The SCEAS System
Navigation Menu

Search the dblp DataBase


Urs Hengartner: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Urs Hengartner, Peter Steenkiste
    Access Control to Information in Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    HotOS, 2003, pp:157-162 [Conf]
  2. Urs Hengartner, Sue B. Moon, Richard Mortier, Christophe Diot
    Detection and analysis of routing loops in packet traces. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Workshop, 2002, pp:107-112 [Conf]
  3. Jürg Bolliger, Thomas R. Gross, Urs Hengartner
    Bandwidth Modeling for Network-Aware Applications. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1999, pp:1300-1309 [Conf]
  4. Urs Hengartner, Jürg Bolliger, Thomas R. Gross
    TCP Vegas Revisited. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2000, pp:1546-1555 [Conf]
  5. Andy Myers, John Chuang, Urs Hengartner, Yinglian Xie, Weiqiang Zhuang, Hui Zhang
    A Secure, Publisher-Centric Web Caching Infrastructure. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:1235-1243 [Conf]
  6. Urs Hengartner, Elisabeth Maier, Christos Kefos, Lutz Richter, Reinhard Riedl, Martina Klose, Ulrike Lechner, Olga Miler, Beat Schmid
    Organization on intranet - An agent based approach. [Citation Graph (0, 0)][DBLP]
    IRMA Conference, 2000, pp:316-319 [Conf]
  7. Urs Hengartner, Peter Steenkiste
    Exploiting Information Relationships for Access Control. [Citation Graph (0, 0)][DBLP]
    PerCom, 2005, pp:269-278 [Conf]
  8. Urs Hengartner, Peter Steenkiste
    Avoiding Privacy Violations Caused by Context-Sensitive Services. [Citation Graph (0, 0)][DBLP]
    PerCom, 2006, pp:222-233 [Conf]
  9. Urs Hengartner, Peter Steenkiste
    Implementing access control to people location information. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:11-20 [Conf]
  10. Urs Hengartner, Peter Steenkiste
    Protecting Access to People Location Information. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:25-38 [Conf]
  11. Urs Hengartner, Peter Steenkiste
    Securing Information Gateways with Derivation-Constrained Access Control. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:181-195 [Conf]
  12. Urs Hengartner, Peter Steenkiste
    Access control to people location information. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:4, pp:424-456 [Journal]
  13. Ge Zhong, Ian Goldberg, Urs Hengartner
    Louis, Lester and Pierre: Three Protocols for Location Privacy. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:62-76 [Conf]

  14. Hiding Location Information from Location-Based Services. [Citation Graph (, )][DBLP]

  15. Distributed, Uncertainty-Aware Access Control for Pervasive Computing. [Citation Graph (, )][DBLP]

  16. A Distributed k-Anonymity Protocol for Location Privacy. [Citation Graph (, )][DBLP]

  17. Achieving Efficient Query Privacy for Location Based Services. [Citation Graph (, )][DBLP]

  18. Panic Passwords: Authenticating under Duress. [Citation Graph (, )][DBLP]

  19. Toward a distributed k-anonymity protocol for location privacy. [Citation Graph (, )][DBLP]

  20. Not-So Hidden Information: Optimal Contracts for Undue Influence in E2E Voting Systems. [Citation Graph (, )][DBLP]

  21. FaceCloak: An Architecture for User Privacy on Social Networking Sites. [Citation Graph (, )][DBLP]

Search in 0.005secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002