The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

William Enck: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wesam Lootah, William Enck, Patrick McDaniel
    TARP: Ticket-based Address Resolution Protocol. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:106-116 [Conf]
  2. William Enck, Patrick Traynor, Patrick McDaniel, Thomas F. La Porta
    Exploiting open functionality in SMS-capable cellular networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:393-404 [Conf]
  3. Kevin R. B. Butler, William Enck, Jennifer Plasterr, Patrick Traynor, Patrick McDaniel
    Privacy Preserving Web-Based Email. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:116-131 [Conf]
  4. Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger
    Password Exhaustion: Predicting the End of Password Usefulness. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:37-55 [Conf]
  5. Patrick Traynor, William Enck, Patrick McDaniel, Thomas F. La Porta
    Mitigating attacks on open functionality in SMS-capable cellular networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2006, pp:182-193 [Conf]
  6. Heesook Choi, William Enck, Jaesheung Shin, Patrick McDaniel, Thomas F. La Porta
    Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2005, pp:12-21 [Conf]
  7. Hosam Rowaihy, William Enck, Patrick McDaniel, Tom La Porta
    Limiting Sybil Attacks in Structured P2P Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:2596-2600 [Conf]
  8. Wesam Lootah, William Enck, Patrick McDaniel
    TARP: Ticket-based address resolution protocol. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:15, pp:4322-4337 [Journal]

  9. PinUP: Pinning User Files to Known Applications. [Citation Graph (, )][DBLP]


  10. Defending Against Attacks on Main Memory Persistence. [Citation Graph (, )][DBLP]


  11. Semantically Rich Application-Centric Security in Android. [Citation Graph (, )][DBLP]


  12. Protecting users from "themselves". [Citation Graph (, )][DBLP]


  13. On lightweight mobile phone application certification. [Citation Graph (, )][DBLP]


  14. Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. [Citation Graph (, )][DBLP]


  15. Configuration Management at Massive Scale: System Design and Experience. [Citation Graph (, )][DBLP]


  16. Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002