-
1
-
-
0001371923
-
Fast discovery of association rules
-
Rakesh Agrawal, Heikki Mannila, Ramakrishnan Srikant, Hannu Toivonen, A Inkeri Verkamo, et al. Fast discovery of association rules. Advances in knowledge discovery and data mining, 12(1):307-328, 1996.
-
(1996)
Advances in Knowledge Discovery and Data Mining
, vol.12
, Issue.1
, pp. 307-328
-
-
Agrawal, R.1
Mannila, H.2
Srikant, R.3
Toivonen, H.4
Inkeri Verkamo, A.5
-
3
-
-
84863456733
-
The shy mayor: Private badges in geosocial networks
-
In Feng Bao, Pierangela Samarati, and Jianying Zhou, editors of Lecture Notes in Computer Science Springer Berlin Heidelberg
-
Bogdan Carbunar, Radu Sion, Rahul Potharaju, and Moussa Ehsan. The shy mayor: Private badges in geosocial networks. In Feng Bao, Pierangela Samarati, and Jianying Zhou, editors, Applied Cryptography and Network Security, volume 7341 of Lecture Notes in Computer Science, pages 436-454. Springer Berlin Heidelberg, 2012.
-
(2012)
Applied Cryptography and Network Security
, vol.7341
, pp. 436-454
-
-
Carbunar, B.1
Sion, R.2
Potharaju, R.3
Ehsan, M.4
-
4
-
-
84873667233
-
Intuitive security policy configuration in mobile devices using context proffling
-
September
-
Aditi Gupta, Markus Miettinen, N. Asokan, and Marcin Nagy. Intuitive security policy configuration in mobile devices using context proffling. In International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2012 International Confernece on Social Computing (SocialCom), pages 471-480, September 2012.
-
(2012)
International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2012 International Confernece on Social Computing (SocialCom
, pp. 471-480
-
-
Gupta, A.1
Miettinen, M.2
Asokan, N.3
Nagy, M.4
-
5
-
-
84865611928
-
Secure proximity detection for nfc devices based on ambient sensor data
-
In Sara Foresti, Moti Yung, and Fabio Martinelli, editors of Lecture Notes in Computer Science Springer Berlin Heidelberg
-
Tzipora Halevi, Di Ma, Nitesh Saxena, and Tuo Xiang. Secure proximity detection for nfc devices based on ambient sensor data. In Sara Foresti, Moti Yung, and Fabio Martinelli, editors, Computer Security ESORICS 2012, volume 7459 of Lecture Notes in Computer Science, pages 379-396. Springer Berlin Heidelberg, 2012.
-
(2012)
Computer Security ESORICS 2012
, vol.7459
, pp. 379-396
-
-
Halevi, T.1
Saxena, D.M.N.2
Xiang, T.3
-
6
-
-
76749092270
-
The weka data mining software: An update
-
November
-
Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, and Ian H. Witten. The weka data mining software: an update. SIGKDD Explor. Newsl., 11(1):10-18, November 2009.
-
(2009)
SIGKDD Explor. Newsl.
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
7
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Yih-Chun Hu, A. Perrig, and D.B. Johnson. Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, volume 3, pages 1976-1986 vol.3, 2003.
-
(2003)
INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies
, vol.3
, pp. 1976-1986
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
8
-
-
84942546011
-
-
Foursquare Labs Inc. foursquare.com. (online, last referenced [2014-07-24]
-
Foursquare Labs Inc. foursquare.com. (online, last referenced [2014-07-24]).
-
-
-
-
9
-
-
74049135283
-
Smile: Encounter-based trust for mobile social services
-
New York, NY, USA. ACM
-
Justin Manweiler, Ryan Scudellari, and Landon P. Cox. Smile: Encounter-based trust for mobile social services. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, pages 246-255, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 246-255
-
-
Manweiler, J.1
Scudellari, R.2
Cox, L.P.3
-
10
-
-
85150485002
-
Location privacy via private proximity testing
-
Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Michael Hamburg, and Dan Boneh. Location privacy via private proximity testing. In NDSS, 2011.
-
(2011)
NDSS
-
-
Narayanan, A.1
Thiagarajan, N.2
Lakhani, M.3
Hamburg, M.4
Boneh, D.5
-
11
-
-
84893225824
-
The man who was there: Validating check-ins in location-based services
-
New York, NY, USA ACM
-
Iasonas Polakis, Stamatis Volanis, Elias Athanasopoulos, and Evangelos P. Markatos. The man who was there: Validating check-ins in location-based services. In Proceedings of the 29th Annual Computer Security Applications Conference, ACSAC '13, pages 19-28, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 29th Annual Computer Security Applications Conference, ACSAC '13
, pp. 19-28
-
-
Polakis, I.1
Volanis, S.2
Athanasopoulos, E.3
Markatos, E.P.4
-
12
-
-
67650661394
-
Enabling new mobile applications with location proofs
-
New York, NY, USA ACM
-
Stefan Saroiu and Alec Wolman. Enabling new mobile applications with location proofs. In Proceedings of the 10th Workshop on Mobile Computing Systems and Applications, HotMobile '09, pages 3:1-3:6, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 10th Workshop on Mobile Computing Systems and Applications, HotMobile '09
, vol.3
, Issue.1-3
, pp. 6
-
-
Saroiu, S.1
Wolman, A.2
-
15
-
-
84901351388
-
Comparing and fusing diérent sensor modalities for relay attack resistance in zero-interaction authentication
-
Hien Thi Thu Truong, Xiang Gao, Babins Shrestha, Nitesh Saxena, N Asokan, and Petteri Nurmi. Comparing and fusing diérent sensor modalities for relay attack resistance in zero-interaction authentication. In IEEE International Conference on Pervasive Computing and Communications, PerCom, 2014.
-
(2014)
IEEE International Conference on Pervasive Computing and Communications, PerCom
-
-
Truong, H.T.T.1
Gao, X.2
Shrestha, B.3
Saxena, N.4
Asokan, N.5
Nurmi, P.6
-
16
-
-
38349004892
-
Amigo: Proximity-based authentication of mobile devices
-
In John Krumm, GregoryD. Abowd, Aruna Seneviratne, and Thomas Strang, editors, of Lecture Notes in Computer Science Springer Berlin Heidelberg
-
Alex Varshavsky, Adin Scannell, Anthony LaMarca, and Eyal Lara. Amigo: Proximity-based authentication of mobile devices. In John Krumm, GregoryD. Abowd, Aruna Seneviratne, and Thomas Strang, editors, UbiComp 2007: Ubiquitous Computing, volume 4717 of Lecture Notes in Computer Science, pages 253-270. Springer Berlin Heidelberg, 2007.
-
(2007)
UbiComp 2007: Ubiquitous Computing
, vol.4717
, pp. 253-270
-
-
Varshavsky, A.1
Scannell, A.2
LaMarca, A.3
Lara, E.4
|