NRC Com. on Information Systems Trustworthiness, Trust in Cyberspace, F. B. Schneider, Ed., Washington, D.C.: National Academy Press, 1999.
D. Tygar and NRC Committee, Trust in Cyberspace, F. B. Schneider, Ed., Washington, D.C.: National Academy Press, 1999.
Book chapters or sections
B. I. P. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S. Lau, N. Taft, and D. Tygar, "Evading anomaly detection through variance injection attacks on PCA (Winner, RAID '08 Best Poster Award)," in Recent Advances in Intrusion Detection: Proc. 11th Intl. Symp. (RAID 2008), R. Lippmann, E. Kirda, and A. Trachtenberg, Eds., Lecture Notes in Computer Science, Vol. 5230, Berlin, Germany: Springer-Verlag, 2008, pp. 394-394.
C. C. Lin, Y. C. Lai, D. Tygar, C. K. Yang, and C. L. Chiang, "Coexistence proof using chain of timestamps for multiple RFID tags," in Advances in Web and Network Technologies, and Information Management, K. C. C. Chang, W. Wang, L. Chen, C. A. Ellis, C. H. Hsu, A. C. Tsoi, and H. Wang, Eds., Lecture Notes in Computer Science, Vol. 4537, Berlin, Germany: Springer-Verlag, 2007, pp. 634-643.
A. Whitten and D. Tygar, "Why Johnny can't encrypt: A usability evaluation of PGP 5.0," in Security and Usability: Designing Secure Systems That People Can Use, L. Cranor and S. Garfinkel, Eds., Sebastopol, CA: O'Reilly Media, Inc., 2005, pp. 679-702.
Y. Li, D. Tygar, and J. M. Hellerstein, "Private Matching," in Computer Security in the 21st Century, D. T. Lee, S. P. Shieh, and D. Tygar, Eds., New York, NY: Springer Science+Business Media, Inc., 2005, pp. 25-50.
R. Bajcsy, A. D. Joseph, V. Paxson, D. Tygar, S. S. Sastry, and other DETER/EMIST Members, "Cyber defense technology networking and evaluation," Communications of the ACM Special Issue: Emerging Technologies for Homeland Security, vol. 47, no. 3, pp. 58-61, March 2004.
S. Afroz, D. Fifield, M. C. Tschantz, V. Paxson, and J. Tygar, "Censorship Arms Race: Research vs. Practice," in Workshop on Hot Topics in Privacy Enhancing Technologies, 2015.
A. Kantchelian, J. Ma, L. Huang, S. Afroz, A. D. Joseph, and D. Tygar, "Robust detection of comment spam using entropy rate," in Proceedings of the 5th ACM workshop on Security and artificial intelligence, AISec'12, New York, NY, USA: ACM, 2012, pp. 59--70.
M. Barreno, P. Bartlett, F. J. Chi, A. D. Joseph, B. Nelson, B. I. P. Rubinstein, U. Saini, and D. Tygar, "Open problems in the security of learning (Position Paper)," in Proc. 1st ACM Workshop on AISec (AISec 2008), New York, NY: The Association for Computing Machinery, Inc., 2008, pp. 19-26.
P. Chen, P. Ahammad, C. boyer, S. I. Huang, L. Lin, E. Lobaton, M. meingast, S. Oh, S. Wang, P. Yan, A. Y. Yang, C. Yeo, L. C. Chang, D. Tygar, and S. S. Sastry, "CITRIC: A low-bandwidth wireless camera network platform," in Proc. 2nd ACM/IEEE Intl. Conf. on Distributed Smart Cameras (ICDSC 2008), Piscataway, NJ: IEEE Press, 2008, pp. 10 pg.
L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, I. Osipkov, G. Hulten, and D. Tygar, "Characterizing botnets from email spam records," in Proc. 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEFT 2008), Berkeley, CA: USENIX Association, 2008, pp. 9 pg..
B. Nelson, M. Barreno, F. J. Chi, A. D. Joseph, B. I. P. Rubinstein, U. Saini, C. Sutton, D. Tygar, and K. Xia, "Exploiting machine learning to subvert your spam filter," in Proc. 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEFT 2008), Berkeley, CA: USENIX Association, 2008, pp. 9 pg.
C. Karlof, U. Shankar, D. Tygar, and D. Wagner, "Dynamic pharming attacks and locked same-origin policies for web browsers," in Proc. 14th ACM Conf. on Computer and Communications Security (CCS 2007), S. De Capitani di Vimerca, P. Syverson, and D. Evans, Eds., New York, NY: The Association for Computing Machinery, Inc., 2007, pp. 58-71.
M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and D. Tygar, "Can Machine Learning Be Secure? (Invited Talk)," in Proc. 2006 ACM Symp. on Information, Computer and Communications Security, New York, NY: ACM Press, 2006, pp. 16-25.
A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and secure source authentication for multicast," in Proc. 8th Annual Symp. on Network and Distributed System Security (NDSS '01), Reston, VA: Internet Society, 2001, pp. 12 pg.
A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and secure source authentication for multicast," in Proc. 8th Annual Symp. on Network and Distributed System Security (NDSS 2001), Reston, VA: Internet Society, 2001, pp. 35-46.
M. Harkavy, D. Tygar, and H. Kikuchi, "Electronic auctions with private bids," in Proc. 3rd USENIX Workshop on Electronic Commerce, Berkeley, CA: USENIX Association, 1998, pp. 61-74.
D. Tygar, "Atomicity in electronic commerce," in Proc. 15th Annual ACM Symp. on Principles of Distributed Computing, New York, NY: ACM Press, 1996, pp. 8-26.
B. Cox, D. Tygar, and M. Sirbu, "NetBill security and transaction protocol," in Proc. 1st USENIX Workshop on Electronic Commerce, Berkeley, CA: USENIX Association, 1995, pp. 12 pp..
P. W. Chen, P. Ahammad, C. Boyer, S. Huang, L. Lin, E. J. Lobaton, M. L. Meingast, S. Oh, S. Wang, P. Yan, A. Yang, C. Yeo, L. Chang, D. Tygar, and S. S. Sastry, "CITRIC: A Low-Bandwidth Wireless Camera Network Platform," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2008-50, May 2008.
M. Barreno, B. A. Nelson, A. D. Joseph, and D. Tygar, "The Security of Machine Learning," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2008-43, April 2008.