default search action
Daniel Zappala
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c51]Warda Usman, Jackie Hu, McKynlee Wilson, Daniel Zappala:
Distrust of big tech and a desire for privacy: Understanding the motivations of people who have voluntarily adopted secure email. SOUPS 2023: 473-490 - 2022
- [c50]Tarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent E. Seamons:
Automatic Detection of Fake Key Attacks in Secure Messaging. CCS 2022: 3019-3032 - [c49]James Conners, Corey Devenport, Stephen Derbidge, Natalie Farnsworth, Kyler Gates, Stephen Lambert, Christopher McClain, Parker Nichols, Daniel Zappala:
Let's Authenticate: Automated Certificates for User Authentication. NDSS 2022 - [i10]Tarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent E. Seamons:
Automatic Detection of Fake Key Attacks in Secure Messaging. CoRR abs/2210.09940 (2022) - 2021
- [j11]Amir Herzberg, Hemi Leibowitz, Kent E. Seamons, Elham Vaziripour, Justin Wu, Daniel Zappala:
Secure Messaging Authentication Ceremonies Are Broken. IEEE Secur. Priv. 19(2): 29-37 (2021) - [c48]Jeremy Clark, Paul C. van Oorschot, Scott Ruoti, Kent E. Seamons, Daniel Zappala:
SoK: Securing Email - A Stakeholder-Based Analysis. Financial Cryptography (1) 2021: 360-390
2010 – 2019
- 2019
- [j10]Scott Ruoti, Jeff Andersen, Luke Dickinson, Scott Heidbrink, Tyler Monson, Mark O'Neill, Ken Reese, Brad Spendlove, Elham Vaziripour, Justin Wu, Daniel Zappala, Kent E. Seamons:
A Usability Study of Four Secure Email Tools Using Paired Participants. ACM Trans. Priv. Secur. 22(2): 13:1-13:33 (2019) - [c47]Elham Vaziripour, Devon Howard, Jake Tyler, Mark O'Neill, Justin Wu, Kent E. Seamons, Daniel Zappala:
I Don't Even Have to Bother Them!: Using Social Media to Automate the Authentication Ceremony in Secure Messaging. CHI 2019: 93 - [c46]Justin Wu, Cyrus Gattrell, Devon Howard, Jake Tyler, Elham Vaziripour, Daniel Zappala, Kent E. Seamons:
"Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in Signal. SOUPS @ USENIX Security Symposium 2019 - 2018
- [j9]Mark O'Neill, Kent E. Seamons, Daniel Zappala:
The Secure Socket API: TLS as an Operating System Service. login Usenix Mag. 43(4) (2018) - [c45]Elham Vaziripour, Justin Wu, Mark O'Neill, Daniel Metro, Josh Cockrell, Timothy Moffett, Jordan Whitehead, Nick Bonner, Kent E. Seamons, Daniel Zappala:
Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal. SOUPS @ USENIX Security Symposium 2018: 47-62 - [c44]Scott Ruoti, Jeff Andersen, Tyler Monson, Daniel Zappala, Kent E. Seamons:
A Comparative Usability Study of Key Management in Secure Email. SOUPS @ USENIX Security Symposium 2018: 375-394 - [c43]Justin Wu, Daniel Zappala:
When is a Tree Really a Truck? Exploring Mental Models of Encryption. SOUPS @ USENIX Security Symposium 2018: 395-409 - [c42]Mark O'Neill, Scott Heidbrink, Jordan Whitehead, Tanner Perdue, Luke Dickinson, Torstein Collett, Nick Bonner, Kent E. Seamons, Daniel Zappala:
The Secure Socket API: TLS as an Operating System Service. USENIX Security Symposium 2018: 799-816 - [i9]Jeremy Clark, Paul C. van Oorschot, Scott Ruoti, Kent E. Seamons, Daniel Zappala:
Securing Email. CoRR abs/1804.07706 (2018) - 2017
- [j8]Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala:
TLS Inspection: How Often and Who Cares? IEEE Internet Comput. 21(3): 22-29 (2017) - [c41]Scott Ruoti, Kent E. Seamons, Daniel Zappala:
Layering Security at Global Control Points to Secure Unmodified Software. SecDev 2017: 42-49 - [c40]Elham Vaziripour, Justin Wu, Mark O'Neill, Jordan Whitehead, Scott Heidbrink, Kent E. Seamons, Daniel Zappala:
Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications. SOUPS 2017: 29-47 - [c39]Scott Ruoti, Tyler Monson, Justin Wu, Daniel Zappala, Kent E. Seamons:
Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture. SOUPS 2017: 211-228 - [c38]Mark O'Neill, Scott Heidbrink, Scott Ruoti, Jordan Whitehead, Dan Bunker, Luke Dickinson, Travis Hendershot, Joshua Reynolds, Kent E. Seamons, Daniel Zappala:
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication. USENIX Security Symposium 2017: 609-624 - 2016
- [c37]David Grimsman, Vasu Chetty, Nathan Woodbury, Elham Vaziripour, Sandip Roy, Daniel Zappala, Sean Warnick:
A case study of a systematic attack design method for critical infrastructure cyber-physical systems. ACC 2016: 296-301 - [c36]Scott Ruoti, Jeff Andersen, Scott Heidbrink, Mark O'Neill, Elham Vaziripour, Justin Wu, Daniel Zappala, Kent E. Seamons:
"We're on the Same Page": A Usability Study of Secure Email Using Pairs of Novice Users. CHI 2016: 4298-4308 - [c35]Elham Vaziripour, Christophe G. Giraud-Carrier, Daniel Zappala:
Analyzing the Political Sentiment of Tweets in Farsi. ICWSM 2016: 699-702 - [c34]Mark O'Neill, Elham Vaziripour, Justin Wu, Daniel Zappala:
Condensing Steam: Distilling the Diversity of Gamer Behavior. Internet Measurement Conference 2016: 81-95 - [c33]Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala:
TLS Proxies: Friend or Foe? Internet Measurement Conference 2016: 551-557 - [c32]Alexander Afanasyev, J. Alex Halderman, Scott Ruoti, Kent E. Seamons, Yingdi Yu, Daniel Zappala, Lixia Zhang:
Content-based security for the web. NSPW 2016: 49-60 - [c31]Scott Ruoti, Mark O'Neill, Daniel Zappala, Kent E. Seamons:
User Attitudes Toward the Inspection of Encrypted Traffic. SOUPS 2016: 131-146 - [c30]Elham Vaziripour, Mark O'Neill, Justin Wu, Scott Heidbrink, Kent E. Seamons, Daniel Zappala:
Social Authentication for End-to-End Encryption. WAY@SOUPS 2016 - [c29]Scott Ruoti, Jeff Andersen, Travis Hendershot, Daniel Zappala, Kent E. Seamons:
Private Webmail 2.0: Simple and Easy-to-Use Secure Email. UIST 2016: 461-472 - [i8]Mark O'Neill, Scott Heidbrink, Jordan Whitehead, Scott Ruoti, Dan Bunker, Kent E. Seamons, Daniel Zappala:
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication. CoRR abs/1610.08570 (2016) - 2015
- [i7]Scott Ruoti, Mark O'Neill, Daniel Zappala, Kent E. Seamons:
At Least Tell Me: User Attitudes Toward the Inspection of Encrypted Traffic. CoRR abs/1510.04921 (2015) - [i6]Scott Ruoti, Jeff Andersen, Travis Hendershot, Daniel Zappala, Kent E. Seamons:
Helping Johnny Understand and Avoid Mistakes: A Comparison of Automatic and Manual Encryption in Email. CoRR abs/1510.08435 (2015) - [i5]Scott Ruoti, Jeff Andersen, Scott Heidbrink, Mark O'Neill, Elham Vaziripour, Justin Wu, Daniel Zappala, Kent E. Seamons:
Johnny and Jane: Analyzing Secure Email Using Two Novice Users. CoRR abs/1510.08554 (2015) - [i4]Scott Ruoti, Jeff Andersen, Daniel Zappala, Kent E. Seamons:
Why Johnny Still, Still Can't Encrypt: Evaluating the Usability of a Modern PGP Client. CoRR abs/1510.08555 (2015) - [i3]Scott Ruoti, Jeff Andersen, Tyler Monson, Daniel Zappala, Kent E. Seamons:
MessageGuard: A Browser-based Platform for Usable, Content-Based Encryption Research. CoRR abs/1510.08943 (2015) - 2014
- [c28]Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala:
POSTER: TLS Proxies: Friend or Foe? CCS 2014: 1487-1489 - [i2]Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala:
TLS Proxies: Friend or Foe? CoRR abs/1407.7146 (2014) - 2012
- [c27]Randy Buck, Rich Lee, Philip Lundrigan, Daniel Zappala:
WiFu: A composable toolkit for experimental wireless transport protocols. MASS 2012: 299-307 - [c26]Travis Andelin, Vasu Chetty, Devon Harbaugh, Sean Warnick, Daniel Zappala:
Quality selection for Dynamic Adaptive Streaming over HTTP with Scalable Video Coding. MMSys 2012: 149-154 - 2011
- [c25]David Ripplinger, Sean Warnick, Daniel Zappala:
First-principles modeling of wireless networks for rate control. CDC/ECC 2011: 3794-3799 - [c24]Xingang Zhang, Randy Buck, Daniel Zappala:
Experimental Performance Evaluation of ATP in a Wireless Mesh Network. MASS 2011: 122-131 - 2010
- [c23]Lei Wang, David Ripplinger, Anurag Rai, Sean Warnick, Daniel Zappala:
A convex optimization approach to decentralized rate control in wireless networks with partial interference. CDC 2010: 639-646
2000 – 2009
- 2009
- [c22]Brian Sanderson, Daniel Zappala:
Reducing Source Load in BitTorrent. ICCCN 2009: 1-6 - 2008
- [c21]Manoj Pandey, Daniel Zappala:
Hop-by-hop multicast transport for mobile ad hoc wireless networks. MASS 2008: 450-455 - [c20]Manoj Pandey, Daniel Zappala:
Scalable multicast routing for ad hoc networks. MASS 2008: 559-564 - [c19]Qiuyi Duan, Lei Wang, Charles D. Knutson, Daniel Zappala:
Autonomous and Intelligent Radio Switching for heterogeneous wireless networks. MASS 2008: 666-671 - [c18]Jared Jardine, Daniel Zappala:
A hybrid architecture for massively multiplayer online games. NETGAMES 2008: 60-65 - [c17]Daniel Scofield, Lei Wang, Daniel Zappala:
HxH: a hop-by-hop transport protocol for multi-hop wireless networks. WICON 2008: 16 - [c16]Qiuyi Duan, Lei Wang, Charles D. Knutson, Daniel Zappala:
Link quality prediction for wireless devices with multiple radios. WOWMOM 2008: 1-5 - 2007
- [c15]Manoj Pandey, Roger Pack, Lei Wang, Qiuyi Duan, Daniel Zappala:
To Repair or Not To Repair: Helping Ad-hoc Routing Protocols to Distinguish Mobility from Congestion. INFOCOM 2007: 2311-2315 - [c14]Manoj Pandey, Daniel P. Delorey, Qiuyi Duan, Lei Wang, Charles D. Knutson, Daniel Zappala, Ryan Woodings:
RIA: An RF Interference Avoidance Algorithm for Heterogeneous Wireless Networks. WCNC 2007: 4051-4056 - 2005
- [c13]Daniel Stutzbach, Daniel Zappala, Reza Rejaie:
The Scalability of Swarming Peer-to-Peer Content Delivery. NETWORKING 2005: 15-26 - [c12]Chris GauthierDickey, Virginia Mary Lo, Daniel Zappala:
Using n-trees for scalable event ordering in peer-to-peer games. NOSSDAV 2005: 87-92 - [c11]Manoj Pandey, Daniel Zappala:
A Scenario-Based Performance Evaluation of Multicast Routing Protocols for Ad Hoc Networks. WOWMOM 2005: 31-41 - 2004
- [j7]Daniel Zappala, Virginia Mary Lo, Chris GauthierDickey:
The multicast address allocation problem: theory and practice. Comput. Networks 45(1): 55-73 (2004) - [j6]Arthur M. Farley, Andrzej Proskurowski, Daniel Zappala, Kurt J. Windisch:
Spanners and message distribution in networks. Discret. Appl. Math. 137(2): 159-171 (2004) - [j5]Daniel Zappala:
Alternate path routing for multicast. IEEE/ACM Trans. Netw. 12(1): 30-43 (2004) - [c10]Virginia Mary Lo, Daniel Zappala, Dayi Zhou, Yuhong Liu, Shanyu Zhao:
Cluster Computing on the Fly: P2P Scheduling of Idle Cycles in the Internet. IPTPS 2004: 227-236 - [c9]Chris GauthierDickey, Daniel Zappala, Virginia Mary Lo:
A fully distributed architecture for massively multiplayer online games. NETGAMES 2004: 171 - [c8]Chris GauthierDickey, Daniel Zappala, Virginia Mary Lo, James Marr:
Low latency and cheat-proof event ordering for peer-to-peer games. NOSSDAV 2004: 134-139 - 2002
- [j4]Lixia Zhang, Stephen E. Deering, Deborah Estrin, Scott Shenker, Daniel Zappala:
RSVP: a new resource reservation protocol. IEEE Commun. Mag. 40(5): 116-127 (2002) - [j3]Daniel Zappala, Aaron Fabbri, Virginia Mary Lo:
An Evaluation of Shared Multicast Trees with Multiple Cores. Telecommun. Syst. 19(3-4): 461-479 (2002) - [c7]Virginia Mary Lo, Daniel Zappala, Chris GauthierDickey, Timothy Singer:
A theoretical framework for the multicast address allocation problem. GLOBECOM 2002: 2108-2112 - [c6]Daniel Zappala, Chris GauthierDickey, Virginia Mary Lo:
Modeling the multicast address allocation problem. GLOBECOM 2002: 2113-2117 - [c5]Daniel Zappala, Dayi Zhou:
Performance evaluation of path searching heuristics for multicast QoS routing. ICCCN 2002: 248-254 - 2001
- [c4]Daniel Zappala, Aaron Fabbri:
Using SSM proxies to provide efficient multiple-source multicast delivery. GLOBECOM 2001: 1590-1594 - [c3]Daniel Zappala, Aaron Fabbri:
An Evaluation of Shared Multicast Trees with Multiple Active Cores. ICN (1) 2001: 620-629 - 2000
- [c2]Daniel Zappala:
Alternate Path Routing for Multicast. INFOCOM 2000: 1576-1585
1990 – 1999
- 1999
- [c1]Marilynn Livingston, Virginia Mary Lo, Daniel Zappala, Kurt J. Windisch:
Cyclic Block Allocation: A New Scheme for Hierarchical Multicast Address Allocation. Networked Group Communication 1999: 216-234 - 1996
- [i1]Deborah Estrin, Tony Li, Yakov Rekhter, Kannan Varadhan, Daniel Zappala:
Source Demand Routing: Packet Format and Forwarding Specification (Version 1). RFC 1940: 1-27 (1996) - 1993
- [j2]Lixia Zhang, Stephen E. Deering, Deborah Estrin, Scott Shenker, Daniel Zappala:
RSVP: a new resource ReSerVation Protocol. IEEE Netw. 7(5): 8-18 (1993) - 1992
- [j1]Lee Breslau, Deborah Estrin, Daniel Zappala, Lixia Zhang:
Exploiting locality to provide adaptive routing of real-time flows in global internets (abstract). Comput. Commun. Rev. 22(3): 45-46 (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint