The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Apu Kapadia: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
    KNOW Why your access was denied: regulating feedback for usable security. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:52-61 [Conf]
  2. Apu Kapadia, Jalal Al-Muhtadi, Roy H. Campbell, M. Dennis Mickunas
    IRBAC 2000: Secure Interoperability Using Dynamic Role Translation. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2000, pp:231-238 [Conf]
  3. Jalal Al-Muhtadi, Roy H. Campbell, Apu Kapadia, M. Dennis Mickunas, Seung Yi
    Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2002, pp:74-83 [Conf]
  4. Apu Kapadia, Annette C. Feng, Wu-chun Feng
    The Effects of Inter-packet Spacing on the Delivery of Multimedia Content. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2001, pp:665-672 [Conf]
  5. Apu Kapadia, Prasad Naldurg, Roy H. Campbell
    Routing with Confidence: Supporting Discretionary Routing Requirements in Policy Based Networks. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:45-54 [Conf]
  6. Raquel Hill, Jalal Al-Muhtadi, Roy H. Campbell, Apu Kapadia, Prasad Naldurg, Anand Ranganathan
    A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2004, v:5, n:9, pp:- [Journal]
  7. Annette C. Feng, Apu Kapadia, Wu-chun Feng, Geneva G. Belford
    Packet Spacing: An Enabling Mechanism for Delivering Multimedia Content in Computational Grids. [Citation Graph (0, 0)][DBLP]
    The Journal of Supercomputing, 2002, v:23, n:1, pp:51-66 [Journal]
  8. Apu Kapadia, Tristan Henderson, Jeffrey J. Fielding, David Kotz
    Virtual Walls: Protecting Digital Privacy in Pervasive Environments. [Citation Graph (0, 0)][DBLP]
    Pervasive, 2007, pp:162-179 [Conf]
  9. Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, Sean W. Smith
    Nymble: Anonymous IP-Address Blocking. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:113-133 [Conf]
  10. Apu Kapadia, Prasad Naldurg, Roy H. Campbell
    Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:141-150 [Conf]

  11. Blacklistable anonymous credentials: blocking misbehaving users without ttps. [Citation Graph (, )][DBLP]


  12. PEREA: towards practical TTP-free revocation in anonymous authentication. [Citation Graph (, )][DBLP]


  13. Anonysense: privacy-aware people-centric sensing. [Citation Graph (, )][DBLP]


  14. Attribute-Based Publishing with Hidden Credentials and Hidden Policies. [Citation Graph (, )][DBLP]


  15. Halo: High-Assurance Locate for Distributed Hash Tables. [Citation Graph (, )][DBLP]


  16. AnonySense: Opportunistic and Privacy-Preserving Context Collection. [Citation Graph (, )][DBLP]


  17. TwoKind authentication: protecting private information in untrustworthy environments. [Citation Graph (, )][DBLP]


  18. TwoKind authentication: usable authenticators for untrustworthy environments. [Citation Graph (, )][DBLP]


  19. Towards Net-Centric Cyber Survivability for Ballistic Missile Defense. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002