A position paper on data sovereignty: The importance of geolocating data in the cloud ZNJ Peterson, M Gondree, R Beverly 3rd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 11), 2011 | 160 | 2011 |
Geolocation of data in the cloud M Gondree, ZNJ Peterson Proceedings of the third ACM conference on Data and application security and …, 2013 | 115 | 2013 |
Security through play M Gondree, ZNJ Peterson, T Denning IEEE Security & Privacy 11 (3), 64-67, 2013 | 72 | 2013 |
The outcomes of cybersecurity competitions and implications for underrepresented populations P Pusey, M Gondree, Z Peterson IEEE Security & Privacy 14 (6), 90-95, 2016 | 57 | 2016 |
Valuing Security by Getting {[d0x3d!]}: Experiences with a Network Security Board Game M Gondree, ZNJ Peterson 6th Workshop on Cyber Security Experimentation and Test (CSET 13), 2013 | 50 | 2013 |
This is not a game: Early observations on using alternate reality games for teaching security concepts to {First-Year} undergraduates T Flushman, M Gondree, ZNJ Peterson 8th Workshop on Cyber Security Experimentation and Test (CSET 15), 2015 | 47 | 2015 |
DEFY: A Deniable, Encrypted File System for Log-Structured Storage. T Peters, MA Gondree, ZNJ Peterson NDSS, 2015 | 46 | 2015 |
Fixing federal e-voting standards E Barr, M Bishop, M Gondree Communications of the ACM 50 (3), 19-24, 2007 | 46 | 2007 |
A cloud-oriented cross-domain security architecture TD Nguyen, MA Gondree, DJ Shifflett, J Khosalim, TE Levin, CE Irvine MILITARY COMMUNICATIONS CONFERENCE, 2010-MILCOM 2010, 441-447, 2010 | 32 | 2010 |
Improved efficiency for private stable matching M Franklin, M Gondree, P Mohassel Topics in Cryptology–CT-RSA 2007: The Cryptographers’ Track at the RSA …, 2006 | 27 | 2006 |
DoS exploitation of allen-bradley's legacy protocol through fuzz testing F Tacliad, TD Nguyen, M Gondree Proceedings of the 3rd Annual Industrial Control System Security Workshop, 24-31, 2017 | 18 | 2017 |
Multi-party indirect indexing and applications M Franklin, M Gondree, P Mohassel Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007 | 18 | 2007 |
Talking about talking about cybersecurity games M Gondree, ZNJ Peterson, P Pusey login Usenix Mag. 41 (1), 2016 | 16 | 2016 |
MYSEA: the Monterey security architecture CE Irvine, TD Nguyen, DJ Shifflett, TE Levin, J Khosalim, C Prince, ... Proceedings of the 2009 ACM workshop on Scalable trusted computing, 39-48, 2009 | 16 | 2009 |
Communication-efficient private protocols for longest common subsequence M Franklin, M Gondree, P Mohassel Cryptographers’ Track at the RSA Conference, 265-278, 2009 | 16 | 2009 |
Asset criticality in mission reconfigurable cyber systems and its contribution to key cyber terrain P Price, N Leyba, M Gondree, Z Staples, T Parker | 13 | 2017 |
Longest common subsequence as private search M Gondree, P Mohassel Proceedings of the 8th ACM workshop on Privacy in the electronic society, 81-90, 2009 | 13 | 2009 |
A critique of the 2002 FEC VSPT e-voting standards M Gondree, P Wheeler, D DeFigueiredo Department of Computer Science University of California at Davis, Tech. Rep, 2005 | 11 | 2005 |
Towards a cross-domain MapReduce framework TD Nguyen, MA Gondree, J Khosalim, CE Irvine MILCOM 2013-2013 IEEE Military Communications Conference, 1436-1441, 2013 | 9 | 2013 |
SVMs for Improved Branch Prediction BJ Culpepper, M Gondree University of California, UCDavis, USA, ECS201A Technical Report, 2005 | 6 | 2005 |