|
Search the dblp DataBase
Urs Hengartner:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Urs Hengartner, Peter Steenkiste
Access Control to Information in Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP] HotOS, 2003, pp:157-162 [Conf]
- Urs Hengartner, Sue B. Moon, Richard Mortier, Christophe Diot
Detection and analysis of routing loops in packet traces. [Citation Graph (0, 0)][DBLP] Internet Measurement Workshop, 2002, pp:107-112 [Conf]
- Jürg Bolliger, Thomas R. Gross, Urs Hengartner
Bandwidth Modeling for Network-Aware Applications. [Citation Graph (0, 0)][DBLP] INFOCOM, 1999, pp:1300-1309 [Conf]
- Urs Hengartner, Jürg Bolliger, Thomas R. Gross
TCP Vegas Revisited. [Citation Graph (0, 0)][DBLP] INFOCOM, 2000, pp:1546-1555 [Conf]
- Andy Myers, John Chuang, Urs Hengartner, Yinglian Xie, Weiqiang Zhuang, Hui Zhang
A Secure, Publisher-Centric Web Caching Infrastructure. [Citation Graph (0, 0)][DBLP] INFOCOM, 2001, pp:1235-1243 [Conf]
- Urs Hengartner, Elisabeth Maier, Christos Kefos, Lutz Richter, Reinhard Riedl, Martina Klose, Ulrike Lechner, Olga Miler, Beat Schmid
Organization on intranet - An agent based approach. [Citation Graph (0, 0)][DBLP] IRMA Conference, 2000, pp:316-319 [Conf]
- Urs Hengartner, Peter Steenkiste
Exploiting Information Relationships for Access Control. [Citation Graph (0, 0)][DBLP] PerCom, 2005, pp:269-278 [Conf]
- Urs Hengartner, Peter Steenkiste
Avoiding Privacy Violations Caused by Context-Sensitive Services. [Citation Graph (0, 0)][DBLP] PerCom, 2006, pp:222-233 [Conf]
- Urs Hengartner, Peter Steenkiste
Implementing access control to people location information. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:11-20 [Conf]
- Urs Hengartner, Peter Steenkiste
Protecting Access to People Location Information. [Citation Graph (0, 0)][DBLP] SPC, 2003, pp:25-38 [Conf]
- Urs Hengartner, Peter Steenkiste
Securing Information Gateways with Derivation-Constrained Access Control. [Citation Graph (0, 0)][DBLP] SPC, 2006, pp:181-195 [Conf]
- Urs Hengartner, Peter Steenkiste
Access control to people location information. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:4, pp:424-456 [Journal]
- Ge Zhong, Ian Goldberg, Urs Hengartner
Louis, Lester and Pierre: Three Protocols for Location Privacy. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2007, pp:62-76 [Conf]
Hiding Location Information from Location-Based Services. [Citation Graph (, )][DBLP]
Distributed, Uncertainty-Aware Access Control for Pervasive Computing. [Citation Graph (, )][DBLP]
A Distributed k-Anonymity Protocol for Location Privacy. [Citation Graph (, )][DBLP]
Achieving Efficient Query Privacy for Location Based Services. [Citation Graph (, )][DBLP]
Panic Passwords: Authenticating under Duress. [Citation Graph (, )][DBLP]
Toward a distributed k-anonymity protocol for location privacy. [Citation Graph (, )][DBLP]
Not-So Hidden Information: Optimal Contracts for Undue Influence in E2E Voting Systems. [Citation Graph (, )][DBLP]
FaceCloak: An Architecture for User Privacy on Social Networking Sites. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.006secs
|