The SCEAS System
Navigation Menu

Search the dblp DataBase


Philippe Golle: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Philippe Golle, Jessica Staddon, Brent R. Waters
    Secure Conjunctive Keyword Search over Encrypted Data. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:31-45 [Conf]
  2. Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels
    Optimistic Mixing for Exit-Polls. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:451-465 [Conf]
  3. Dan Boneh, Philippe Golle
    Almost entirely correct mixing with applications to voting. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:68-77 [Conf]
  4. Philippe Golle, Ari Juels
    Parallel mixing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:220-226 [Conf]
  5. Philippe Golle, Frank McSherry, Ilya Mironov
    Data collection with self-enforcing privacy. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:69-78 [Conf]
  6. Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson
    Universal Re-encryption for Mixnets. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:163-178 [Conf]
  7. Philippe Golle, Ilya Mironov
    Uncheatable Distributed Computations. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:425-440 [Conf]
  8. Jong Youl Choi, Philippe Golle, Markus Jakobsson
    Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:37-44 [Conf]
  9. Philippe Golle, Ari Juels
    Dining Cryptographers Revisited. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:456-473 [Conf]
  10. Eu-Jin Goh, Philippe Golle
    Event Driven Private Counters. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:313-327 [Conf]
  11. Philippe Golle, Stanislaw Jarecki, Ilya Mironov
    Cryptographic Primitives Enforcing Communication and Storage Complexity. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:120-135 [Conf]
  12. Philippe Golle, Stuart G. Stubblebine
    Secure Distributed Computing in a Commercial Environment. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:279-294 [Conf]
  13. Jong Youl Choi, Philippe Golle, Markus Jakobsson
    Auditable Privacy: On Tamper-Evident Mix Networks. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:126-141 [Conf]
  14. Philippe Golle
    A Private Stable Matching Algorithm. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:65-80 [Conf]
  15. Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle
    The Design and Implementation of Protocol-Based Hidden Key Recovery. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:165-179 [Conf]
  16. Philippe Golle
    Dealing Cards in Poker Games. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:506-511 [Conf]
  17. Philippe Golle, Daniel H. Greene, Jessica Staddon
    Detecting and correcting malicious data in VANETs. [Citation Graph (0, 0)][DBLP]
    Vehicular Ad Hoc Networks, 2004, pp:29-37 [Conf]
  18. Philippe Golle, Nagendra Modadugu
    Authenticating Streamed Data in the Presence of Random Packet Loss. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  19. Philippe Golle
    Reputable Mix Networks. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:51-62 [Conf]
  20. Philippe Golle, Kevin Leyton-Brown, Ilya Mironov
    Incentives for sharing in peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2001, pp:264-267 [Conf]
  21. Philippe Golle, XiaoFeng Wang, Markus Jakobsson, Alex Tsow
    Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:121-131 [Conf]
  22. Philippe Golle, David Wagner
    Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:66-70 [Conf]
  23. Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, Mark Lillibridge
    Incentives for Sharing in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    WELCOM, 2001, pp:75-87 [Conf]
  24. Philippe Golle, Ayman Farahat
    Defending email communication against profiling attacks. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:39-40 [Conf]
  25. Philippe Golle, Markus Jakobsson
    Reusable anonymous return channels. [Citation Graph (0, 0)][DBLP]
    WPES, 2003, pp:94-100 [Conf]
  26. Aleksandra Korolova, Ayman Farahat, Philippe Golle
    Enhancing the privacy of web-based communication. [Citation Graph (0, 0)][DBLP]
    WWW (Special interest tracks and posters), 2005, pp:1096-1097 [Conf]
  27. Philippe Golle, Nicolas Ducheneaut
    Preventing bots from playing online games. [Citation Graph (0, 0)][DBLP]
    Computers in Entertainment, 2005, v:3, n:3, pp:3- [Journal]
  28. Philippe Golle, Nicolas Ducheneaut
    Keeping bots out of online games. [Citation Graph (0, 0)][DBLP]
    Advances in Computer Entertainment Technology, 2005, pp:262-265 [Conf]

  29. Machine learning attacks against the Asirra CAPTCHA. [Citation Graph (, )][DBLP]

  30. On using existing time-use study data for ubiquitous computing applications. [Citation Graph (, )][DBLP]

  31. Detecting privacy leaks using corpus-based association rules. [Citation Graph (, )][DBLP]

  32. On the Anonymity of Home/Work Location Pairs. [Citation Graph (, )][DBLP]

  33. Making CAPTCHAs clickable. [Citation Graph (, )][DBLP]

  34. Private social network analysis: how to assemble pieces of a graph privately. [Citation Graph (, )][DBLP]

  35. Revisiting the uniqueness of simple demographics in the US population. [Citation Graph (, )][DBLP]

  36. Testable commitments. [Citation Graph (, )][DBLP]

  37. A content-driven access control system. [Citation Graph (, )][DBLP]

  38. Machine learning attacks against the Asirra CAPTCHA. [Citation Graph (, )][DBLP]

Search in 0.041secs, Finished in 0.042secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002