<  Retour au portail Polytechnique Montréal

Documents dont l'auteur est "Barrera, David"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Date de publication | Sous-type de document | Aucun groupement
Nombre de documents: 29

Article de revue

Barrera, D., Chuat, L., Perrig, A., Reischuk, R. M., & Szalachowski, P. (2017). The SCION internet architecture. Communications of the ACM, 60(6), 56-65. Lien externe

Barrera, D., Wurster, G., & Oorschot, P. C. (2011). Back to the Future: Revisiting IPv6 Privacy Extensions. ;Login:, 36(1), 16-26. Lien externe

Barrera, D., & Oorschot, P. C. (2011). Secure Software Installation on Smartphones. IEEE Security & Privacy Magazine, 9(3), 42-48. Lien externe

Barrera, D., & Oorschot, P. C. (2010). Accommodating IPv6 Addresses in Security Visualization Tools. Information Visualization, 10(2), 107-116. Lien externe

Rapport technique

Lee, T., Szalachowski, P., Barrera, D., Perrig, A., Lee, H., & Watrin, D. (2015). Bootstrapping Real-world Deployment of Future Internet Architectures. (Rapport technique). Non disponible

Communication écrite

Thomasset, C., & Barrera, D. (décembre 2020). SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes [Communication écrite]. 2020 annual Computer Security Applications Conference (ACSAC 2020), Austin, Texas, USA. Lien externe

Barrera, D., Molloy, I., & Huang, H. (février 2018). Standardizing IoT Network Security Policy Enforcement [Communication écrite]. Workshop on Decentralized IoT Security and Standards (DISS 20180, San Diego, CA (6 pages). Lien externe

Chen, C., Asoni, D. E., Perrig, A., Barrera, D., Danezis, G., & Troncoso, C. (avril 2018). TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer [Communication écrite]. 3rd IEEE European Symposium on Security and Privacy (EuroS&P 2018), London, UK. Lien externe

Rothenberger, B., Asoni, D. E., Barrera, D., & Perrig, A. (avril 2017). Internet Kill Switches Demystified [Communication écrite]. 10th European Workshop on Systems Security (EuroSec 2017), Belgrade, Serbia (6 pages). Lien externe

Chen, C., Barrera, D., & Perrig, A. (novembre 2016). Modeling Data-Plane Power Consumption of Future Internet Architectures [Communication écrite]. 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016), Pittsburgh, PA. Lien externe

Stobert, E., & Barrera, D. (juin 2016). Picking a (Smart)Lock: Locking Relationships on Mobile Devices [Communication écrite]. Symposium on Usable Privacy and Security (SOUPS 2016), Denver, Colorado (2 pages). Lien externe

Lee, T., Pappas, C., Barrera, D., Szalachowski, P., & Perrig, A. (décembre 2016). Source Accountability with Domain-brokered Privacy [Communication écrite]. 12th International Conference on emerging Networking EXperiments and Technologies (ACM CoNEXT 2016), Irvine, California (17 pages). Lien externe

Eskandari, S., Barrera, D., Stobert, E., & Clark, J. (février 2015). A First Look at the Usability of Bitcoin Key Management [Communication écrite]. Workshop on Usable Security (USEC 2015), San Diego, CA (12 pages). Lien externe

Chen, C., Asoni, D. E., Barrera, D., Danezis, G., & Perrig, A. (octobre 2015). HORNET: High-speed Onion Routing at the Network Layer [Communication écrite]. 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS 2015), Denver, Colorado. Lien externe

Asoni, D. E., Chen, C., Barrera, D., & Perrig, A. (octobre 2015). On Building Onion Routing into Future Internet Architectures [Communication écrite]. International Workshop on Open Problems in Network Security (iNetSec 2015), Zurich, Switzerland. Lien externe

Abdou, A.R., Barrera, D., & Oorschot, P. C. (décembre 2015). What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks [Communication écrite]. International Conference on Passwords (PASSWORDS 2015), Cambridge, UK. Lien externe

Barrera, D., McCarney, D., Clark, J., & Oorschot, P. C. (juillet 2014). Baton: certificate agility for android's decentralized signing infrastructure [Communication écrite]. ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec 2014), Oxford, United Kingdom (12 pages). Lien externe

Skillen, A., Barrera, D., & Oorschot, P. C. (novembre 2013). Deadbolt: locking down android disk encryption [Communication écrite]. ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, Berlin, Germany. Lien externe

Barrera, D., Enck, W., & Oorschot, P. C. (mai 2012). Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems [Communication écrite]. Mobile Security Technologies Workshop (IEEE MoST 2012), San Francisco, Calif. (10 pages). Lien externe

McCarney, D., Barrera, D., Clark, J., Chiasson, S., & Oorschot, P. C. (décembre 2012). Tapas: design, implementation, and usability evaluation of a password manager [Communication écrite]. 28th Annual Computer Security Applications Conference (ACSAC 2012), Orlando, Florida. Lien externe

Jarabek, C., Barrera, D., & Aycock, J. (décembre 2012). ThinAV: truly lightweight mobile cloud-based anti-malware [Communication écrite]. 28th Annual Computer Security Applications Conference (ASAC 2012), Orlando, Florida. Lien externe

Barrera, D., Clark, J., McCarney, D., & Oorschot, P. C. (octobre 2012). Understanding and improving app installation security mechanisms through empirical analysis of android [Communication écrite]. 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Raleigh, North Carolina. Lien externe

Mannan, M., Barrera, D., Brown, C. D., Lie, D., & Oorschot, P. C. (février 2011). Mercury: Recovering Forgotten Passwords Using Personal Devices [Communication écrite]. 15th International Conference on Financial Cryptography and Data Security (FC 2011), Gros Islet, St. Lucia. Lien externe

Barrera, D., Kayacic, H. G., Oorschot, P. C. , & Somayaji, A. (octobre 2010). A methodology for empirical analysis of permission-based security models and its application to android [Communication écrite]. 17th ACM Conference on Computer and Communications Security (CCS 2010), Chicago, Illinois. Lien externe

Brown, C., Barrera, D., & Deugo, D. (juillet 2009). FiGD: An Open Source Intellectual Property Violation Detector [Communication écrite]. 21st International Conference on Software Engineering & Knowledge Engineering (SEKE 2009), Boston, Massachusetts. Non disponible

Barrera, D., & Oorschot, P. C. (octobre 2009). Security visualization tools and IPv6 addresses [Communication écrite]. 6th International Workshop on Visualization for Cyber Security (VizSec 2009), Atlantic City, NJ. Lien externe

Alsaleh, M., Barrera, D., & Oorschot, P. C. (décembre 2008). Improving Security Visualization with Exposure Map Filtering [Communication écrite]. Annual Computer Security Applications Conference (ACSAC 2008), Anaheim, CA. Lien externe

Mémoire ou thèse hors Polytechnique

Barrera, D. (2014). Securing Decentralized Software Installation and Updates [Thèse de doctorat, Carleton University]. Lien externe

Barrera, D. (2009). Towards classifying and selecting appropriate security visualization techniques [Mémoire de maîtrise, Carleton University]. Lien externe

Liste produite: Sun Nov 24 03:45:03 2024 EST.