scispace - formally typeset
J

J. D. Tygar

Researcher at University of California, Berkeley

Publications -  128
Citations -  21815

J. D. Tygar is an academic researcher from University of California, Berkeley. The author has contributed to research in topics: Authentication & Atomicity. The author has an hindex of 56, co-authored 128 publications receiving 20777 citations. Previous affiliations of J. D. Tygar include IBM & Harvard University.

Papers
More filters
Proceedings ArticleDOI

SPINS: security protocols for sensor networks

TL;DR: A suite of security building blocks optimized for resource-constrained environments and wireless communication, and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.
Journal ArticleDOI

SPINS: security protocols for sensor networks

TL;DR: A suite of security protocols optimized for sensor networks: SPINS, which includes SNEP and μTESLA and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.
Proceedings ArticleDOI

Why phishing works

TL;DR: This paper provides the first empirical evidence about which malicious strategies are successful at deceiving general users by analyzing a large set of captured phishing attacks and developing a set of hypotheses about why these strategies might work.
Proceedings Article

Why Johnny can't encrypt: a usability evaluation of PGP 5.0

TL;DR: It is concluded that PGP 5.0 is not usable enough to provide effective security for most computer users, despite its attractive graphical user interface, supporting the hypothesis that user interface design for effective security remains an open problem.
Proceedings ArticleDOI

Efficient authentication and signing of multicast streams over lossy channels

TL;DR: This work proposes two efficient schemes, TESLA and EMSS, for secure lossy multicast streams, and offers sender authentication, strong loss robustness, high scalability and minimal overhead at the cost of loose initial time synchronization and slightly delayed authentication.