Follow
Mark Gondree
Mark Gondree
Verified email at sonoma.edu - Homepage
Title
Cited by
Cited by
Year
A position paper on data sovereignty: The importance of geolocating data in the cloud
ZNJ Peterson, M Gondree, R Beverly
3rd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 11), 2011
1362011
Geolocation of data in the cloud
M Gondree, ZNJ Peterson
Proceedings of the third ACM conference on Data and application security and …, 2013
1032013
Security through play
M Gondree, ZNJ Peterson, T Denning
IEEE Security & Privacy 11 (3), 64-67, 2013
572013
Fixing federal e-voting standards
E Barr, M Bishop, M Gondree
Communications of the ACM 50 (3), 19-24, 2007
442007
The outcomes of cybersecurity competitions and implications for underrepresented populations
P Pusey, M Gondree, Z Peterson
IEEE Security & Privacy 14 (6), 90-95, 2016
412016
DEFY: A deniable, encrypted file system for log-structured storage
TM Peters, MA Gondree, ZNJ Peterson
402015
This is Not a Game: Early Observations on Using Alternate Reality Games for Teaching Security Concepts to {First-Year} Undergraduates
T Flushman, M Gondree, ZNJ Peterson
8th Workshop on Cyber Security Experimentation and Test (CSET 15), 2015
382015
Valuing Security by Getting {[d0x3d!]}: Experiences with a Network Security Board Game
M Gondree, ZNJ Peterson
6th Workshop on Cyber Security Experimentation and Test (CSET 13), 2013
382013
A cloud-oriented cross-domain security architecture
TD Nguyen, MA Gondree, DJ Shifflett, J Khosalim, TE Levin, CE Irvine
MILITARY COMMUNICATIONS CONFERENCE, 2010-MILCOM 2010, 441-447, 2010
292010
Improved efficiency for private stable matching
M Franklin, M Gondree, P Mohassel
Cryptographers’ Track at the RSA Conference, 163-177, 2007
242007
Multi-party indirect indexing and applications
M Franklin, M Gondree, P Mohassel
International Conference on the Theory and Application of Cryptology and …, 2007
182007
Communication-efficient private protocols for longest common subsequence
M Franklin, M Gondree, P Mohassel
Cryptographers’ Track at the RSA Conference, 265-278, 2009
172009
MYSEA: the Monterey security architecture
CE Irvine, TD Nguyen, DJ Shifflett, TE Levin, J Khosalim, C Prince, ...
Proceedings of the 2009 ACM workshop on Scalable trusted computing, 39-48, 2009
152009
Longest common subsequence as private search
M Gondree, P Mohassel
Proceedings of the 8th ACM workshop on Privacy in the electronic society, 81-90, 2009
132009
DoS exploitation of allen-bradley's legacy protocol through fuzz testing
F Tacliad, TD Nguyen, M Gondree
Proceedings of the 3rd Annual Industrial Control System Security Workshop, 24-31, 2017
122017
Talking about talking about cybersecurity games
M Gondree, ZNJ Peterson, P Pusey
login Usenix Mag. 41 (1), 2016
122016
A critique of the 2002 FEC VSPT e-voting standards
M Gondree, P Wheeler, D DeFigueiredo
Department of Computer Science University of California at Davis, Tech. Rep, 2005
112005
Asset criticality in mission reconfigurable cyber systems and its contribution to key cyber terrain
P Price, N Leyba, M Gondree, Z Staples, T Parker
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
92017
Towards a cross-domain MapReduce framework
TD Nguyen, MA Gondree, J Khosalim, CE Irvine
MILCOM 2013-2013 IEEE Military Communications Conference, 1436-1441, 2013
72013
SVMs for Improved Branch Prediction
BJ Culpepper, M Gondree
University of California, UCDavis, USA, ECS201A Technical Report, 2005
62005
The system can't perform the operation now. Try again later.
Articles 1–20