J
J. D. Tygar
Researcher at University of California, Berkeley
Publications - 128
Citations - 21815
J. D. Tygar is an academic researcher from University of California, Berkeley. The author has contributed to research in topics: Authentication & Atomicity. The author has an hindex of 56, co-authored 128 publications receiving 20777 citations. Previous affiliations of J. D. Tygar include IBM & Harvard University.
Papers
More filters
Proceedings ArticleDOI
SPINS: security protocols for sensor networks
TL;DR: A suite of security building blocks optimized for resource-constrained environments and wireless communication, and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.
Journal ArticleDOI
SPINS: security protocols for sensor networks
TL;DR: A suite of security protocols optimized for sensor networks: SPINS, which includes SNEP and μTESLA and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.
Proceedings ArticleDOI
Why phishing works
TL;DR: This paper provides the first empirical evidence about which malicious strategies are successful at deceiving general users by analyzing a large set of captured phishing attacks and developing a set of hypotheses about why these strategies might work.
Proceedings Article
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
Alma Whitten,J. D. Tygar +1 more
TL;DR: It is concluded that PGP 5.0 is not usable enough to provide effective security for most computer users, despite its attractive graphical user interface, supporting the hypothesis that user interface design for effective security remains an open problem.
Proceedings ArticleDOI
Efficient authentication and signing of multicast streams over lossy channels
TL;DR: This work proposes two efficient schemes, TESLA and EMSS, for secure lossy multicast streams, and offers sender authentication, strong loss robustness, high scalability and minimal overhead at the cost of loose initial time synchronization and slightly delayed authentication.