The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Matthew Wright: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael K. Reiter, XiaoFeng Wang, Matthew Wright
    Building Reliable Mix Networks with Fair Exchange. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:378-392 [Conf]
  2. Arjun Nambiar, Matthew Wright
    Salsa: a structured approach to large-scale anonymity. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:17-26 [Conf]
  3. N. Boris Margolin, Matthew Wright, Brian Neil Levine
    Analysis of an incentives-based secrets protection system. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2004, pp:22-30 [Conf]
  4. Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew Wright
    Timing Attacks in Low-Latency Mix Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:251-265 [Conf]
  5. Matthew Wright, Micah Adler, Brian Neil Levine, Clay Shields
    An Analysis of the Degradation of Anonymous Protocols. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  6. Adrian Freed, Rimas Avizienis, Matthew Wright
    Beyond 0-5V: Expanding Sensor Integration Architectures. [Citation Graph (0, 0)][DBLP]
    NIME, 2006, pp:97-100 [Conf]
  7. David Wessel, Matthew Wright
    Problems and Prospects for Intimate Musical Control of Computers. [Citation Graph (0, 0)][DBLP]
    NIME, 2001, pp:- [Conf]
  8. David Wessel, Matthew Wright, John Schott
    Intimate Musical Control of Computers with a Variety of Controllers and Gesture Mapping Metaphors. [Citation Graph (0, 0)][DBLP]
    NIME, 2002, pp:171-173 [Conf]
  9. Matthew Wright, Adrian Freed, Ali Momeni
    OpenSound Control: State of the Art 2003. [Citation Graph (0, 0)][DBLP]
    NIME, 2003, pp:153-159 [Conf]
  10. Matthew Wright, Micah Adler, Brian Neil Levine, Clay Shields
    Defending Anonymous Communications Against Passive Logging Attack. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:28-0 [Conf]
  11. Gerardine DeSanctis, Matthew Wright, Lu Jiang
    Building A Global Learning Community. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:12, pp:80-82 [Journal]
  12. Matthew Wright, Micah Adler, Brian Neil Levine, Clay Shields
    The predecessor attack: An analysis of a threat to anonymous communications systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:4, pp:489-522 [Journal]
  13. Nayantara Mallesh, Matthew Wright
    Countering Statistical Disclosure with Receiver-Bound Cover Traffic. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:547-562 [Conf]

  14. Location Privacy in Sensor Networks Against a Global Eavesdropper. [Citation Graph (, )][DBLP]


  15. Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis. [Citation Graph (, )][DBLP]


  16. Analyzing Afro-Cuban Rhythms using Rotation-Aware Clave Template Matching with Dynamic Programming. [Citation Graph (, )][DBLP]


  17. Chants and Orcas: semi-automatic tools for audio annotation and analysis in niche domains. [Citation Graph (, )][DBLP]


  18. AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems. [Citation Graph (, )][DBLP]


  19. DTT: A Distributed Trust Toolkit for Pervasive Systems. [Citation Graph (, )][DBLP]


  20. Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  21. ReSCo: A middleware component for Reliable Service Composition in pervasive systems. [Citation Graph (, )][DBLP]


  22. Studying Timing Analysis on the Internet with SubRosa. [Citation Graph (, )][DBLP]


  23. PEON: privacy-enhanced opportunistic networks with applications in assistive environments. [Citation Graph (, )][DBLP]


  24. Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. [Citation Graph (, )][DBLP]


  25. Evading stepping-stone detection under the cloak of streaming media with SNEAK. [Citation Graph (, )][DBLP]


Search in 0.054secs, Finished in 0.055secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002