B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, The Twofish Encryption Algorithm: A 128-Bit Block Cipher, New York: J. Wiley, 1999.
D. L. Oppenheimer, D. Wagner, and M. D. Crabb, System Security: A Management Perspective, Short Topics in System Administration, Vol. 3, Berkeley, CA: USENIX Association, 1997.
Book chapters or sections
N. T. Courtois, G. V. Bard, and D. Wagner, "Algebraic and slide attacks on KeeLoq," in Fast Software Encryption: Proc. 15th Intl. Workshop (FSE 2008). Revised Selected Papers, K. Nyberg, Ed., Lecture Notes in Computer Science, Vol. 5086, Berlin, Germany: Springer-Verlag, 2008, pp. 97-115.
N. Hopper, D. Molnar, and D. Wagner, "From weak to strong watermarking," in Theory of Cryptography: Proc. 4th Conf. (TCC 2007), S. P. Vadhan, Ed., Lecture Notes in Computer Science, Vol. 4392, Berlin, Germany: Springer-Verlag, 2007, pp. 362-382.
M. Johnson, D. Wagner, and K. Ramchandran, "On compressing encrypted data without the encryption key," in Theory of Cryptography: Proc. 1st Theory of Cryptograpy Conf. (TSS 2004), M. Naor, Ed., Lecture Notes in Computer Science, Vol. 2951, Berlin, Germany: Springer-Verlag, 2004, pp. 491-504.
R. Johnson, D. Molnar, D. Song, and D. Wagner, "Homomorphic signature schemes," in Topics in Cryptography: The Cryptographer's Track at the RSA Conf. (CT-RSA 2002), B. Preneel, Ed., Lecture Notes in Computer Science, Vol. 2271, Berlin, Germany: Springer-Verlag, 2002, pp. 244-262.
Articles in journals or magazines
D. Tsafrir, D. Da Silva, and D. Wagner, "The murky issue of changing process identity: Revising "Setuid Demystified"," ;login: The USENIX Magazine, vol. 33, no. 3, pp. 55-66, June 2008.
M. Bishop and D. Wagner, "Risks of e-voting," Communications of the ACM: Inside Risks Column, vol. 50, no. 11, pp. 120-120, Nov. 2007.
G. Ho, A. S. M. Javed, V. Paxson, and D. Wagner, "Detecting Credential Spearphishing Attacks in Enterprise Settings," in Proceedings of the 26rd USENIX Security Symposium (USENIX Security’17), 2017, pp. 469--485.
G. Ho, A. Sharma, M. Javed, V. Paxson, and D. Wagner, "Detecting Credential Spearphishing Attacks in Enterprise Settings," in USENIX Security Symposium, 2017, pp. 469-485.
C. Thompson and D. Wagner, "Securing Recognizers for Rich Video Applications," in Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM, 2016, pp. 53--62.
J. Tan, K. Nguyen, M. Theodorides, H. Negron-Arroyo, C. Thompson, S. Egelman, and D. Wagner, "The Effect of Developer-Specified Explanations for Permission Requests on Smartphone User Behavior," in Proceedings of the ACM CHI Conference on Human Interaction in Computing Systems (CHI 2014), 2014.
C. Sturton, R. Sinha, T. Dang, S. Jain, M. McCoyd, W. Y. Tan, P. Maniatis, S. A. Seshia, and D. Wagner, "Symbolic Software Model Validation," in Proceedings of the 10th ACM/IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE), M. Roncken and J. Talpin, Eds., 2013.
A. Felt, M. Finifter, J. Weinberger, and D. Wagner, "Diesel: Applying Privilege Separation to Database Access," in Proc. of ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2011, 2011.
A. Felt, M. Finifter, J. Weinberger, and D. Wagner, "Diesel: Applying Privilege Separation to Database Access," in Proc. of ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2011, 2011.
A. P. Felt, M. Finifter, J. Weinberger, and D. Wagner, "Diesel: Applying Privilege Separation to Database Access," in ACM Symposium on Information, Computer and Communications Security, 2011.
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, "Android permissions demystified," in Proceedings of the 18th ACM conference on Computer and Communications Security, 2011, pp. 627-638.
M. Finifter, A. Mettler, N. Sastry, and D. Wagner, "Verifiable Functional Purity in Java," in 15th ACM Conference on Computer and Communications Security (CCS 2008), 2008.
M. Finifter, A. Mettler, V. Sastry, and D. Wagner, "Verifiable functional purity in Java," in Proc. 15th ACM Conf. on Computer and Communications Security (CCS 2008), P. Syverson, S. Jha, and X. Zhang, Eds., New York, NY: The Association for Computing Machinery, Inc., 2008, pp. 161-174.
A. Cordero and D. Wagner, "Replayable voting machine audit logs," in Proc. 2008 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '08), Berkeley, CA: USENIX Association, 2008, pp. 14 pg.
C. Karlof, U. Shankar, D. Tygar, and D. Wagner, "Dynamic pharming attacks and locked same-origin policies for web browsers," in Proc. 14th ACM Conf. on Computer and Communications Security (CCS 2007), S. De Capitani di Vimerca, P. Syverson, and D. Evans, Eds., New York, NY: The Association for Computing Machinery, Inc., 2007, pp. 58-71.
A. Juels, D. Molnar, and D. Wagner, "Security and privacy issues in e-passports," in Proc. 1st Intl. Conf. on Security and Privacy for Emerging Areas in Communications Networks, Los Alamitos, CA: IEEE Computer Society, 2005, pp. 74-85.
S. Crosby, I. Goldberg, R. Johnson, D. Song, and D. Wagner, "A cryptanalysis of the High-Bandwidth Digital Content Protection system," in Security and Privacy in Digital Right Management: Proc. 2001 Workshop on Security and Privacy in Digital Rights Management. Revised Papers, T. Sander, Ed., Lecture Notes in Computer Science, Vol. 2320, Berlin, Germany: Springer-Verlag, 2002, pp. 159-182.
H. Chen, D. Wagner, and D. Dean, "Setuid demystified," in Proc. 11th USENIX Security Symp., Berkeley, CA: USENIX Association, 2002, pp. 171-190.
D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. 2000 IEEE Symp. on Security and Privacy (SP '00), Los Alamitos, CA: IEEE Computer Society, 2000, pp. 44-55.
A. M. Mettler and D. Wagner, "The Joe-E Language Specification (draft)," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2006-26, March 2006.
J. D. Waddle and D. A. Wagner, "Fault Attacks on Dual-Rail Encoded Systems," EECS Department, University of California, Berkeley, Tech. Rep. UCB/CSD-04-1347, Aug. 2004.
N. Sastry, U. Shankar, and D. Wagner, "Secure Verification of Location Claims," EECS Department, University of California, Berkeley, Tech. Rep. UCB/CSD-03-1245, 2003.
C. Karlof and D. Wagner, "Hidden Markov Model Cryptanalysis," EECS Department, University of California, Berkeley, Tech. Rep. UCB/CSD-03-1244, 2003.
L. Lee, D. Fifield, N. Malkin, G. Iyer, S. Egelman, and D. Wagner, "Tor's Usability for Censorship Circumvention," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2016-58, May 2016.