficient to authenticate software.”  U. Shankar, M. Chew, and J. D. Tygar.  In Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 89-101.  (A version with an additional appendix appeared as UC Berkeley Computer Science Division technical report UCB/CSD-04-1363, September 2004.)
     

  9. Statistical monitoring + predictable recovery = Self-*.”  A Fox, E. Kiciman, D. Patterson, R. Katz, M. Jordan, I. Stoica and J. D. Tygar.  In Proceedings of the 2nd Bertinoro Workshop on Future Directions in Distributed Computing (FuDiCo II), June 2004 (online proceedings).
     

  10. Distillation codes and their application to DoS resistant multicast authentication.”  C. Karlof, N. Sastry, Y. Li, A. Perrig, and J. D. Tygar.  In Proceedings of the Network and Distributed System Security Conference (NDSS 2004), February 2004, pp. 37-56.
     

  11. Privacy and security in the location-enhanced World Wide Web.”  J. Hong, G. Boriello, J. Landay, D. McDonald, B. Schilit, and J. D. Tygar.  In Proceedings of the Workshop on Privacy at Ubicomp 2003, October 2003 (online proceedings).
     

  12. The problem with privacy.”  J. D. Tygar.  Keynote paper.  In Proceedings of the 2003 IEEE Workshop on Internet Applications, June 2003, pp. 2-8.
     

  13. Safe staging for computer security.”  A. Whitten and J. D. Tygar.  In Proceedings of the 2003 Workshop on Human-Computer Interaction and Security Systems, April 2003 (online proceedings). 
     

  14. “Expander graphs for digital stream authentication and robust overlay networks.”  D. Song, D. Zuckerman, and J. D. Tygar.  In Proceedings of the 2002 IEEE Symposium on Security and Privacy, May 2002, pp. 258-270.
     

  15. ELK:  A new protocol for efficient large-group key distribution.”  A. Perrig, D. Song, and J. D. Tygar.  In Proceedings of the 2001 IEEE Symposium on Security and Privacy, May 2001, pp. 247-262.
     

  16. Efficient and secure source authentication for multicast.”  A. Perrig, R. Canetti, D. Song, and J. D. Tygar.  In Proceedings of the Internet Society Network and Distributed System Security Symposium (NDSS 2001), February 2001, pp. 35-46.
     

  17. Efficient authentication and signing of multicast streams over lossy channels.”  A. Perrig, R. Canetti, J. D. Tygar, and D. Song.  In Proceedings of the 2000 IEEE Symposium on Security and Privacy, May 2000, pp. 56-73..
     

  18. Flexible and scalable credential structures:  NetBill implementation and experience.”  Y. Kawakura, M. Sirbu., I. Simpson, and J. D. Tygar.  In Proceedings of the International Workshop on Cryptographic Techniques and E-Commerce, July 1999, pp. 231-245.
     

  19. Open problems in electronic commerce.”  J. D. Tygar.  Invited address.  In Proceedings of the 18th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS 1999), May 1999, p. 101.
     

  20. Electronic auctions with private bids.”  M. Harkavy, J. D. Tygar, and H. Kikuchi.  In Proceedings of the 3rd USENIX Workshop on Electronic Commerce, September 1998, pp. 61-73.
     

  21. Atomicity versus anonymity:  Distributed transactions for electronic commerce.”  J. D. Tygar.  In Proceedings of the 24th International Conference on Very Large Data Bases, August 1998, pp. 1-12.
     

  22. Smart cards in hostile environments.”  H. Gobioff, S. Smith, J. D. Tygar, and B. Yee.  In Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996, pp. 23-28.  (An early version appeared as Carnegie Mellon University Computer Science technical report CMU-CS-95-188, September 1995.)
     

  23. Anonymous atomic transactions.”  L. J. Camp, M. Harkavy, and B. Yee.  In Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996, pp. 123-133.  (Preprint also available.)  (An early version appeared as Carnegie Mellon University Computer Science technical report CMU-CS-96-156, July 1996.) 
     

  24. Model checking electronic commerce protocols.”  N. Heintze, J. D. Tygar, J. Wing, and H. Wong. In Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996, pp. 147-164.
     

  25. WWW electronic commerce and Java Trojan horses.”  J. D. Tygar and A. Whitten.  In Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996, pp. 243-250.
     

  26. Building blocks for atomicity in electronic commerce.”  J. Su and J. D. Tygar.  In Proceedings of the 6th USENIX Security Symposium, July 1996, pp. 97-102.
     

  27. Token and notational money in electronic commerce.”  L. J. Camp, M. Sirbu, and J. D. Tygar.  In Proceedings of the 1st USENIX Workshop on Electronic Commerce, July 1995, pp. 1-12.  (An early version was presented at the Telecommunications Policy Research Conference, October 1994.)
     

  28. NetBill security and transaction protocol.”  B. Cox, J. D. Tygar, and M. Sirbu.  In Proceedings of the 1st USENIX Workshop on Electronic Commerce, July 1995, pp. 77-88.
     

  29. Secure coprocessors in electronic commerce applications.”  B. Yee and J. D. Tygar.  In Proceedings of the 1st USENIX Workshop on Electronic Commerce, July 1995, pp. 155-170.
     

  30. Completely asynchronous optimistic recovery with minimal rollbacks.”  S. Smith, D. Johnson, and J. D. Tygar.  In Proceedings of the 25th IEEE Symposium on Fault-Tolerant Computing, June 1995, pp. 361-370.  (An early version appears as Carnegie Mellon University Computer Science technical report CMU-CS-94-130, March 1994.)
     

  31. A fast off-line electronic currency protocol.”  L. Tang and J. D. Tygar. In CARDIS 94: Proceedings of the First IFIP Smart Card Research and Advanced Application Conference, October 1994, pp. 89-100.
     

  32. Security and privacy for partial order time.”  S. Smith and J. D. Tygar.  In Proceedings 1994 Parallel and Distributed Computing Systems Conference, October 1994, pp. 70-79.  (Early versions appeared as Carnegie Mellon University Computer Science technical reports CMU-CS-93-116, October 1991 and February 1993, and CMU-CS-94-135, April 1994.)
     

  33. Certified electronic mail.”  A. Bahreman and J. D. Tygar.  In Proceedings of the 1994 Network and Distributed Systems Security Conference, February 1994, pp. 3-19.
     

  34. Miro tools.”  A. Heydon, M. Maimone, A. Moormann, J. D. Tygar and J. Wing.  In Proceedings of the 3rd IEEE Workshop on Visual Languages, October 1989, pp. 86-91.  (A preprint appeared as Carnegie Mellon University Computer Science technical report CMU-CS-89-159, July 1989.)
     

  35. Constraining pictures with pictures.”  A. Heydon, M. Maimone, A. Moormann, J. D. Tygar, and J. Wing.  In Information Processing 89: Proceedings of the 11th World Computer Congress, August 1989, pp. 157-162.  (An early version appeared as Carnegie Mellon University Computer Science technical report CMU-CS-88-185, November 1988.)
     

  36. How to make replicated data secure.”  M. Herlihy and J. D. Tygar. In Proceedings of CRYPTO-87, ed. C. Pomerance, 1988, pp. 379-391.  (An early version appeared as Carnegie Mellon University Computer Science Technical Report CMU-CS-87-143, August 1987.)
     

  37. Visual specification of security constraints.”  J. D. Tygar and  J. Wing.  In Proceedings of the 1987 (First IEEE) Workshop on Visual Languages, August 1987, pp. 288-301.  (A preprint appeared as Carnegie Mellon University Computer Science Technical Report CMU-CS-87-122, May 1987.)
     

  38. Efficient netlist comparison using hierarchy and randomization.”  J. D. Tygar and R. Ellickson.  In Proceedings of the 22nd ACM/IEEE Design Automation Conference, Las Vegas, NV, July 1985, pp. 702-708.
     

  39. Hierarchical logic comparison.” R. Ellickson and J. D. Tygar. In Proceedings of MIDCON ’84, 1984.

 

 Other Conference Publications (does not include items listed above)

  1. When Computer Security Crashes with Multimedia.”  [Abstract]  J. D. Tygar.  In Proceedings of the 7th International IEEE Symposium on Multimedia, December 2005, p. 2.
     

  2. Notes from the Second USENIX Workshop on Electronic Commerce.”  M. Harkavy, A. Meyers, J. D. Tygar, A. Whitten, and H. Wong.  In Proceedings of the 3rd USENIX Workshop on Electronic Commerce, September 1998, pp. 225-242.
     

  3. How are we going to pay for this?  Fee-for-service in distributed systems -- research and policy issues.”  C. Clifton, P. Gemmel, E. Means, M. Merges, J. D. Tygar.  In Proceedings of the 15th International Conference on Distributed Computing Systems, May 1995, pp. 344-348.
     

  4. Miro: A visual language for specifying security.” [Abstract]  M. Maimone, A. Moorman, J. D. Tygar, J. Wing. In Proceedings of the (First) USENIX UNIX Security Workshop, August 1988, p. 49.
     

  5. StrongBox:  support for self-securing programs.”  [Abstract]  J. D. Tygar, B. Yee, and A. Spector.  In Proceedings of the (First) USENIX UNIX Security Workshop, August 1988, p. 50.

 

Standards Documents (does not include items listed above)

  1. TESLA: Multicast Source Authentication Transform Introduction.  A. Perrig, D. Song, R. Canetti, J. D. Tygar, B. Briscoe.  IETF RFC 4082.  June 2005.  (Early drafts of this RFC were published in October 2002, and in May, August, and December 2004.)
     

  2. Performance Criteria for Information-Based Indicia and Security Architecture for Closed IBI Postage Metering Systems (PCIBI-C) (Draft).  United States Postal Service.  January 1999.  (Note:  I was a major contributor to this document.)
     

  3. Performance Criteria for Information-Based Indicia and Security Architecture for Open IBI Postage Evidence Systems (PCIBI-O) (Draft).  United States Postal Service.  February 2000.  (Note:  I was a major contributor to this document.)
     

  4. Production, Distribution, and Use of Postal Security Devices and Information Based Indicia.”  United States Postal Service.  Federal Register 65:191, October 2, 2000, pp. 58682-58698.  (Note:  I was a major contributor to this document.)

 

Technical Reports (does not include items listed above)

  1. Usability of Security:  A Case Study.   A. Whitten and J. D. Tygar.  Carnegie Mellon University Computer Science technical report CMU-CS-98-155, December 1998.  (Note:  this report partly overlaps item 6, but also includes substantial additional material.)
     

  2. Security for Network Attached Storage Devices.  H. Gobioff, G. Gibson and J. D. Tygar.  Carnegie Mellon University Computer Science technical report CMU-CS-97-185, October 1997.
     

  3. Cryptography:  It’s Not Just for Electronic Mail Anymore.  J. D. Tygar and B. Yee.  Carnegie Mellon University Computer Science technical report CMU-CS-93-107, March 1993.  (See also item 13 above.)
     

  4. Median Separators in d Dimensions.  J. Sipelstein, S. Smith, and J. D. Tygar . Carnegie Mellon University Computer Science technical report CMU-CS-88-206, December 1988.
     

  5. When are Best Fit and First Fit Optimal?  C. McGeoch and J. D. Tygar.  Carnegie Mellon University Computer Science technical report CMU-CS-87-168, October 1987.
     

  6. Display Manager User’s Guide.  J. D. Tygar.   Valid Logic Systems engineering memorandum, VED-050682-1-JDT, May 1982.
     

  7. Performance analysis of the DANTE Network.  Bell Telephone Laboratories technical memorandum, August 1981. 

 

Patents (does not include items listed above)

  1. Anonymous certified delivery.  L. J. Camp, J. D. Tygar, and M. Harkavy.  US Patent 6,076,078, June 13, 2000.
     

  2. Method and apparatus for purchasing and delivering digital goods over a network.  M. Sirbu, J. D. Tygar, B. Cox, T. Wagner.  US Patent 5,809,144, September 15, 1998.

 

Miscellaneous Technical (does not include items listed above)

  1. Security with PrivacyBriefing from the Information Science and Technology Study Group on Security and Privacy (chair:  J. D. Tygar).  December 2002.
     

  2. Expert Report of J. D. Tygar ...  A&M Records et al v. Napster....  J. D. Tygar.  (For Hearing) July 2000.

 

Miscellaneous Non-Technical (does not include items listed above)

  1. Welcome Multiculturalism (Letter to the Editor).”  J. D. Tygar.  Taipei Times, November 12, 2004, p. 8.

 

 

 


© Doug Tygar (web updated 19 December 2006)