2008 |
23 | | Dirk Balfanz,
Jessica Staddon:
Proceedings of the 1st ACM Workshop on AISec, AISec 2008, Alexandria, VA, USA, October 27, 2008
ACM 2008 |
22 | EE | Jessica Staddon,
Philippe Golle,
Martin Gagné,
Paul Rasmussen:
A content-driven access control system.
IDtrust 2008: 26-35 |
21 | EE | Richard Chow,
Philippe Golle,
Jessica Staddon:
Detecting privacy leaks using corpus-based association rules.
KDD 2008: 893-901 |
20 | EE | Philippe Golle,
Richard Chow,
Jessica Staddon:
Testable commitments.
StorageSS 2008: 37-42 |
19 | EE | Jessica Staddon,
Richard Chow:
Detecting reviewer bias through web-based association mining.
WICOW 2008: 5-10 |
2007 |
18 | EE | Mihir Bellare,
Alexandra Boldyreva,
K. Kurosawa,
Jessica Staddon:
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security.
IEEE Transactions on Information Theory 53(11): 3927-3943 (2007) |
2005 |
17 | EE | Alexandr Andoni,
Jessica Staddon:
Graceful service degradation (or, how to know your payment is late).
ACM Conference on Electronic Commerce 2005: 9-18 |
2004 |
16 | EE | David P. Woodruff,
Jessica Staddon:
Private inference control.
ACM Conference on Computer and Communications Security 2004: 188-197 |
15 | EE | Philippe Golle,
Jessica Staddon,
Brent R. Waters:
Secure Conjunctive Keyword Search over Encrypted Data.
ACNS 2004: 31-45 |
14 | EE | Philippe Golle,
Daniel H. Greene,
Jessica Staddon:
Detecting and correcting malicious data in VANETs.
Vehicular Ad Hoc Networks 2004: 29-37 |
2003 |
13 | EE | Jessica Staddon:
Dynamic inference control.
DMKD 2003: 94-100 |
12 | EE | Dirk Balfanz,
Glenn Durfee,
Narendar Shankar,
Diana K. Smetters,
Jessica Staddon,
Hao-Chi Wong:
Secret Handshakes from Pairing-Based Key Agreements.
IEEE Symposium on Security and Privacy 2003: 180-196 |
11 | EE | Mihir Bellare,
Alexandra Boldyreva,
Jessica Staddon:
Randomness Re-use in Multi-recipient Encryption Schemeas.
Public Key Cryptography 2003: 85-99 |
10 | | Alice Silverberg,
Jessica Staddon,
Judy L. Walker:
Applications of list decoding to tracing traitors.
IEEE Transactions on Information Theory 49(5): 1312-1318 (2003) |
2002 |
9 | EE | Robert Johnson,
Jessica Staddon:
FAIR: Fair Audience InfeRence.
Digital Rights Management Workshop 2002: 190-207 |
8 | EE | Jessica Staddon,
Sara K. Miner,
Matthew K. Franklin,
Dirk Balfanz,
Michael Malkin,
Drew Dean:
Self-Healing Key Distribution with Revocation.
IEEE Symposium on Security and Privacy 2002: 241-257 |
7 | EE | Jessica Staddon,
Dirk Balfanz,
Glenn Durfee:
Efficient tracing of failed nodes in sensor networks.
WSNA 2002: 122-130 |
2001 |
6 | EE | Alice Silverberg,
Jessica Staddon,
Judy L. Walker:
Efficient Traitor Tracing Algorithms Using List Decoding.
ASIACRYPT 2001: 175-192 |
5 | EE | Sara K. Miner,
Jessica Staddon:
Graph-Based Authentication of Digital Streams.
IEEE Symposium on Security and Privacy 2001: 232-246 |
4 | | Jessica Staddon,
Douglas R. Stinson,
Ruizhong Wei:
Combinatorial properties of frameproof and traceability codes.
IEEE Transactions on Information Theory 47(3): 1042-1049 (2001) |
2000 |
3 | EE | Juan A. Garay,
Jessica Staddon,
Avishai Wool:
Long-Lived Broadcast Encryption.
CRYPTO 2000: 333-352 |
1999 |
2 | EE | Eli Gafni,
Jessica Staddon,
Yiqun Lisa Yin:
Efficient Methods for Integrating Traceability and Broadcast Encryption.
CRYPTO 1999: 372-387 |
1998 |
1 | EE | Michael Luby,
Jessica Staddon:
Combinatorial Bounds for Broadcast Encryption.
EUROCRYPT 1998: 512-526 |