dblp.uni-trier.dewww.uni-trier.de

Adam Barth

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
13EECollin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh: Protecting browsers from DNS rebinding attacks. TWEB 3(1): 2 (2009)
2008
12EEAdam Barth, Collin Jackson, John C. Mitchell: Robust defenses for cross-site request forgery. ACM Conference on Computer and Communications Security 2008: 75-88
11EEAdam Barth, Collin Jackson, John C. Mitchell: Securing Frame Communication in Browsers. USENIX Security Symposium 2008: 17-30
10EECollin Jackson, Adam Barth: Forcehttps: protecting high-security web sites from network attacks. WWW 2008: 525-534
2007
9EECollin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh: Protecting browsers from dns rebinding attacks. ACM Conference on Computer and Communications Security 2007: 421-431
8EEAdam Barth, John C. Mitchell, Anupam Datta, Sharada Sundaram: Privacy and Utility in Business Processes. CSF 2007: 279-294
7EECollin Jackson, Daniel R. Simon, Desney S. Tan, Adam Barth: An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. Financial Cryptography 2007: 281-293
2006
6EEAdam Barth, Dan Boneh, Brent Waters: Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. Financial Cryptography 2006: 52-64
5EEAdam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum: Privacy and Contextual Integrity: Framework and Applications. IEEE Symposium on Security and Privacy 2006: 184-198
4EEAdam Barth, John C. Mitchell: Managing Digital Rights using Linear Logic. LICS 2006: 127-136
2005
3EEAdam Barth, John C. Mitchell: Enterprise privacy promises and enforcement. WITS 2005: 58-66
2EEBennett Wilburn, Neel Joshi, Vaibhav Vaish, Eino-Ville Talvala, Emilio R. Antúnez, Adam Barth, Andrew Adams, Mark Horowitz, Marc Levoy: High performance imaging using large camera arrays. ACM Trans. Graph. 24(3): 765-776 (2005)
2004
1EEAdam Barth, John C. Mitchell, Justin Rosenstein: Conflict and combination in privacy policy languages. WPES 2004: 45-46

Coauthor Index

1Andrew Adams [2]
2Emilio R. Antúnez [2]
3Dan Boneh [6] [9] [13]
4Andrew Bortz [9] [13]
5Anupam Datta [5] [8]
6Mark Horowitz [2]
7Collin Jackson [7] [9] [10] [11] [12] [13]
8Neel Joshi [2]
9Marc Levoy [2]
10John C. Mitchell [1] [3] [4] [5] [8] [11] [12]
11Helen Nissenbaum [5]
12Justin Rosenstein [1]
13Weidong Shao [9] [13]
14Daniel R. Simon [7]
15Sharada Sundaram [8]
16Eino-Ville Talvala [2]
17Desney S. Tan [7]
18Vaibhav Vaish [2]
19Brent Waters (Brent R. Waters) [6]
20Bennett Wilburn [2]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)