| 2008 |
| 19 | EE | Jeremy Clark,
Urs Hengartner:
Panic Passwords: Authenticating under Duress.
HotSec 2008 |
| 18 | EE | Ge Zhong,
Urs Hengartner:
Toward a distributed k-anonymity protocol for location privacy.
WPES 2008: 33-38 |
| 2007 |
| 17 | EE | Urs Hengartner:
Hiding Location Information from Location-Based Services.
MDM 2007: 268-272 |
| 16 | EE | Urs Hengartner,
Ge Zhong:
Distributed, Uncertainty-Aware Access Control for Pervasive Computing.
PerCom Workshops 2007: 241-246 |
| 15 | EE | Ge Zhong,
Ian Goldberg,
Urs Hengartner:
Louis, Lester and Pierre: Three Protocols for Location Privacy.
Privacy Enhancing Technologies 2007: 62-76 |
| 2006 |
| 14 | EE | Urs Hengartner,
Peter Steenkiste:
Avoiding Privacy Violations Caused by Context-Sensitive Services.
PerCom 2006: 222-233 |
| 13 | EE | Urs Hengartner,
Peter Steenkiste:
Securing Information Gateways with Derivation-Constrained Access Control.
SPC 2006: 181-195 |
| 12 | EE | Urs Hengartner,
Peter Steenkiste:
Exploiting information relationships for access control in pervasive computing.
Pervasive and Mobile Computing 2(3): 344-367 (2006) |
| 11 | EE | Urs Hengartner,
Peter Steenkiste:
Avoiding privacy violations caused by context-sensitive services.
Pervasive and Mobile Computing 2(4): 427-452 (2006) |
| 2005 |
| 10 | EE | Urs Hengartner,
Peter Steenkiste:
Exploiting Information Relationships for Access Control.
PerCom 2005: 269-278 |
| 9 | EE | Urs Hengartner,
Peter Steenkiste:
Access control to people location information.
ACM Trans. Inf. Syst. Secur. 8(4): 424-456 (2005) |
| 2004 |
| 8 | EE | Urs Hengartner,
Peter Steenkiste:
Implementing access control to people location information.
SACMAT 2004: 11-20 |
| 2003 |
| 7 | | Urs Hengartner,
Peter Steenkiste:
Access Control to Information in Pervasive Computing Environments.
HotOS 2003: 157-162 |
| 6 | EE | Urs Hengartner,
Peter Steenkiste:
Protecting Access to People Location Information.
SPC 2003: 25-38 |
| 2002 |
| 5 | EE | Urs Hengartner,
Sue B. Moon,
Richard Mortier,
Christophe Diot:
Detection and analysis of routing loops in packet traces.
Internet Measurement Workshop 2002: 107-112 |
| 2001 |
| 4 | EE | Andy Myers,
John Chuang,
Urs Hengartner,
Yinglian Xie,
Weiqiang Zhuang,
Hui Zhang:
A Secure, Publisher-Centric Web Caching Infrastructure.
INFOCOM 2001: 1235-1243 |
| 2000 |
| 3 | EE | Urs Hengartner,
Jürg Bolliger,
Thomas R. Gross:
TCP Vegas Revisited.
INFOCOM 2000: 1546-1555 |
| 2 | | Urs Hengartner,
Elisabeth Maier,
Christos Kefos,
Lutz Richter,
Reinhard Riedl,
Martina Klose,
Ulrike Lechner,
Olga Miler,
Beat Schmid:
Organization on intranet - An agent based approach.
IRMA Conference 2000: 316-319 |
| 1999 |
| 1 | | Jürg Bolliger,
Thomas R. Gross,
Urs Hengartner:
Bandwidth Modeling for Network-Aware Applications.
INFOCOM 1999: 1300-1309 |