Philippe Golle

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

39EEPhilippe Golle, Kurt Partridge: On the Anonymity of Home/Work Location Pairs. Pervasive 2009: 390-397
38EEPhilippe Golle: Machine learning attacks against the Asirra CAPTCHA. ACM Conference on Computer and Communications Security 2008: 535-542
37EEJessica Staddon, Philippe Golle, Martin Gagné, Paul Rasmussen: A content-driven access control system. IDtrust 2008: 26-35
36EERichard Chow, Philippe Golle, Jessica Staddon: Detecting privacy leaks using corpus-based association rules. KDD 2008: 893-901
35EEPhilippe Golle, Richard Chow, Jessica Staddon: Testable commitments. StorageSS 2008: 37-42
34EEKurt Partridge, Philippe Golle: On using existing time-use study data for ubiquitous computing applications. UbiComp 2008: 144-153
33EEPhilippe Golle, Frank McSherry, Ilya Mironov: Data Collection with Self-Enforcing Privacy. ACM Trans. Inf. Syst. Secur. 12(2): (2008)
32 Nikita Borisov, Philippe Golle: Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers Springer 2007
31EEPhilippe Golle, David Wagner: Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract). IEEE Symposium on Security and Privacy 2007: 66-70
30 George Danezis, Philippe Golle: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers Springer 2006
29EEPhilippe Golle, Frank McSherry, Ilya Mironov: Data collection with self-enforcing privacy. ACM Conference on Computer and Communications Security 2006: 69-78
28EEJong Youl Choi, Philippe Golle, Markus Jakobsson: Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware. DASC 2006: 37-44
27EEJong Youl Choi, Philippe Golle, Markus Jakobsson: Auditable Privacy: On Tamper-Evident Mix Networks. Financial Cryptography 2006: 126-141
26EEPhilippe Golle: A Private Stable Matching Algorithm. Financial Cryptography 2006: 65-80
25EEPhilippe Golle, XiaoFeng Wang, Markus Jakobsson, Alex Tsow: Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks. IEEE Symposium on Security and Privacy 2006: 121-131
24EEPhilippe Golle: Revisiting the uniqueness of simple demographics in the US population. WPES 2006: 77-80
23EEKeith B. Frikken, Philippe Golle: Private social network analysis: how to assemble pieces of a graph privately. WPES 2006: 89-98
22EEPhilippe Golle, Nicolas Ducheneaut: Keeping bots out of online games. Advances in Computer Entertainment Technology 2005: 262-265
21EEEu-Jin Goh, Philippe Golle: Event Driven Private Counters. Financial Cryptography 2005: 313-327
20EEPhilippe Golle: Dealing Cards in Poker Games. ITCC (1) 2005: 506-511
19EEAleksandra Korolova, Ayman Farahat, Philippe Golle: Enhancing the privacy of web-based communication. WWW (Special interest tracks and posters) 2005: 1096-1097
18EEPhilippe Golle, Nicolas Ducheneaut: Preventing bots from playing online games. Computers in Entertainment 3(3): 3 (2005)
17EEPhilippe Golle, Ari Juels: Parallel mixing. ACM Conference on Computer and Communications Security 2004: 220-226
16EEPhilippe Golle, Jessica Staddon, Brent R. Waters: Secure Conjunctive Keyword Search over Encrypted Data. ACNS 2004: 31-45
15EEPhilippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson: Universal Re-encryption for Mixnets. CT-RSA 2004: 163-178
14EEPhilippe Golle, Ari Juels: Dining Cryptographers Revisited. EUROCRYPT 2004: 456-473
13EEPhilippe Golle: Reputable Mix Networks. Privacy Enhancing Technologies 2004: 51-62
12EEPhilippe Golle, Daniel H. Greene, Jessica Staddon: Detecting and correcting malicious data in VANETs. Vehicular Ad Hoc Networks 2004: 29-37
11EEPhilippe Golle, Ayman Farahat: Defending email communication against profiling attacks. WPES 2004: 39-40
10EEEu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle: The Design and Implementation of Protocol-Based Hidden Key Recovery. ISC 2003: 165-179
9EEPhilippe Golle, Markus Jakobsson: Reusable anonymous return channels. WPES 2003: 94-100
8EEDan Boneh, Philippe Golle: Almost entirely correct mixing with applications to voting. ACM Conference on Computer and Communications Security 2002: 68-77
7EEPhilippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels: Optimistic Mixing for Exit-Polls. ASIACRYPT 2002: 451-465
6EEPhilippe Golle, Stanislaw Jarecki, Ilya Mironov: Cryptographic Primitives Enforcing Communication and Storage Complexity. Financial Cryptography 2002: 120-135
5EEPhilippe Golle, Kevin Leyton-Brown, Ilya Mironov: Incentives for sharing in peer-to-peer networks. ACM Conference on Electronic Commerce 2001: 264-267
4EEPhilippe Golle, Ilya Mironov: Uncheatable Distributed Computations. CT-RSA 2001: 425-440
3EEPhilippe Golle, Stuart G. Stubblebine: Secure Distributed Computing in a Commercial Environment. Financial Cryptography 2001: 279-294
2EEPhilippe Golle, Nagendra Modadugu: Authenticating Streamed Data in the Presence of Random Packet Loss. NDSS 2001
1EEPhilippe Golle, Kevin Leyton-Brown, Ilya Mironov, Mark Lillibridge: Incentives for Sharing in Peer-to-Peer Networks. WELCOM 2001: 75-87

Coauthor Index

1Dan Boneh [7] [8] [10]
2Nikita Borisov [32]
3Jong Youl Choi [27] [28]
4Richard Chow [35] [36]
5George Danezis [30]
6Nicolas Ducheneaut [18] [22]
7Ayman Farahat (A. O. Farahat) [11] [19]
8Keith B. Frikken [23]
9Martin Gagné [37]
10Eu-Jin Goh [10] [21]
11Daniel H. Greene [12]
12Markus Jakobsson [7] [9] [15] [25] [27] [28]
13Stanislaw Jarecki [6]
14Ari Juels [7] [14] [15] [17]
15Aleksandra Korolova [19]
16Kevin Leyton-Brown [1] [5]
17Mark Lillibridge [1]
18Frank McSherry [29] [33]
19Ilya Mironov [1] [4] [5] [6] [29] [33]
20Nagendra Modadugu [2]
21Kurt Partridge [34] [39]
22Benny Pinkas [10]
23Paul Rasmussen [37]
24Jessica Staddon [12] [16] [35] [36] [37]
25Stuart G. Stubblebine [3]
26Paul F. Syverson [15]
27Alex Tsow [25]
28David Wagner [31]
29XiaoFeng Wang [25]
30Brent Waters (Brent R. Waters) [16]
31Sheng Zhong [7]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)