|
Search the dblp DataBase
Jessica Staddon:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Philippe Golle, Jessica Staddon, Brent R. Waters
Secure Conjunctive Keyword Search over Encrypted Data. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:31-45 [Conf]
- Alice Silverberg, Jessica Staddon, Judy L. Walker
Efficient Traitor Tracing Algorithms Using List Decoding. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2001, pp:175-192 [Conf]
- Robert Johnson, Jessica Staddon
FAIR: Fair Audience InfeRence. [Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2002, pp:190-207 [Conf]
- David P. Woodruff, Jessica Staddon
Private inference control. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:188-197 [Conf]
- Eli Gafni, Jessica Staddon, Yiqun Lisa Yin
Efficient Methods for Integrating Traceability and Broadcast Encryption. [Citation Graph (0, 0)][DBLP] CRYPTO, 1999, pp:372-387 [Conf]
- Juan A. Garay, Jessica Staddon, Avishai Wool
Long-Lived Broadcast Encryption. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:333-352 [Conf]
- Jessica Staddon
Dynamic inference control. [Citation Graph (0, 0)][DBLP] DMKD, 2003, pp:94-100 [Conf]
- Michael Luby, Jessica Staddon
Combinatorial Bounds for Broadcast Encryption. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1998, pp:512-526 [Conf]
- Philippe Golle, Daniel H. Greene, Jessica Staddon
Detecting and correcting malicious data in VANETs. [Citation Graph (0, 0)][DBLP] Vehicular Ad Hoc Networks, 2004, pp:29-37 [Conf]
- Jessica Staddon, Dirk Balfanz, Glenn Durfee
Efficient tracing of failed nodes in sensor networks. [Citation Graph (0, 0)][DBLP] WSNA, 2002, pp:122-130 [Conf]
- Mihir Bellare, Alexandra Boldyreva, Jessica Staddon
Randomness Re-use in Multi-recipient Encryption Schemeas. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2003, pp:85-99 [Conf]
- Alexandr Andoni, Jessica Staddon
Graceful service degradation (or, how to know your payment is late). [Citation Graph (0, 0)][DBLP] ACM Conference on Electronic Commerce, 2005, pp:9-18 [Conf]
- Dirk Balfanz, Glenn Durfee, Narendar Shankar, Diana K. Smetters, Jessica Staddon, Hao-Chi Wong
Secret Handshakes from Pairing-Based Key Agreements. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:180-196 [Conf]
- Sara K. Miner, Jessica Staddon
Graph-Based Authentication of Digital Streams. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2001, pp:232-246 [Conf]
- Jessica Staddon, Sara K. Miner, Matthew K. Franklin, Dirk Balfanz, Michael Malkin, Drew Dean
Self-Healing Key Distribution with Revocation. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2002, pp:241-257 [Conf]
- Alice Silverberg, Jessica Staddon, Judy L. Walker
Applications of list decoding to tracing traitors. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2003, v:49, n:5, pp:1312-1318 [Journal]
- Jessica Staddon, Douglas R. Stinson, Ruizhong Wei
Combinatorial properties of frameproof and traceability codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2001, v:47, n:3, pp:1042-1049 [Journal]
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy. [Citation Graph (, )][DBLP]
Detecting reviewer bias through web-based association mining. [Citation Graph (, )][DBLP]
Detecting privacy leaks using corpus-based association rules. [Citation Graph (, )][DBLP]
Testable commitments. [Citation Graph (, )][DBLP]
A content-driven access control system. [Citation Graph (, )][DBLP]
Sanitization's slippery slope: the design and study of a text revision assistant. [Citation Graph (, )][DBLP]
Search in 0.036secs, Finished in 0.037secs
|