The SCEAS System
Navigation Menu

Search the dblp DataBase


Adam Barth: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Adam Barth, Dan Boneh, Brent Waters
    Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:52-64 [Conf]
  2. Adam Barth, John C. Mitchell
    Managing Digital Rights using Linear Logic. [Citation Graph (0, 0)][DBLP]
    LICS, 2006, pp:127-136 [Conf]
  3. Adam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum
    Privacy and Contextual Integrity: Framework and Applications. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:184-198 [Conf]
  4. Adam Barth, John C. Mitchell, Justin Rosenstein
    Conflict and combination in privacy policy languages. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:45-46 [Conf]
  5. Bennett Wilburn, Neel Joshi, Vaibhav Vaish, Eino-Ville Talvala, Emilio Antunez, Adam Barth, Andrew Adams, Mark Horowitz, Marc Levoy
    High performance imaging using large camera arrays. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Graph., 2005, v:24, n:3, pp:765-776 [Journal]

  6. Protecting browsers from dns rebinding attacks. [Citation Graph (, )][DBLP]

  7. Robust defenses for cross-site request forgery. [Citation Graph (, )][DBLP]

  8. Privacy and Utility in Business Processes. [Citation Graph (, )][DBLP]

  9. Towards a Formal Foundation of Web Security. [Citation Graph (, )][DBLP]

  10. An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. [Citation Graph (, )][DBLP]

  11. A Learning-Based Approach to Reactive Security. [Citation Graph (, )][DBLP]

  12. Enterprise privacy promises and enforcement. [Citation Graph (, )][DBLP]

  13. Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves. [Citation Graph (, )][DBLP]

  14. Securing Frame Communication in Browsers. [Citation Graph (, )][DBLP]

  15. Forcehttps: protecting high-security web sites from network attacks. [Citation Graph (, )][DBLP]

  16. Regular expressions considered harmful in client-side XSS filters. [Citation Graph (, )][DBLP]

  17. Securing frame communication in browsers. [Citation Graph (, )][DBLP]

  18. Browser security: lessons from Google Chrome. [Citation Graph (, )][DBLP]

  19. A Learning-Based Approach to Reactive Security [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002