Jessica Staddon
Jessica Staddon
Bestätigte E-Mail-Adresse bei google.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Controlling data in the cloud: outsourcing computation without outsourcing control
R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina
Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90, 2009
10532009
Secure conjunctive keyword search over encrypted data
P Golle, J Staddon, B Waters
International conference on applied cryptography and network security, 31-45, 2004
9192004
Detecting and correcting malicious data in VANETs
P Golle, D Greene, J Staddon
Proceedings of the 1st ACM international workshop on Vehicular ad hoc …, 2004
6452004
Combinatorial properties of frameproof and traceability codes
JN Staddon, DR Stinson, R Wei
IEEE transactions on information theory 47 (3), 1042-1049, 2001
3882001
Combinatorial properties of frameproof and traceability codes
JN Staddon, DR Stinson, R Wei
IEEE transactions on information theory 47 (3), 1042-1049, 2001
3882001
Secret handshakes from pairing-based key agreements
D Balfanz, G Durfee, N Shankar, D Smetters, J Staddon, HC Wong
2003 Symposium on Security and Privacy, 2003., 180-196, 2003
3282003
Self-healing key distribution with revocation
J Staddon, S Miner, M Franklin, D Balfanz, M Malkin, D Dean
Proceedings 2002 IEEE Symposium on Security and Privacy, 241-257, 2002
2892002
Adjusting security level of mobile device based on presence or absence of other mobile devices nearby
R Chow, PJP Golle, JN Staddon
US Patent 8,095,112, 2012
2632012
Efficient tracing of failed nodes in sensor networks
J Staddon, D Balfanz, G Durfee
Proceedings of the 1st ACM international workshop on Wireless sensor …, 2002
2512002
Efficient tracing of failed nodes in sensor networks
J Staddon, D Balfanz, G Durfee
Proceedings of the 1st ACM international workshop on Wireless sensor …, 2002
2512002
Graph-based authentication of digital streams
S Miner, J Staddon
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 232-246, 2000
2202000
Combinatorial bounds for broadcast encryption
M Luby, J Staddon
International Conference on the Theory and Applications of Cryptographic …, 1998
1941998
Long-lived broadcast encryption
JA Garay, J Staddon, A Wool
Annual International Cryptology Conference, 333-352, 2000
1742000
PKCS# 1: RSA cryptography specifications version 2.0
B Kaliski, J Staddon
RFC 2437, October, 1998
1741998
Efficient methods for integrating traceability and broadcast encryption
E Gafni, J Staddon, YL Yin
Annual International Cryptology Conference, 372-387, 1999
1531999
Randomness re-use in multi-recipient encryption schemeas
M Bellare, A Boldyreva, J Staddon
International Workshop on Public Key Cryptography, 85-99, 2003
1382003
Indirect content privacy surveys: measuring privacy without asking about it
A Braunstein, L Granka, J Staddon
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-14, 2011
932011
Are privacy concerns a turn-off? Engagement and privacy in social networks
J Staddon, D Huffaker, L Brown, A Sedley
Proceedings of the eighth symposium on usable privacy and security, 1-13, 2012
912012
A content-driven access control system
J Staddon, P Golle, M Gagné, P Rasmussen
Proceedings of the 7th symposium on Identity and trust on the Internet, 26-35, 2008
912008
Systems and methods for protecting private information in a mobile environment
TF Lunt, DH Greene, PJ Golle, RH Bruce, JN Staddon
US Patent 7,707,413, 2010
892010
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20