Biography
Blog
Contact
Publications
Research
Security
Teaching
| |
Publications
Books
-
Computer Security in the 21st Century.
Eds. D. Lee, S. Shieh, and J. D. Tygar. Springer, 2005. (This
book includes
item 7 below as well as a
technical
introduction
by me and the other editors.)
-
Secure Broadcast Communication in Wired and Wireless Networks.
A. Perrig and J. D. Tygar.
Springer (Kluwer), 2003. Also, a Japanese translation with
additional material appeared as
Waiyādo/Waiyaresu
Nettowōku ni Okeru Burōdokyasuto Tsūshin no Sekyuriti
(ワイヤード/ワイヤレスネットワークにおけるブロードキャスト通信のセキュリティ).
Translated by Fumio Mizoguchi and
the Science University of Tokyo Information Media Science Research
Group. Kyoritsu Shuppan, 2004.
-
Trust in Cyberspace.
National Research Council Committee on
Information Systems Trustworthiness (S. Bellovin, W. E. Boebert, M. Branstad, J. R.
Catoe, S. Crocker, C. Kaufman, S. Kent, J. Knight, S. McGeady, R.
Nelson, A. Schiffman, F. Schneider [ed.], G. Spix, and J. D. Tygar). National Academy Press, 1999.
Book Chapters
(does not include items listed above)
-
“Case
Study: Acoustic Keyboard Emanations. L. Zhuang, F. Zhou, and J. D.
Tygar. In Phishing and Countermeasures: Understanding the
Increasing Problem of Electronic Identity Theft, eds. M. Jakobsson
and S. Myers. Wiley-Interscience, 2007, pp. 221-240. (This
is a popularized version of
item 41.)
-
“Dynamic
Security Skins. R. Dhamija and J. D. Tygar.. In Phishing
and Countermeasures: Understanding the Increasing Problem of
Electronic Identity Theft, eds. M. Jakobsson and S. Myers.
Wiley-Interscience, 2007, pp. 339-351. (This is a popularized
version of item 42.)
-
“Why
Johnny cant encrypt: A usability evaluation of PGP 5.0.
A. Whitten and J. D. Tygar. In Security and
Usability: Designing Secure Systems that People Can Use, eds.
L. Cranor and G. Simson. O'Reilly, 2005, pp. 679-702. (An
earlier version of the
paper was published in Proceedings of the 8th USENIX
Security Symposium, August 1999, pp. 169-183. See also
item
87.)
-
“Private
matching.” Y. Li, J. D. Tygar, J. Hellerstein. In
Computer Security in the
21st Century,
eds. D. Lee, S. Shieh, and J. D. Tygar. Springer, 2005, pp. 25-50. (See
item
1.) (An early version of this paper appeared as
Intel Research Laboratory Berkeley technical
report IRB-TR-04-005, February 2004.)
-
“Digital
cash.” J. D. Tygar. In
Berkshire Encyclopedia of Human
Computer Interaction, ed. W. Bainbridge. Berkshire Publishing,
2004, pp. 167-170.
-
“Spamming.”
J. D. Tygar. In Berkshire Encyclopedia of Human Computer
Interaction,
ed. W. Bainbridge. Berkshire Publishing, 2004, pp. 673-675.
-
“Viruses.”
J. D. Tygar. In Berkshire Encyclopedia of Human Computer Interaction, ed. W.
Bainbridge. Berkshire Publishing, 2004, pp. 788-791.
-
“Privacy
in sensor webs and distributed information systems.” J. D. Tygar.
In Software Security, eds.
M. Okada, B. Pierce,
A. Scedrov, H. Tokuda, and A. Yonezawa.
Springer, 2003, pp. 84-95.
-
“Atomicity
in electronic commerce.” J. D. Tygar. In Internet
Besieged, eds. D. Denning and P. Denning. ACM Press
and Addison-Wesley, 1997, pp. 389-405. (An
expanded earlier
version of this paper was published in Proceedings of the Fifteenth Annual ACM
Symposium on Principles of Distributed Computing, Keynote
paper, May 1996, pp. 8-26; and as Carnegie Mellon University Computer Science technical
report CMU-CS-96-112,
January 1996. See also
item
28.)
-
“Cryptographic
postage indicia. J. D. Tygar, B. Yee, and N. Heintze.
In Concurrency and Parallelism, Programming, Networking, and Security,
eds. J. Jaffar and R. Yap. Springer, 1996, pp. 378-391.
(Preprint
also available. Early versions appeared as Carnegie Mellon University Computer Science technical reports
CMU-CS-96-113,
January 1996, UC
San Diego Computer Science technical
report UCSD-TR-CS96-485,
and in the 1996
Securicom Proceedings, Paris,
1996. See also
item 89.)
-
“Dyad:
A system for using physically secure coprocessors.” J. D. Tygar
and B. Yee. In Technological
Strategies for the Protection of Intellectual Property in the Networked
Multimedia Environment. Interactive Multimedia Association, 1994, pp. 121-152. (An early
version appeared as Carnegie Mellon University Computer Science technical report
CMU-CS-91-140R, May 1991.)
-
-
“Implementing
capabilities
without a trusted kernel.” M. Herlihy and J. D. Tygar. In
Dependable Computing for Critical Applications, eds. A. Avizienis
and J. Laprie. Springer, 1991, pp. 283-300.
(Note: An early version appeared in the
(IFIP)
Proceedings of the International Working Conference on Dependable
Computing for Critical Applications, August 1989.)
-
“Strongbox.”
J. D. Tygar and B. Yee. In Camelot and Avalon: A Distributed
Transaction Facility, eds. J. Eppinger, L. Mummert, and A. Spector.
Morgan-Kaufmann, 1991, pp. 381-400.
-
-
Journal Articles
(does not include items listed above)
-
“Injecting Heterogeneity through Protocol
Randomization. L. Zhuang, J. D.
Tygar, R. Dhamija. In International
Journal of Network Security, 4:1, January 2007, pp. 45-58.
-
“Cyber
defense technology networking and evaluation.”
Members of the DETER and EMIST Projects (R.
Bajcsy, T. Benzel, M. Bishop, B. Braden, C. Brodley, S. Fahmy, S. Floyd,
W. Hardaker, A. Joseph, G. Kesidis, K. Levitt, B. Lindell, P. Liu, D.
Miller, R. Mundy, C. Neuman, R. Ostrenga, V. Paxson, P. Porras, C.
Rosenberg, S. Sastry, D. Sterne, J. D. Tygar, and S. Wu).
In Communications of the ACM, 47:3, March 2004, pp. 58-61.
-
“Technological
dimensions of privacy in Asia.” J. D. Tygar. In Asia-Pacific Review,
10:2, November 2003, pp. 120-145.
-
“SPINS:
Security protocols for sensor networks.” A. Perrig, R.
Szewczyk, J. D. Tygar, V. Wen, and D. Culler. In [ACM Journal
of] Wireless Networks,
8:5, September 2002, pp. 521-534. (An
early version of this paper
appears in Proceedings of the 7th
Annual International Conference on Mobile Computing and Networks (MOBICOM),
July 2001,
pp. 189-199.)
-
-
“SAM:
A flexible and secure auction architecture using trusted hardware.”
A. Perrig, S. Smith, D. Song, and J. D. Tygar. In Electronic Journal on E-commerce Tools and Applications,
1:1, January 2002 (online journal). (An
early version of this paper
appeared in Proceedings of the 1st IEEE International Workshop on Internet Computing
and Electronic Commerce, April 2001, pp. 1764-1773.)
-
Why
isn’t the internet secure yet?” J. D. Tygar and A. Whitten.
In ASLIB Proceedings, 52:3, March 2000, pp. 93-97. (Preprint
also available.)
-
-
-
-
“NetBill:
An Internet commerce system optimized for network-delivered services.”
M. Sirbu and J. D. Tygar. In IEEE Personal Communications, 2:4,
August 1995, pp. 34-39. (An
early version
appeared in Proceedings of Uniforum ’96, February 1996, pp. 203-226.
Another early
version appeared in Proceedings of the 40th IEEE Computer Society
International Conference, Spring 1995, pp. 20-25.)
-
-
“Geometric
characterization of series-parallel variable resistor networks.”
R. Bryant, J. D. Tygar, and L. Huang. In IEEE Transactions on
Circuits and Systems 1: Fundamental Theory and Applications, 41:11,
November 1994, pp. 686-698. (Preprint
also available.) (An
early version appeared in
Proceedings of the 1993 IEEE International Symposium on Circuits and Systems,
May 1993, pp. 2678-2681.)
-
“Computability
and complexity of ray tracing.” J. Reif, J. D. Tygar, and A.
Yoshida. In
Discrete and Computational Geometry, 11:3, April 1994, pp. 265-287.
(An early version appeared in
Proceedings of the 31st Annual IEEE Symposium on Foundations of
Computer Science, October 1990, pp. 106-114.)
-
-
-
“Miro:
visual specification of security.” A. Heydon, M. Maimone, J.
D. Tygar, J. Wing, and A. Zaremski. In IEEE Transactions on
Software Engineering, 16:10, October 1990, pp. 1185-1197. (An
early version appeared as Carnegie Mellon University Computer Science Department technical
report
CMU-CS-89-199, December 1989.)
-
“Efficient
parallel pseudo-random number generation.” J. Reif and J. D.
Tygar. In
SIAM Journal of Computation, 17:2, April 1988, pp. 404-411.
(An early
version appeared in
Proceedings of CRYPTO-85, eds. E. Brickell and H. Williams,
Springer, 1986, pp. 433-446.)
-
“Review of
Abstraction and Specification in Program Development.” J. D. Tygar.
In ACM Computing Reviews, 28:9, September 1987, pp. 454-455.
Refereed
Conference Papers (does not include items listed above)
-
“Why
Phishing Works. R. Dhamija, J. D. Tygar, and M. Hearst.
To appear in Proceedings of CHI-2006: Conference on Human
Factors in Computing Systems, April 2006.
-
“Can
Machine Learning Be Secure?
M. Barreno, B. Nelson, R. Sears, A. Joseph, and J. D. Tygar.
Invited paper. To appear in Proceedings of the ACM
Symposium on Information, Computer, and Communication Security,
March 2006.
-
“Keyboard
Acoustic Emanations Revisited. L. Zhuang, F. Zhou, and J. D.
Tygar. In Proceedings of the 12th ACM Conference on
Computer and Communications Security, November 2005, pp. 373-382.
(See also item 4.)
-
“The
Battle Against Phishing: Dynamic Security Skins.” R. Dhamija and J. D. Tygar.
In SOUPS 2005: Proceedings of the 2005 ACM
Symposium on Usable Security and Privacy, ACM International
Conference Proceedings Series, ACM Press, July 2005, pp. 77-88.
(See also item 5.)
-
“Collaborative
filtering CAPTCHAs. M. Chew and J. D. Tygar. In Human Interactive Proofs: Second International Workshop (HIP 2005),
eds. H. Baird and D. Lopresti, Springer, May 2005, pp. 66-81.
-
“Phish
and HIPs: Human interactive proofs to detect phishing attacks.”
R. Dhamija and J. D. Tygar.
In Human Interactive Proofs:
Second International Workshop (HIP 2005), eds. H. Baird and D.
Lopresti, Springer, May 2005, pp. 127-141.
-
“Image
recognition
CAPTCHAs.”
M. Chew and J. D. Tygar. In Proceedings of the 7th
International Information
Security Conference
(ISC 2004), Springer, September 2004, pp. 268-279. (A longer version
appeared as UC Berkeley Computer Science Division technical report
UCB/CSD-04-1333,
June 2004.)
-
“Side
effects are not sufficient to
authenticate software.”
U. Shankar, M. Chew, and J. D. Tygar. In Proceedings of the
13th USENIX Security
Symposium,
August 2004, pp. 89-101. (A version with an additional appendix
appeared as UC Berkeley Computer Science Division technical report
UCB/CSD-04-1363,
September 2004.)
-
“Statistical
monitoring + predictable recovery = Self-*.”
A Fox, E.
Kiciman, D. Patterson, R. Katz, M. Jordan, I. Stoica and J. D. Tygar.
In Proceedings of the 2nd Bertinoro Workshop on Future Directions in
Distributed Computing (FuDiCo II), June 2004 (online proceedings).
-
“Distillation
codes and their application to DoS resistant multicast authentication.”
C. Karlof, N. Sastry, Y. Li, A. Perrig, and J. D. Tygar. In Proceedings of the Network and Distributed System Security Conference (NDSS
2004), February 2004, pp. 37-56.
-
“Privacy
and security in the location-enhanced World Wide Web.”
J. Hong, G. Boriello,
J. Landay, D. McDonald, B. Schilit, and J. D. Tygar.
In Proceedings of the Workshop on Privacy at Ubicomp 2003,
October 2003 (online proceedings).
-
“The
problem with privacy.” J. D. Tygar. Keynote
paper. In
Proceedings of the 2003 IEEE Workshop on Internet Applications, June 2003, pp. 2-8.
-
“Safe
staging for computer security.” A. Whitten and J. D. Tygar.
In Proceedings of the 2003 Workshop on Human-Computer Interaction and Security Systems,
April 2003 (online
proceedings).
-
-
“ELK:
A new protocol for efficient large-group key distribution.” A.
Perrig, D. Song, and J. D. Tygar. In Proceedings of the 2001
IEEE Symposium on Security and Privacy, May 2001, pp. 247-262.
-
“Efficient
and secure source authentication for multicast.” A. Perrig, R.
Canetti, D. Song, and J. D. Tygar. In
Proceedings of the
Internet Society Network and Distributed System Security Symposium (NDSS
2001), February 2001, pp. 35-46.
-
“Efficient
authentication and signing of multicast streams over lossy channels.”
A. Perrig, R. Canetti, J. D. Tygar, and D. Song. In Proceedings of the 2000 IEEE Symposium on Security and Privacy,
May 2000, pp. 56-73..
-
“Flexible
and scalable credential structures: NetBill implementation and
experience.” Y. Kawakura, M. Sirbu., I. Simpson, and J. D.
Tygar. In Proceedings of the International Workshop on
Cryptographic Techniques and E-Commerce, July 1999, pp. 231-245.
-
“Open
problems in electronic commerce.” J. D. Tygar.
Invited address.
In
Proceedings of the 18th ACM SIGMOD-SIGACT-SIGART Symposium on Principles
of Database Systems (PODS 1999), May 1999, p. 101.
-
-
-
-
“Anonymous
atomic transactions.” L. J. Camp, M. Harkavy, and B. Yee. In
Proceedings of the 2nd USENIX Workshop on Electronic Commerce,
November 1996, pp. 123-133. (Preprint
also available.) (An early version appeared as Carnegie
Mellon University
Computer Science technical report
CMU-CS-96-156,
July 1996.)
-
“Model
checking electronic commerce protocols.” N. Heintze, J. D.
Tygar, J. Wing, and H. Wong. In Proceedings of the 2nd USENIX
Workshop on Electronic Commerce, November 1996, pp. 147-164.
-
“WWW
electronic commerce and Java Trojan horses.” J. D. Tygar and
A. Whitten. In Proceedings of the 2nd USENIX Workshop on
Electronic Commerce, November 1996, pp. 243-250.
-
“Building
blocks for atomicity in electronic commerce.” J. Su and J. D.
Tygar. In Proceedings of the 6th USENIX Security Symposium,
July 1996, pp. 97-102.
-
“Token
and notational money in electronic commerce.” L. J. Camp, M.
Sirbu, and J. D. Tygar. In Proceedings of the 1st USENIX
Workshop on Electronic Commerce, July 1995, pp. 1-12. (An
early version was presented at the Telecommunications Policy Research
Conference, October 1994.)
-
“NetBill
security and transaction protocol.” B. Cox, J. D. Tygar, and
M. Sirbu. In Proceedings of the 1st USENIX Workshop on
Electronic Commerce, July 1995, pp. 77-88.
-
“Secure
coprocessors in electronic commerce applications.” B. Yee and
J. D. Tygar. In Proceedings of the 1st USENIX Workshop on
Electronic Commerce, July 1995, pp. 155-170.
-
-
“A fast off-line electronic currency protocol.” L. Tang
and J. D. Tygar. In CARDIS 94: Proceedings of the First IFIP Smart Card
Research and Advanced Application Conference, October 1994, pp. 89-100.
-
-
“Certified electronic mail.” A. Bahreman
and J. D. Tygar. In Proceedings of the 1994 Network and Distributed Systems
Security Conference, February 1994, pp. 3-19.
-
“Miro tools.” A. Heydon, M. Maimone, A.
Moormann, J. D. Tygar and J. Wing. In Proceedings of the 3rd IEEE Workshop on Visual
Languages, October 1989, pp. 86-91. (A preprint appeared as
Carnegie Mellon University Computer Science technical report
CMU-CS-89-159, July
1989.)
-
“Constraining pictures with pictures.” A. Heydon, M. Maimone, A. Moormann,
J. D. Tygar, and J. Wing. In Information Processing
89: Proceedings of the 11th World Computer Congress, August 1989, pp.
157-162. (An early version appeared as Carnegie Mellon University Computer Science technical
report
CMU-CS-88-185,
November 1988.)
-
“How to make replicated data secure.”
M. Herlihy and J. D. Tygar. In Proceedings of CRYPTO-87, ed. C. Pomerance,
1988, pp. 379-391. (An early version appeared as Carnegie Mellon
University Computer Science Technical Report
CMU-CS-87-143,
August 1987.)
-
-
“Efficient netlist comparison using hierarchy and
randomization.” J. D. Tygar and R. Ellickson. In Proceedings
of the 22nd ACM/IEEE Design
Automation Conference, Las Vegas, NV, July 1985, pp. 702-708.
-
“Hierarchical logic comparison.” R. Ellickson
and J. D. Tygar.
In Proceedings of MIDCON ’84, 1984.
Other Conference
Publications (does not include items listed above)
-
“When
Computer Security Crashes with Multimedia.”
[Abstract] J. D. Tygar.
In Proceedings of the 7th International IEEE Symposium on Multimedia,
December 2005, p. 2.
-
“Notes from the Second
USENIX Workshop on
Electronic Commerce.” M. Harkavy, A. Meyers, J. D. Tygar, A. Whitten, and H. Wong.
In Proceedings of the 3rd USENIX Workshop on Electronic Commerce, September 1998,
pp. 225-242.
-
“How
are we going to pay for this? Fee-for-service in distributed
systems -- research and policy issues.” C. Clifton, P. Gemmel,
E. Means, M. Merges, J. D. Tygar. In Proceedings of the 15th
International Conference on Distributed Computing Systems, May 1995,
pp. 344-348.
-
“Miro:
A visual language for specifying security.” [Abstract] M. Maimone, A.
Moorman, J. D. Tygar, J. Wing. In Proceedings of the (First) USENIX UNIX
Security Workshop, August 1988, p. 49.
-
“StrongBox:
support for
self-securing programs.” [Abstract] J. D. Tygar, B. Yee, and
A. Spector. In Proceedings of the (First) USENIX UNIX Security
Workshop, August 1988, p. 50.
Standards Documents (does not include items listed above)
-
TESLA: Multicast
Source Authentication Transform Introduction.
A.
Perrig, D. Song, R. Canetti, J. D. Tygar, B. Briscoe. IETF RFC
4082. June 2005. (Early drafts of this RFC were published in
October 2002,
and in May,
August, and
December 2004.)
-
Performance
Criteria for Information-Based Indicia and Security Architecture for
Closed IBI Postage Metering Systems (PCIBI-C) (Draft).
United States Postal Service. January 1999. (Note: I
was a major contributor to this document.)
-
Performance Criteria
for Information-Based Indicia and Security Architecture for Open IBI
Postage Evidence Systems (PCIBI-O) (Draft). United States
Postal Service. February 2000. (Note: I was a major
contributor to this document.)
-
Production,
Distribution, and Use of Postal Security Devices and Information Based
Indicia.” United States Postal Service. Federal
Register 65:191, October 2, 2000, pp. 58682-58698. (Note:
I was a major contributor to this document.)
Technical Reports (does not include items
listed above)
-
Usability of
Security: A Case Study. A. Whitten
and J. D. Tygar.
Carnegie Mellon University Computer Science technical report CMU-CS-98-155, December 1998.
(Note: this report partly overlaps item
6, but also includes substantial additional material.)
-
-
-
Median Separators in d
Dimensions. J. Sipelstein, S. Smith,
and J. D. Tygar . Carnegie Mellon University Computer Science technical report CMU-CS-88-206, December
1988.
-
When
are Best Fit and First Fit Optimal? C. McGeoch and J. D.
Tygar. Carnegie Mellon University Computer Science technical report CMU-CS-87-168,
October 1987.
-
Display Manager User’s Guide.
J. D. Tygar. Valid Logic
Systems engineering memorandum, VED-050682-1-JDT, May 1982.
-
Performance analysis of the DANTE Network. Bell
Telephone Laboratories technical memorandum, August 1981.
Patents (does not include items listed above)
-
Anonymous
certified delivery. L. J. Camp,
J. D. Tygar,
and M. Harkavy. US Patent 6,076,078, June 13, 2000.
-
Method
and apparatus for purchasing and delivering digital goods over a network.
M. Sirbu, J. D. Tygar, B. Cox, T. Wagner. US Patent 5,809,144, September 15,
1998.
Miscellaneous Technical (does not include items listed above)
-
Security
with Privacy.
Briefing from the Information Science and Technology Study
Group on Security and Privacy (chair: J. D. Tygar). December
2002.
-
Expert
Report of J. D. Tygar ...
A&M Records et al v. Napster.... J. D. Tygar. (For
Hearing) July 2000.
Miscellaneous Non-Technical (does not include items listed above)
-
“Welcome
Multiculturalism (Letter to the Editor). J. D. Tygar.
Taipei Times, November 12, 2004, p. 8.
|