J. Doug Tygar
#167,412
Most Influential Person Now
J. Doug Tygar's AcademicInfluence.com Rankings
J. Doug Tygarcomputer-science Degrees
Computer Science
#10182
World Rank
#10678
Historical Rank
Internet Security
#5
World Rank
#5
Historical Rank
Operating Systems
#18
World Rank
#19
Historical Rank
Database
#7131
World Rank
#7379
Historical Rank

Download Badge
Computer Science
J. Doug Tygar's Degrees
- PhD Computer Science Carnegie Mellon University
- Bachelors Mathematics University of California, Berkeley
Similar Degrees You Can Earn
Why Is J. Doug Tygar Influential?
(Suggest an Edit or Addition)J. Doug Tygar's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Why phishing works (2006) (1427)
- SPINS: Security Protocols for Sensor Networks (2001) (1359)
- Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 (1999) (1332)
- Adversarial machine learning (2011) (1192)
- Efficient authentication and signing of multicast streams over lossy channels (2000) (1118)
- The TESLA Broadcast Authentication Protocol (2002) (1013)
- Can machine learning be secure? (2006) (832)
- Efficient and Secure Source Authentication for Multicast (2001) (774)
- The security of machine learning (2010) (766)
- The battle against phishing: Dynamic Security Skins (2005) (553)
- ELK, a new protocol for efficient large-group key distribution (2001) (414)
- ANTIDOTE: understanding and defending against poisoning of anomaly detectors (2009) (365)
- Keyboard acoustic emanations revisited (2005) (320)
- Exploiting Machine Learning to Subvert Your Spam Filter (2008) (320)
- CITRIC: A low-bandwidth wireless camera network platform (2008) (244)
- NetBill: An Internet commerce system optimized for network delivered services (1995) (230)
- Image Recognition CAPTCHAs (2004) (193)
- Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction (2005) (181)
- Dyad : a system for using physically secure coprocessors (1991) (169)
- Electronic Auctions with Private Bids (1998) (166)
- Characterizing Botnets from Email Spam Records (2008) (165)
- Evasion and Hardening of Tree Ensemble Classifiers (2015) (163)
- Dynamic pharming attacks and locked same-origin policies for web browsers (2007) (151)
- Atomicity in electronic commerce (1996) (139)
- Secure broadcast communication in wired and wireless networks (2002) (138)
- A model for secure protocols and their compositions (1994) (126)
- Query Strategies for Evading Convex-Inducing Classifiers (2010) (124)
- I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis (2014) (116)
- Distillation Codes and Applications to DoS Resistant Multicast Authentication (2004) (109)
- Misleading Learners: Co-opting Your Spam Filter (2009) (108)
- How to Make Replicated Data Secure (1987) (100)
- Model checking electronic commerce protocols (1996) (95)
- Cyber defense technology networking and evaluation (2004) (91)
- Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels (2015) (91)
- Side Effects Are Not Sufficient to Authenticate Software (2004) (91)
- TESLA Broadcast Authentication (2003) (87)
- Smart cards in hostile environments (1996) (86)
- Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks (2005) (80)
- Secure encrypted-data aggregation for wireless sensor networks (2010) (78)
- Adversarial Active Learning (2014) (72)
- Expander graphs for digital stream authentication and robust overlay networks (2002) (72)
- Approaches to adversarial drift (2013) (68)
- Conditioned-safe ceremonies and a user study of an application to web authentication (2009) (67)
- Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags (2007) (65)
- Reviewer Integration and Performance Measurement for Malware Detection (2015) (62)
- Anonymous Atomic Transactions (1996) (60)
- Completely asynchronous optimistic recovery with minimal rollbacks (1995) (60)
- Secure group key management using uni-directional proxy re-encryption schemes (2011) (59)
- Miró: Visual Specification of Security (1990) (58)
- Stealthy poisoning attacks on PCA-based anomaly detectors (2009) (58)
- Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce (1998) (58)
- Robust detection of comment spam using entropy rate (2012) (57)
- Atomicity in electronic commerce (1998) (55)
- Keyboard acoustic emanations revisited (2005) (54)
- WWW electronic commerce and java trojan horses (1996) (54)
- Token and Notational Money in Electronic Commerce (1995) (54)
- Near-Optimal Evasion of Convex-Inducing Classifiers (2010) (53)
- Secure Broadcast Communication (2003) (51)
- Computability and complexity of ray tracing (1994) (47)
- Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371) (2012) (47)
- Privacy and Security in the Location-enhanced World Wide Web (2003) (45)
- Optimal ROC Curve for a Combination of Classifiers (2007) (44)
- Organisational culture, procedural countermeasures, and employee security behaviour: A qualitative study (2017) (41)
- TESLA: Multicast Source Authentication Transform (2000) (40)
- Open problems in the security of learning (2008) (39)
- Classifier Evasion: Models and Open Problems (2010) (39)
- Large-Margin Convex Polytope Machine (2014) (38)
- The computability and complexity of optical beam tracing (1990) (32)
- A low-bandwidth camera sensor platform with applications in smart camera networks (2013) (32)
- SAM: a flexible and secure auction architecture using trusted hardware (2001) (30)
- Security and Privacy for Partial Order Time (1994) (29)
- CAPTCHA Using Strangeness in Machine Translation (2010) (25)
- Computer Security in the 21st Century (2010) (25)
- Building blocks for atomicity in electronic commerce (1996) (23)
- Collaborative Filtering CAPTCHAs (2005) (22)
- An Integrated Toolkit for Operating System Security (1986) (16)
- Signed Vector Timestamps: A Secure Protocol for Partial Order Time (1993) (16)
- Specifying and Checking UNIX Security Constraints (1994) (16)
- Efficient Netlist Comparison Using Hierarchy and Randomization (1985) (14)
- Evading Anomaly Detection through Variance Injection Attacks on PCA (2008) (13)
- SWOON: A Testbed for Secure Wireless Overlay Networks (2008) (12)
- Efficient Parallel Pseudo-Random Number Generation (1985) (12)
- OSNP: Secure wireless authentication protocol using one-time key (2009) (12)
- Cryptographic Postage Indicia (1996) (12)
- Adversarial Machine Learning by Anthony D. Joseph (2019) (12)
- Cryptography: It''s Not Just For Electronic Mail Anymore (1993) (11)
- Efficient Parallel Pseudorandom Number Generation (1988) (11)
- Constraining Pictures with Pictures (1989) (10)
- Optimal Sampling Strategies for Quicksort (1995) (10)
- Strongbox: A System for Self-Securing Programs (2004) (9)
- Systematic analysis and evaluation of web privacy policies and implementations (2012) (9)
- Remote Operating System Classification over IPv6 (2015) (9)
- Evaluating the security of machine learning algorithms (2008) (8)
- Investigation of Employee Security Behaviour: A Grounded Theory Approach (2015) (8)
- Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values (2014) (8)
- FORMAL SEMANTICS FOR VISUAL SPECIFICATION OF SECURITY (1990) (8)
- On Modeling the Costs of Censorship (2014) (7)
- A User Study Design for Comparing the Security of Registration Protocols (2008) (7)
- Privacy in Sensor Webs and Distributed Information Systems (2002) (7)
- A power-preserving broadcast protocol for wireless sensor networks (2009) (7)
- When are best fit and first fit optimal (1987) (7)
- Open problems in electronic commerce (1999) (6)
- Miro semantics for security (1988) (6)
- Flexible and Scalable Credential Structures: NetBill Implementation and Experience (1999) (6)
- The Effect of Organisational Culture on Employee Security Behaviour: A Qualitative Study (2016) (6)
- Geometric characterization of series-parallel variable resistor networks (1993) (5)
- Providing Auditing While Protecting Privacy (1994) (5)
- Notes from the second USENIX workshop on electronic commerce (1998) (5)
- Back to the Future: Malware Detection with Temporally Consistent Labels (2015) (4)
- 2 Machine Learning Methods for Computer Security 1 Executive Summary (2013) (4)
- Designing Cryptographic Postage Indicia (1996) (4)
- Timed Models for Protocol Security (1992) (4)
- Strongbox : a self-securing protection system for distributed programs (1988) (4)
- Implementing Distributed Capabilities without a Trusted Kernel (1991) (3)
- ITOSS: An Integrated Toolkit For Operating System Security (1989) (3)
- Sensor Network Security (2003) (3)
- A Power-Preserving Broadcast Protocol for WSNs with DoS Resistance (2008) (3)
- 1 Strongbox : A System for Self-Securing Programs (1991) (3)
- Statistical Classification and Computer Security (2007) (3)
- Asynchronous Optimistic Rollback Recovery Using Secure Distributed Time (1994) (3)
- Learners : Co-opting Your Spam Filter (2009) (2)
- Authentication for humans: the design and evaluation of usable security systems (2005) (2)
- Injecting Heterogeneity Through Protocol Randomization (2007) (2)
- Technological dimensions of privacy in Asia (2003) (2)
- Automatically distinguishing humans from machines in an online environment (2004) (1)
- Security inference from noisy data (2008) (1)
- Micro tools (1989) (1)
- Smart Cards in Hostile EnvironmentsHoward Gobio (1996) (1)
- Chapter 3 PRIVATE MATCHING (2004) (1)
- Limits of Microtransaction Systems (1997) (0)
- 2 Misleading Learners: Co-opting Your Spam Filter (2009) (0)
- Panel: Authentication in Constrained Environments (2005) (0)
- Median separators in d dimensions (1988) (0)
- Privacy and Client-based Discovery of Location (2003) (0)
- Machine Learning Methods for Computer Security (dagstuhl Perspectives Workshop 12371) Machine Learning Methods for Computer Security Machine Learning Methods for Computer Security 1 Executive Summary Table of Contents (2014) (0)
- Background and Notation (2019) (0)
- When Computer Security Crashes into Multimedia (2005) (0)
- Number 13 (2017) (0)
- Why Phishing Works - eScholarship (2006) (0)
- Estimation based Efficient and Resilient Hierarchical In-Network Data Aggregation Scheme for Wireless Sensor Network (2016) (0)
- Graphs for Digital Stream Authenti ation and RobustOverlay (2002) (0)
- A Framework for Secure Learning (2019) (0)
- "How are we going to pay for this? Fee-for-service in distributed systems-research and policy issues" (1995) (0)
- ELK Key Distribution (2003) (0)
- Comparative Analysis of Selective Forwarding Attacks over Wireless Sensor Networks (2016) (0)
- CS 161 Computer Security Fall 2005 Joseph / Tygar / Vazirani / Wagner Notes 10 1 One-way function (0)
- EMSS, MESS, & HTSS: Signatures for Broadcast (2003) (0)
- BiBa Broadcast Authentication (2003) (0)
- A Proposal of CAPTCHA using Strangeness in Machine Translation (2009) (0)
- Security Analytics in the Context of Adversarial Machine Learning (2016) (0)
- 128 12371 – Machine Learning Methods for Computer Security 6 . 2 Secure Learning : Theory and Methods (2013) (0)
- Adversarial Machine Learning Challenges (2019) (0)
- Electronic Commerce and Java Trojan HorsesJ (1996) (0)
- Model Checking Electronic Commerce Protocols ( Extended Abstract ) (1996) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With J. Doug Tygar?
J. Doug Tygar is affiliated with the following schools: