-
1
-
-
4043116941
-
Private authentication
-
M. Abadi and C. Fournet. Private authentication. Theor. Comput. Sci., 322(3):427-476, 2004.
-
(2004)
Theor. Comput. Sci.
, vol.322
, Issue.3
, pp. 427-476
-
-
Abadi, M.1
Fournet, C.2
-
2
-
-
33750089381
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. MaloneLee, G. Neven, P. Paillier, and H. Shi. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. In CRYPTO, 2005.
-
(2005)
CRYPTO
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
MaloneLee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
3
-
-
14744275332
-
Privacy and rationality in individual decision making
-
A. Acquisti and J. Grossklags. Privacy and rationality in individual decision making. IEEE Security and Privacy, 3(1):26-33, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.1
, pp. 26-33
-
-
Acquisti, A.1
Grossklags, J.2
-
5
-
-
0038687767
-
Efficient, DoS-resistant, secure key exchange for internet protocols
-
W. Aiello, S. M. Bellovin, M. Blaze, J. Ioannidis, O. Reingold, R. Canetti, and A. D. Keromytis. Efficient, DoS-resistant, secure key exchange for internet protocols. In CCS, 2002.
-
(2002)
CCS
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Ioannidis, J.4
Reingold, O.5
Canetti, R.6
Keromytis, A.D.7
-
7
-
-
33746040289
-
Private encrypted content distribution using private broadcast encryption
-
A. Barth, D. Boneh, and B. Waters. Private encrypted content distribution using private broadcast encryption. In Financial Crypto, 2006.
-
(2006)
Financial Crypto
-
-
Barth, A.1
Boneh, D.2
Waters, B.3
-
9
-
-
35448936042
-
Smokescreen: flexible privacy controls for presence-sharing
-
L. P. Cox, A. Dalton, and V. Marupadi. Smokescreen: flexible privacy controls for presence-sharing. In MobiSys, 2007.
-
(2007)
MobiSys
-
-
Cox, L.P.1
Dalton, A.2
Marupadi, V.3
-
10
-
-
85094635733
-
An architecture for a secure service discovery service
-
S. E. Czerwinski, B. Y. Zhao, T. D. Hodes, A. D. Joseph, and R. H. Katz. An architecture for a secure service discovery service. In MobiCom, 1999.
-
(1999)
MobiCom
-
-
Czerwinski, S.E.1
Zhao, B.Y.2
Hodes, T.D.3
Joseph, A.D.4
Katz, R.H.5
-
11
-
-
0001293053
-
Broadcast encryption
-
A. Fiat and M. Naor. Broadcast encryption. In CRYPTO, 1993.
-
(1993)
CRYPTO
-
-
Fiat, A.1
Naor, M.2
-
12
-
-
70349798920
-
Efficient private techniques for verifying social proximity
-
M. J. Freedman and A. Nicolosi. Efficient private techniques for verifying social proximity. In IPTPS, 2007.
-
(2007)
IPTPS
-
-
Freedman, M.J.1
Nicolosi, A.2
-
13
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
May/June
-
S. Garfinkel, A. Juels, and R. Pappu. RFID privacy: An overview of problems and proposed solutions. IEEE Security and Privacy, 3(3):34-43, May/June 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.1
Juels, A.2
Pappu, R.3
-
15
-
-
85092666359
-
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in an Era of Wireless Devices
-
B. Greenstein, R. Gummadi, J. Pang, M. Y. Chen, T. Kohno, S. Seshan, and D. Wetherall. Can Ferris Bueller Still Have His Day Off? Protecting Privacy in an Era of Wireless Devices. In HotOS XI, 2007.
-
(2007)
HotOS XI
-
-
Greenstein, B.1
Gummadi, R.2
Pang, J.3
Chen, M.Y.4
Kohno, T.5
Seshan, S.6
Wetherall, D.7
-
16
-
-
23944520444
-
Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
-
M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis. ACM MONET, 10, 2005.
-
(2005)
ACM MONET
, vol.10
-
-
Gruteser, M.1
Grunwald, D.2
-
17
-
-
35449007284
-
Preserving location privacy in wireless LANs
-
T. Jiang, H. Wang, and Y.-C. Hu. Preserving location privacy in wireless LANs. In MobiSys, 2007.
-
(2007)
MobiSys
-
-
Jiang, T.1
Wang, H.2
Hu, Y.-C.3
-
18
-
-
0003387819
-
Revocation and tracing schemes for stateless receivers
-
D. Naor, M. Naor, and J. Lotspiech. Revocation and tracing schemes for stateless receivers. In CRYPTO, 2001.
-
(2001)
CRYPTO
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
19
-
-
44349164270
-
-
July
-
NGA GEOnet names server, July 2007. http://earth-info.nga.mil/gns/html/index.html.
-
(2007)
NGA GEOnet names server
-
-
-
20
-
-
37749006403
-
802.11 user fingerprinting
-
Sept
-
J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall. 802.11 user fingerprinting. In MobiCom, Sept. 2007.
-
(2007)
MobiCom
-
-
Pang, J.1
Greenstein, B.2
Gummadi, R.3
Seshan, S.4
Wetherall, D.5
-
21
-
-
85134044782
-
Phone pirates in seek and steal mission
-
Aug
-
Phone pirates in seek and steal mission. Cam-bridge Evening News, Aug. 2005. http://www.cambridge-news.co.uk/news/region wide/2005/08/17/06967453-8002-45f8-b520-66b9bed6f29f.lpf.
-
(2005)
Cam-bridge Evening News
-
-
-
22
-
-
79551627971
-
-
10-17
-
M. Rodrig, C. Reis, R. Mahajan, D. Wetherall, J. Zahorjan, and E. Lazowska. CRAWDAD data set uw/sigcomm2004 (v. 2006-10-17). http://crawdad.cs.dartmouth.edu.
-
(2006)
CRAWDAD data set uw/sigcomm2004
-
-
Rodrig, M.1
Reis, C.2
Mahajan, R.3
Wetherall, D.4
Zahorjan, J.5
Lazowska, E.6
|