Publications

Export 7 results:
[ Author(Desc)] Title Type Year
Filters: Keyword is data privacy  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Condon E, Cummins E, Afoulki Z, Cukier M.  2011.  How secure are networked office devices? :465-472.
P
Pillai JK, Patel VM, Chellappa R, Ratha NK.  2010.  Sectored Random Projections for Cancelable Iris Biometrics. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1838-1841.
S
Sherwood R, Bhattacharjee B, Srinivasan A.  2002.  P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
Elaine Shi, Bethencourt J, Chan T-HH, Song D, Perrig A.  2007.  Multi-Dimensional Range Query over Encrypted Data. :350-364.
Shneiderman B.  2007.  Human Responsibility for Autonomous Agents. IEEE Intelligent Systems. 22(2):60-61.
Studer A, Elaine Shi, Bai F, Perrig A.  2009.  TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs. :1-9.