2009 |
13 | EE | Collin Jackson,
Adam Barth,
Andrew Bortz,
Weidong Shao,
Dan Boneh:
Protecting browsers from DNS rebinding attacks.
TWEB 3(1): 2 (2009) |
2008 |
12 | EE | Adam Barth,
Collin Jackson,
John C. Mitchell:
Robust defenses for cross-site request forgery.
ACM Conference on Computer and Communications Security 2008: 75-88 |
11 | EE | Adam Barth,
Collin Jackson,
John C. Mitchell:
Securing Frame Communication in Browsers.
USENIX Security Symposium 2008: 17-30 |
10 | EE | Collin Jackson,
Adam Barth:
Forcehttps: protecting high-security web sites from network attacks.
WWW 2008: 525-534 |
2007 |
9 | EE | Collin Jackson,
Adam Barth,
Andrew Bortz,
Weidong Shao,
Dan Boneh:
Protecting browsers from dns rebinding attacks.
ACM Conference on Computer and Communications Security 2007: 421-431 |
8 | EE | Adam Barth,
John C. Mitchell,
Anupam Datta,
Sharada Sundaram:
Privacy and Utility in Business Processes.
CSF 2007: 279-294 |
7 | EE | Collin Jackson,
Daniel R. Simon,
Desney S. Tan,
Adam Barth:
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks.
Financial Cryptography 2007: 281-293 |
2006 |
6 | EE | Adam Barth,
Dan Boneh,
Brent Waters:
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption.
Financial Cryptography 2006: 52-64 |
5 | EE | Adam Barth,
Anupam Datta,
John C. Mitchell,
Helen Nissenbaum:
Privacy and Contextual Integrity: Framework and Applications.
IEEE Symposium on Security and Privacy 2006: 184-198 |
4 | EE | Adam Barth,
John C. Mitchell:
Managing Digital Rights using Linear Logic.
LICS 2006: 127-136 |
2005 |
3 | EE | Adam Barth,
John C. Mitchell:
Enterprise privacy promises and enforcement.
WITS 2005: 58-66 |
2 | EE | Bennett Wilburn,
Neel Joshi,
Vaibhav Vaish,
Eino-Ville Talvala,
Emilio R. Antúnez,
Adam Barth,
Andrew Adams,
Mark Horowitz,
Marc Levoy:
High performance imaging using large camera arrays.
ACM Trans. Graph. 24(3): 765-776 (2005) |
2004 |
1 | EE | Adam Barth,
John C. Mitchell,
Justin Rosenstein:
Conflict and combination in privacy policy languages.
WPES 2004: 45-46 |