Name
Affiliation
Papers
DAVID MOLNAR
Microsoft Research
34
Collaborators
Citations 
PageRank 
74
1393
85.51
Referers 
Referees 
References 
2825
1200
611
Search Limit
1001000
Title
Citations
PageRank
Year
Getting Fit for the Future: Optimizing Energy Usage in Existing Buildings by Adding Non-Invasive Sensor Networks.00.342018
Prepose: Privacy, Security, and Reliability for Gesture-Based Programming.70.542017
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems10.382015
SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser110.652015
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems.00.342015
Program Boosting: Program Synthesis via Crowd-Sourcing100.592015
Data-Parallel String-Manipulating Programs60.432015
A Framework for Understanding and Designing Telepresence250.982015
Security and privacy for augmented reality systems401.572014
Zero-effort payments: design, deployment, and lessons20.522014
Fast: a transducer-based language for tree manipulation150.672014
World-Driven Access Control for Continuous Sensing291.242014
Operating system support for augmented reality applications40.512013
Enabling fine-grained permissions for augmented reality applications with recognizers271.262013
Billions and billions of constraints: whitebox fuzz testing in production270.992013
Symbolic finite state transducers: algorithms and applications571.612012
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications461.552011
Fast and precise sanitizer analysis with BEK732.272011
Enabling security in cloud storage SLAs with CloudProof912.912011
Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays.60.532010
This is your data on drugs: lessons computer security can learn from the drug war30.662010
Dynamic test generation to find integer bugs in x86 binary linux programs953.772009
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate864.442009
RFID security and privacy: long-term research or short-term tinkering?30.472008
From weak to strong watermarking140.632007
Generic on-line/off-line threshold signatures140.742006
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract)191.852006
Security and Privacy Issues in E-passports12611.892005
Efficient designated confirmer signatures without random oracles or general zero-knowledge proofs190.672005
Privacy for RFID through trusted computing170.852005
The program counter security model: automatic detection and removal of control-flow side channel attacks522.102005
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags12510.352005
An analysis of empirical PMF based tests for least significant bit image steganography20.442005
Privacy and security in library RFID: issues, practices, and architectures34126.792004