The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Elaine Shi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. James Newsome, Elaine Shi, Dawn Xiaodong Song, Adrian Perrig
    The sybil attack in sensor networks: analysis & defenses. [Citation Graph (0, 0)][DBLP]
    IPSN, 2004, pp:259-268 [Conf]
  2. Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla
    Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. [Citation Graph (0, 0)][DBLP]
    SOSP, 2005, pp:1-16 [Conf]
  3. Jonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter
    Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:64-78 [Conf]
  4. Elaine Shi, Adrian Perrig, Leendert van Doorn
    BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:154-168 [Conf]
  5. Elaine Shi, John Bethencourt, Hubert T.-H. Chan, Dawn Xiaodong Song, Adrian Perrig
    Multi-Dimensional Range Query over Encrypted Data. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:350-364 [Conf]
  6. Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu
    Portcullis: protecting connection setup from denial-of-capability attacks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:289-300 [Conf]

  7. Signatures of Reputation. [Citation Graph (, )][DBLP]


  8. Delegating Capabilities in Predicate Encryption Systems. [Citation Graph (, )][DBLP]


  9. Private and Continual Release of Statistics. [Citation Graph (, )][DBLP]


  10. Predicate Privacy in Encryption Systems. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002