default search action
Adam Barth
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [j6]Adam Barth, Benjamin I. P. Rubinstein, Mukund Sundararajan, John C. Mitchell, Dawn Song, Peter L. Bartlett:
A Learning-Based Approach to Reactive Security. IEEE Trans. Dependable Secur. Comput. 9(4): 482-493 (2012) - [i5]Jeff Hodges, Collin Jackson, Adam Barth:
HTTP Strict Transport Security (HSTS). RFC 6797: 1-46 (2012) - 2011
- [c21]Eric Yawei Chen, Jason Bau, Charles Reis, Adam Barth, Collin Jackson:
App isolation: get the security of multiple browsers with just one. CCS 2011: 227-238 - [c20]Joel Weinberger, Adam Barth, Dawn Song:
Towards Client-side HTML Security Policies. HotSec 2011 - [i4]Adam Barth, Saung Li, Benjamin I. P. Rubinstein, Dawn Song:
How Open Should Open Source Be? CoRR abs/1109.0507 (2011) - [i3]Adam Barth:
HTTP State Management Mechanism. RFC 6265: 1-37 (2011) - [i2]Adam Barth:
The Web Origin Concept. RFC 6454: 1-20 (2011) - 2010
- [c19]Devdatta Akhawe, Adam Barth, Peifung E. Lam, John C. Mitchell, Dawn Song:
Towards a Formal Foundation of Web Security. CSF 2010: 290-304 - [c18]Adam Barth, Benjamin I. P. Rubinstein, Mukund Sundararajan, John C. Mitchell, Dawn Song, Peter L. Bartlett:
A Learning-Based Approach to Reactive Security. Financial Cryptography 2010: 192-206 - [c17]Adam Barth, Adrienne Porter Felt, Prateek Saxena, Aaron Boodman:
Protecting Browsers from Extension Vulnerabilities. NDSS 2010 - [c16]Matthew Finifter, Joel Weinberger, Adam Barth:
Preventing Capability Leaks in Secure JavaScript Subsets. NDSS 2010 - [c15]Daniel Bates, Adam Barth, Collin Jackson:
Regular expressions considered harmful in client-side XSS filters. WWW 2010: 91-100
2000 – 2009
- 2009
- [j5]Adam Barth, Collin Jackson, John C. Mitchell:
Securing frame communication in browsers. Commun. ACM 52(6): 83-91 (2009) - [j4]Charles Reis, Adam Barth, Carlos Pizano:
Browser security: lessons from Google Chrome. Commun. ACM 52(8): 45-49 (2009) - [j3]Charles Reis, Adam Barth, Carlos Pizano:
Browser Security: Lessons from Google Chrome. ACM Queue 7(5): 3 (2009) - [j2]Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh:
Protecting browsers from DNS rebinding attacks. ACM Trans. Web 3(1): 2:1-2:26 (2009) - [c14]Adam Barth, Juan Caballero, Dawn Song:
Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves. SP 2009: 360-371 - [c13]Adam Barth, Joel Weinberger, Dawn Song:
Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense. USENIX Security Symposium 2009: 187-198 - [c12]Ben Adida, Adam Barth, Collin Jackson:
Rootkits for JavaScript Environments. WOOT 2009: 1-7 - [i1]Adam Barth, Benjamin I. P. Rubinstein, Mukund Sundararajan, John C. Mitchell, Dawn Xiaodong Song, Peter L. Bartlett:
A Learning-Based Approach to Reactive Security. CoRR abs/0912.1155 (2009) - 2008
- [b1]Adam Barth:
Design and analysis of privacy policies. Stanford University, USA, 2008 - [c11]Adam Barth, Collin Jackson, John C. Mitchell:
Robust defenses for cross-site request forgery. CCS 2008: 75-88 - [c10]Adam Barth, Collin Jackson, John C. Mitchell:
Securing Frame Communication in Browsers. USENIX Security Symposium 2008: 17-30 - [c9]Collin Jackson, Adam Barth:
Forcehttps: protecting high-security web sites from network attacks. WWW 2008: 525-534 - 2007
- [c8]Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh:
Protecting browsers from dns rebinding attacks. CCS 2007: 421-431 - [c7]Adam Barth, John C. Mitchell, Anupam Datta, Sharada Sundaram:
Privacy and Utility in Business Processes. CSF 2007: 279-294 - [c6]Collin Jackson, Daniel R. Simon, Desney S. Tan, Adam Barth:
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. Financial Cryptography 2007: 281-293 - 2006
- [c5]Adam Barth, Dan Boneh, Brent Waters:
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. Financial Cryptography 2006: 52-64 - [c4]Adam Barth, John C. Mitchell:
Managing Digital Rights using Linear Logic. LICS 2006: 127-136 - [c3]Adam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum:
Privacy and Contextual Integrity: Framework and Applications. S&P 2006: 184-198 - 2005
- [j1]Bennett Wilburn, Neel Joshi, Vaibhav Vaish, Eino-Ville Talvala, Emilio R. Antúnez, Adam Barth, Andrew Adams, Mark Horowitz, Marc Levoy:
High performance imaging using large camera arrays. ACM Trans. Graph. 24(3): 765-776 (2005) - [c2]Adam Barth, John C. Mitchell:
Enterprise privacy promises and enforcement. WITS 2005: 58-66 - 2004
- [c1]Adam Barth, John C. Mitchell, Justin Rosenstein:
Conflict and combination in privacy policy languages. WPES 2004: 45-46
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint