Author: David Wagner


Publication period start: 2012
Number of co-authors: 22


Number of publications with favourite co-authors
Ariel Haney
Erika Chin
Adrienne Porter Felt

Productive Colleagues

Most productive colleagues in number of publications
Aviel D. Rubin
Serge Egelman
Barbara Simons


Jefferson, David, Rubin, Aviel D., Simons, Barbara, Wagner, David (2004): Analyzing internet voting security. In Communications of the ACM, 47 (10) pp. 59-64.

Perrig, Adrian, Stankovic, John A., Wagner, David (2004): Security in wireless sensor networks. In Communications of the ACM, 47 (6) pp. 53-57.

Cam-Winget, Nancy, Housley, Russell, Wagner, David, Walker, Jesse (2003): Security flaws in 802.11 data link protocols. In Communications of the ACM, 46 (5) pp. 35-39.

Goldberg, Ian, Wagner, David (1998): TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web. In First Monday, 3 (4) pp. .

Coney, Lillie, Hall, Joseph Lorenzo, Vora, Poorvi L., Wagner, David (2005): Towards a privacy measurement criterion for voting systems. In: Delcambre, Lois M. L., Giuliano, Genevieve (eds.) DG.O 2005 - Proceedings of the 2005 National Conference on Digital Government Research May 15-18, 2005, Atlanta, Georgia, USA. pp. 287-288.

Karlof, Chris, Tygar, J. D., Wagner, David (2009): Conditioned-safe ceremonies and a user study of an application to web authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 38.

Krishnamurthy, Akshay, Mettler, Adrian, Wagner, David (2010): Fine-grained privilege separation for web applications. In: Proceedings of the 2010 International Conference on the World Wide Web , 2010, . pp. 551-560.

Chin, Erika, Felt, Adrienne Porter, Sekar, Vyas, Wagner, David (2012): Measuring user confidence in smartphone security and privacy. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 1.

Felt, Adrienne Porter, Ha, Elizabeth, Egelman, Serge, Haney, Ariel, Chin, Erika, Wagner, David (2012): Android permissions: user attention, comprehension, and behavior. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 3.