TinySec: a link layer security architecture for wireless sensor networks C Karlof, N Sastry, D Wagner Proceedings of the 2nd international conference on Embedded networked sensor …, 2004 | 2371 | 2004 |
Secure verification of location claims N Sastry, U Shankar, D Wagner Proceedings of the 2nd ACM workshop on Wireless security, 1-10, 2003 | 927 | 2003 |
Recovery-oriented computing (ROC): Motivation, definition, techniques, and case studies D Patterson, A Brown, P Broadwell, G Candea, M Chen, J Cutler, ... Technical Report UCB//CSD-02-1175, UC Berkeley Computer Science, 2002 | 659 | 2002 |
Security considerations for IEEE 802.15. 4 networks N Sastry, D Wagner Proceedings of the 3rd ACM workshop on Wireless security, 32-42, 2004 | 507 | 2004 |
Cryptographic Voting Protocols: A Systems Perspective. C Karlof, N Sastry, DA Wagner USENIX Security Symposium 12, 39, 2005 | 204 | 2005 |
Design and implementation of a sensor network system for vehicle tracking and autonomous interception. C Sharp, S Schaffert, A Woo, N Sastry, C Karlof, S Sastry, DE Culler EWSN, 93-107, 2005 | 170 | 2005 |
Distillation codes and applications to DoS resistant multicast authentication C Karlof, N Sastry, Y Li, A Perrig, JD Tygar Proceedings of the ISOC Network and Distributed System Security Symposium, 37-56, 2004 | 130 | 2004 |
Scrash: A system for generating secure crash information P Broadwell, M Harren, N Sastry 12th USENIX Security Symposium (USENIX Security 03), 2003 | 129 | 2003 |
Verifiable functional purity in Java M Finifter, A Mettler, N Sastry, D Wagner Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 81 | 2008 |
FIG: A prototype tool for online verification of recovery mechanisms P Broadwell, N Sastry, J Traupman Workshop on Self-Healing, Adaptive and Self-Managed Systems, 2002 | 80 | 2002 |
TinySec: Link layer encryption for tiny devices C Karlof, N Sastry, D Wagner ACM SenSys, 3-5, 2004 | 76 | 2004 |
Tamper-evident, history-independent, subliminal-free data structures on prom storage-or-how to store ballots on a voting machine D Molnar, T Kohno, N Sastry, D Wagner 2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-370, 2006 | 63 | 2006 |
Fixing Races for Fun and Profit: How to Abuse atime. N Borisov, R Johnson, N Sastry, D Wagner USENIX Security Symposium, 2005 | 57 | 2005 |
Recovery oriented computing (roc): Motivation, definition, techniques D Patterson, A Brown, P Broadwell, G Candea, M Chen, J Cutler, ... University of California at Berkeley, 2002 | 57 | 2002 |
Security analysis of the Diebold AccuBasic interpreter D Wagner, D Jefferson, M Bishop, C Karlof, N Sastry | 49 | 2006 |
Designing Voting Machines for Verification. N Sastry, T Kohno, D Wagner USENIX Security Symposium, 2006 | 46 | 2006 |
Source code review of the Sequoia voting system M Blaze, A Cordero, S Engle, C Karlof, N Sastry, M Sherr, T Stegers, ... State of California’s Top to Bottom Review 2, 2007 | 37 | 2007 |
Verifying security properties in electronic voting machines NK Sastry University of California, Berkeley, 2007 | 21 | 2007 |
TinySec: User Manual C Karlof, N Sastry, D Wagner University of California, Berkeley, 2004 | 13 | 2004 |
Security for sensor networks: Cryptography and beyond D Wagner, C Karlof, D Molnar, N Sastry, U Shankar URL: http://www. cs. berkeley. edu/daw/talks/SANS03. ppt, 2003 | 7 | 2003 |