Follow
Mark Gondree
Mark Gondree
Verified email at sonoma.edu - Homepage
Title
Cited by
Cited by
Year
A position paper on data sovereignty: The importance of geolocating data in the cloud
ZNJ Peterson, M Gondree, R Beverly
3rd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 11), 2011
1592011
Geolocation of data in the cloud
M Gondree, ZNJ Peterson
Proceedings of the third ACM conference on Data and application security and …, 2013
1122013
Security through play
M Gondree, ZNJ Peterson, T Denning
IEEE Security & Privacy 11 (3), 64-67, 2013
692013
The outcomes of cybersecurity competitions and implications for underrepresented populations
P Pusey, M Gondree, Z Peterson
IEEE Security & Privacy 14 (6), 90-95, 2016
552016
Valuing Security by Getting {[d0x3d!]}: Experiences with a Network Security Board Game
M Gondree, ZNJ Peterson
6th Workshop on Cyber Security Experimentation and Test (CSET 13), 2013
502013
Fixing federal e-voting standards
E Barr, M Bishop, M Gondree
Communications of the ACM 50 (3), 19-24, 2007
462007
This is not a game: Early observations on using alternate reality games for teaching security concepts to {First-Year} undergraduates
T Flushman, M Gondree, ZNJ Peterson
8th Workshop on Cyber Security Experimentation and Test (CSET 15), 2015
452015
DEFY: A Deniable, Encrypted File System for Log-Structured Storage.
T Peters, MA Gondree, ZNJ Peterson
NDSS, 2015
432015
A cloud-oriented cross-domain security architecture
TD Nguyen, MA Gondree, DJ Shifflett, J Khosalim, TE Levin, CE Irvine
MILITARY COMMUNICATIONS CONFERENCE, 2010-MILCOM 2010, 441-447, 2010
312010
Improved efficiency for private stable matching
M Franklin, M Gondree, P Mohassel
Topics in Cryptology–CT-RSA 2007: The Cryptographers’ Track at the RSA …, 2006
272006
Multi-party indirect indexing and applications
M Franklin, M Gondree, P Mohassel
Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007
182007
DoS exploitation of allen-bradley's legacy protocol through fuzz testing
F Tacliad, TD Nguyen, M Gondree
Proceedings of the 3rd Annual Industrial Control System Security Workshop, 24-31, 2017
172017
Talking about talking about cybersecurity games
M Gondree, ZNJ Peterson, P Pusey
login Usenix Mag. 41 (1), 2016
162016
MYSEA: the Monterey security architecture
CE Irvine, TD Nguyen, DJ Shifflett, TE Levin, J Khosalim, C Prince, ...
Proceedings of the 2009 ACM workshop on Scalable trusted computing, 39-48, 2009
162009
Communication-efficient private protocols for longest common subsequence
M Franklin, M Gondree, P Mohassel
Cryptographers’ Track at the RSA Conference, 265-278, 2009
162009
Asset criticality in mission reconfigurable cyber systems and its contribution to key cyber terrain
P Price, N Leyba, M Gondree, Z Staples, T Parker
132017
Longest common subsequence as private search
M Gondree, P Mohassel
Proceedings of the 8th ACM workshop on Privacy in the electronic society, 81-90, 2009
132009
A critique of the 2002 FEC VSPT e-voting standards
M Gondree, P Wheeler, D DeFigueiredo
Department of Computer Science University of California at Davis, Tech. Rep, 2005
112005
Towards a cross-domain MapReduce framework
TD Nguyen, MA Gondree, J Khosalim, CE Irvine
MILCOM 2013-2013 IEEE Military Communications Conference, 1436-1441, 2013
82013
SVMs for Improved Branch Prediction
BJ Culpepper, M Gondree
University of California, UCDavis, USA, ECS201A Technical Report, 2005
62005
The system can't perform the operation now. Try again later.
Articles 1–20