David P Durham

Learn More
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is protected today. The primary reason for this neglect is economic, mainly security protocol speed and cost. In this paper we argue that recent advances in the implementation of(More)
Recent Phase 2b dengue vaccine trials have demonstrated the safety of the vaccine and estimated the vaccine efficacy with further trials underway. In anticipation of vaccine roll-out, cost-effectiveness analysis of potential vaccination policies that quantify the dynamics of disease transmission are fundamental to the optimal allocation of available doses.(More)
An important goal of software security is to ensure sensitive/secret data owned by a program shall be exclusively accessible by the program. An obstacle to such security goal is that modern commodity operating systems (OS) for the sake of speed and flexibility have a unified linear address space--any OS kernel program can access all the linear addresses. As(More)
It is anticipated that the next generation of computational epidemic models will simulate both infectious disease transmission and dynamic human behaviour change. Individual agents within a simulation will not only infect one another, but will also have situational awareness and a decision algorithm that enables them to modify their behaviour. This paper(More)
Effective control of schistosomiasis remains a challenging problem for endemic areas of the world. Given knowledge of the biology of transmission and past experience with mass drug administration (MDA) programs, it is important to critically evaluate the likelihood that MDA programs will achieve substantial reductions in Schistosoma prevalence. In(More)
BACKGROUND The degree of cross-immunity between human papillomavirus (HPV) types is fundamental both to the epidemiological dynamics of HPV and to the impact of HPV vaccination. Epidemiological data on HPV infections has been repeatedly interpreted as inconsistent with cross-immunity. METHODS We reevaluate the epidemiological data using a model to(More)
BACKGROUND A. aegypti production and human density may vary considerably in dengue endemic areas. Understanding how interactions between these factors influence the risk of transmission could improve the effectiveness of the allocation of vector control resources. To evaluate the combined impacts of variation in A. aegypti production and human density we(More)
Malicious root-kits modify the in-memory state of programs executing on an endpoint to hide themselves from security software. Such attacks negatively affect network-based security frameworks that depend on the trustworthiness of endpoint software. In network access control frameworks this issue is called the lying-endpoint problem, where a compromised(More)
A challenge in secure pairing of two wireless devices is how to share a secret between the two devices in a user-friendly manner, as many users practically choose the simplest setup of no security. Various out-of-band (OOB) methods have been proposed in the literature, where either extra hardware is required (e.g. infrared device, digital camera, near-field(More)
Every year in the United States more than 12,000 women are diagnosed with cervical cancer, a disease principally caused by human papillomavirus (HPV). Bivalent and quadrivalent HPV vaccines protect against 66% of HPV-associated cervical cancers, and a new nonavalent vaccine protects against an additional 15% of cervical cancers. However, vaccination policy(More)