Mark Gondree
Mark Gondree
Verified email at sonoma.edu - Homepage
TitleCited byYear
A position paper on data sovereignty: The importance of geolocating data in the cloud
ZNJ Peterson, M Gondree, R Beverly
1002011
Geolocation of data in the cloud
M Gondree, ZNJ Peterson
Proceedings of the third ACM conference on Data and application security and …, 2013
782013
Fixing federal e-voting standards
E Barr, M Bishop, M Gondree
Communications of the ACM, 2007
392007
Security through play
M Gondree, ZNJ Peterson, T Denning
IEEE Security & Privacy 11 (3), 64-67, 2013
302013
A cloud-oriented cross-domain security architecture
TD Nguyen, MA Gondree, DJ Shifflett, J Khosalim, TE Levin, CE Irvine
MILITARY COMMUNICATIONS CONFERENCE, 2010-MILCOM 2010, 441-447, 2010
272010
This is not a game: early observations on using alternate reality games for teaching security concepts to first-year undergraduates
T Flushman, M Gondree, ZNJ Peterson
8th Workshop on Cyber Security Experimentation and Test ({CSET} 15), 2015
212015
DEFY: A deniable, encrypted file system for log-structured storage
TM Peters, MA Gondree, ZNJ Peterson
212015
The outcomes of cybersecurity competitions and implications for underrepresented populations
P Pusey, M Gondree, Z Peterson
IEEE Security & Privacy 14 (6), 90-95, 2016
202016
Improved efficiency for private stable matching
M Franklin, M Gondree, P Mohassel
Cryptographers’ Track at the RSA Conference, 163-177, 2007
202007
Valuing security by getting [d0x3d!]: Experiences with a network security board game
M Gondree, ZNJ Peterson
Presented as part of the 6th Workshop on Cyber Security Experimentation and Test, 2013
18*2013
Multi-party indirect indexing and applications
M Franklin, M Gondree, P Mohassel
International Conference on the Theory and Application of Cryptology and …, 2007
152007
MYSEA: the Monterey security architecture
CE Irvine, TD Nguyen, DJ Shifflett, TE Levin, J Khosalim, C Prince, ...
Proceedings of the 2009 ACM workshop on Scalable trusted computing, 39-48, 2009
142009
Communication-efficient private protocols for longest common subsequence
M Franklin, M Gondree, P Mohassel
Cryptographers’ Track at the RSA Conference, 265-278, 2009
132009
Longest common subsequence as private search
M Gondree, P Mohassel
Proceedings of the 8th ACM workshop on Privacy in the electronic society, 81-90, 2009
112009
A critique of the 2002 FEC VSPT e-voting standards
M Gondree, P Wheeler, D DeFigueiredo
Department of Computer Science University of California at Davis, Tech. Rep, 2005
102005
Talking about talking about cybersecurity games
M Gondree, ZNJ Peterson, P Pusey
72016
Towards a cross-domain MapReduce framework
TD Nguyen, MA Gondree, J Khosalim, CE Irvine
MILCOM 2013-2013 IEEE Military Communications Conference, 1436-1441, 2013
62013
Toward clarifying election systems standards
E Barr, M Bishop, D DeFigueiredo, M Gondree, P Wheeler
52005
DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing
F Tacliad, TD Nguyen, M Gondree
Proceedings of the 3rd Annual Industrial Control System Security Workshop, 24-31, 2017
32017
SVMs for Improved Branch Prediction
BJ Culpepper, M Gondree
University of California, UCDavis, USA, ECS201A Technical Report, 2005
32005
The system can't perform the operation now. Try again later.
Articles 1–20