The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jessica Staddon: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Philippe Golle, Jessica Staddon, Brent R. Waters
    Secure Conjunctive Keyword Search over Encrypted Data. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:31-45 [Conf]
  2. Alice Silverberg, Jessica Staddon, Judy L. Walker
    Efficient Traitor Tracing Algorithms Using List Decoding. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:175-192 [Conf]
  3. Robert Johnson, Jessica Staddon
    FAIR: Fair Audience InfeRence. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:190-207 [Conf]
  4. David P. Woodruff, Jessica Staddon
    Private inference control. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:188-197 [Conf]
  5. Eli Gafni, Jessica Staddon, Yiqun Lisa Yin
    Efficient Methods for Integrating Traceability and Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:372-387 [Conf]
  6. Juan A. Garay, Jessica Staddon, Avishai Wool
    Long-Lived Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:333-352 [Conf]
  7. Jessica Staddon
    Dynamic inference control. [Citation Graph (0, 0)][DBLP]
    DMKD, 2003, pp:94-100 [Conf]
  8. Michael Luby, Jessica Staddon
    Combinatorial Bounds for Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:512-526 [Conf]
  9. Philippe Golle, Daniel H. Greene, Jessica Staddon
    Detecting and correcting malicious data in VANETs. [Citation Graph (0, 0)][DBLP]
    Vehicular Ad Hoc Networks, 2004, pp:29-37 [Conf]
  10. Jessica Staddon, Dirk Balfanz, Glenn Durfee
    Efficient tracing of failed nodes in sensor networks. [Citation Graph (0, 0)][DBLP]
    WSNA, 2002, pp:122-130 [Conf]
  11. Mihir Bellare, Alexandra Boldyreva, Jessica Staddon
    Randomness Re-use in Multi-recipient Encryption Schemeas. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:85-99 [Conf]
  12. Alexandr Andoni, Jessica Staddon
    Graceful service degradation (or, how to know your payment is late). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2005, pp:9-18 [Conf]
  13. Dirk Balfanz, Glenn Durfee, Narendar Shankar, Diana K. Smetters, Jessica Staddon, Hao-Chi Wong
    Secret Handshakes from Pairing-Based Key Agreements. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:180-196 [Conf]
  14. Sara K. Miner, Jessica Staddon
    Graph-Based Authentication of Digital Streams. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:232-246 [Conf]
  15. Jessica Staddon, Sara K. Miner, Matthew K. Franklin, Dirk Balfanz, Michael Malkin, Drew Dean
    Self-Healing Key Distribution with Revocation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:241-257 [Conf]
  16. Alice Silverberg, Jessica Staddon, Judy L. Walker
    Applications of list decoding to tracing traitors. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:5, pp:1312-1318 [Journal]
  17. Jessica Staddon, Douglas R. Stinson, Ruizhong Wei
    Combinatorial properties of frameproof and traceability codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:3, pp:1042-1049 [Journal]

  18. Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy. [Citation Graph (, )][DBLP]


  19. Detecting reviewer bias through web-based association mining. [Citation Graph (, )][DBLP]


  20. Detecting privacy leaks using corpus-based association rules. [Citation Graph (, )][DBLP]


  21. Testable commitments. [Citation Graph (, )][DBLP]


  22. A content-driven access control system. [Citation Graph (, )][DBLP]


  23. Sanitization's slippery slope: the design and study of a text revision assistant. [Citation Graph (, )][DBLP]


Search in 0.024secs, Finished in 0.025secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002