| 2008 | 
|---|
| 19 | EE | Jeremy Clark,
Urs Hengartner:
Panic Passwords: Authenticating under Duress.
HotSec 2008 | 
| 18 | EE | Ge Zhong,
Urs Hengartner:
Toward a distributed k-anonymity protocol for location privacy.
WPES 2008: 33-38 | 
| 2007 | 
|---|
| 17 | EE | Urs Hengartner:
Hiding Location Information from Location-Based Services.
MDM 2007: 268-272 | 
| 16 | EE | Urs Hengartner,
Ge Zhong:
Distributed, Uncertainty-Aware Access Control for Pervasive Computing.
PerCom Workshops 2007: 241-246 | 
| 15 | EE | Ge Zhong,
Ian Goldberg,
Urs Hengartner:
Louis, Lester and Pierre: Three Protocols for Location Privacy.
Privacy Enhancing Technologies 2007: 62-76 | 
| 2006 | 
|---|
| 14 | EE | Urs Hengartner,
Peter Steenkiste:
Avoiding Privacy Violations Caused by Context-Sensitive Services.
PerCom 2006: 222-233 | 
| 13 | EE | Urs Hengartner,
Peter Steenkiste:
Securing Information Gateways with Derivation-Constrained Access Control.
SPC 2006: 181-195 | 
| 12 | EE | Urs Hengartner,
Peter Steenkiste:
Exploiting information relationships for access control in pervasive computing.
Pervasive and Mobile Computing 2(3): 344-367 (2006) | 
| 11 | EE | Urs Hengartner,
Peter Steenkiste:
Avoiding privacy violations caused by context-sensitive services.
Pervasive and Mobile Computing 2(4): 427-452 (2006) | 
| 2005 | 
|---|
| 10 | EE | Urs Hengartner,
Peter Steenkiste:
Exploiting Information Relationships for Access Control.
PerCom 2005: 269-278 | 
| 9 | EE | Urs Hengartner,
Peter Steenkiste:
Access control to people location information.
ACM Trans. Inf. Syst. Secur. 8(4): 424-456 (2005) | 
| 2004 | 
|---|
| 8 | EE | Urs Hengartner,
Peter Steenkiste:
Implementing access control to people location information.
SACMAT 2004: 11-20 | 
| 2003 | 
|---|
| 7 |  | Urs Hengartner,
Peter Steenkiste:
Access Control to Information in Pervasive Computing Environments.
HotOS 2003: 157-162 | 
| 6 | EE | Urs Hengartner,
Peter Steenkiste:
Protecting Access to People Location Information.
SPC 2003: 25-38 | 
| 2002 | 
|---|
| 5 | EE | Urs Hengartner,
Sue B. Moon,
Richard Mortier,
Christophe Diot:
Detection and analysis of routing loops in packet traces.
Internet Measurement Workshop 2002: 107-112 | 
| 2001 | 
|---|
| 4 | EE | Andy Myers,
John Chuang,
Urs Hengartner,
Yinglian Xie,
Weiqiang Zhuang,
Hui Zhang:
A Secure, Publisher-Centric Web Caching Infrastructure.
INFOCOM 2001: 1235-1243 | 
| 2000 | 
|---|
| 3 | EE | Urs Hengartner,
Jürg Bolliger,
Thomas R. Gross:
TCP Vegas Revisited.
INFOCOM 2000: 1546-1555 | 
| 2 |  | Urs Hengartner,
Elisabeth Maier,
Christos Kefos,
Lutz Richter,
Reinhard Riedl,
Martina Klose,
Ulrike Lechner,
Olga Miler,
Beat Schmid:
Organization on intranet - An agent based approach.
IRMA Conference 2000: 316-319 | 
| 1999 | 
|---|
| 1 |  | Jürg Bolliger,
Thomas R. Gross,
Urs Hengartner:
Bandwidth Modeling for Network-Aware Applications.
INFOCOM 1999: 1300-1309 |