Facecloak: An architecture for user privacy on social networking sites W Luo, Q Xie, U Hengartner 2009 international conference on computational science and engineering 3, 26-33, 2009 | 278 | 2009 |
Louis, lester and pierre: Three protocols for location privacy G Zhong, I Goldberg, U Hengartner International Workshop on Privacy Enhancing Technologies, 62-76, 2007 | 274 | 2007 |
TCP Vegas revisited U Hengartner, J Bolliger, T Gross Proceedings IEEE INFOCOM 2000. Conference on Computer Communications …, 2000 | 228 | 2000 |
Anonymity and security in delay tolerant networks A Kate, GM Zaverucha, U Hengartner Security and Privacy in Communications Networks and the Workshops, 2007 …, 2007 | 213 | 2007 |
Detection and analysis of routing loops in packet traces U Hengartner, S Moon, R Mortier, C Diot Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, 107-112, 2002 | 162 | 2002 |
VeriPlace: a privacy-aware location proof architecture W Luo, U Hengartner Proceedings of the 18th SIGSPATIAL International Conference on Advances in …, 2010 | 147 | 2010 |
Protecting access to people location information U Hengartner, P Steenkiste Security in Pervasive Computing: First International Conference, Boppard …, 2004 | 146 | 2004 |
Protecting people location information U Hengartner, P Steenkiste Proceedings of Workshop on Security in Ubiquitous Computing. Goteborg, Sweden, 2002 | 146* | 2002 |
Achieving efficient query privacy for location based services F Olumofin, PK Tysowski, I Goldberg, U Hengartner International Symposium on Privacy Enhancing Technologies Symposium, 93-110, 2010 | 138 | 2010 |
PrivacyGuard: A VPN-based Platform to Detect Information Leakage on Android Devices Y Song, U Hengartner Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015 | 125 | 2015 |
Itus: an implicit authentication framework for android H Khan, A Atwater, U Hengartner Proceedings of the 20th annual international conference on Mobile computing …, 2014 | 110 | 2014 |
Privacy-preserving processing of raw genomic data E Ayday, JL Raisaro, U Hengartner, A Molyneaux, JP Hubaux Proceedings of 8th Data Privacy Management (DPM 2013) International Workshop …, 2013 | 107 | 2013 |
Selections: Internet voting with over-the-shoulder coercion-resistance J Clark, U Hengartner International Conference on Financial Cryptography and Data Security, 47-61, 2011 | 106 | 2011 |
A distributed k-anonymity protocol for location privacy G Zhong, U Hengartner Pervasive Computing and Communications, 2009. PerCom 2009. IEEE …, 2009 | 105 | 2009 |
Implementing access control to people location information U Hengartner, P Steenkiste Proceedings of the ninth ACM symposium on Access control models and …, 2004 | 101 | 2004 |
MPEG system streams in best-effort networks M Hemy, U Hengartner, P Steenkiste, T Gross Proc. Packet Video Workshop 99, 1999 | 101 | 1999 |
Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying H Khan, U Hengartner, D Vogel Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 2015 | 96 | 2015 |
Proving your location without giving up your privacy W Luo, U Hengartner Proceedings of the Eleventh Workshop on Mobile Computing Systems …, 2010 | 88 | 2010 |
Privacy-preserving matchmaking For mobile social networking secure against malicious users Q Xie, U Hengartner Privacy, Security and Trust (PST), 2011 Ninth Annual International …, 2011 | 85 | 2011 |
Towards application-centric implicit authentication on smartphones H Khan, U Hengartner Proceedings of the 15th Workshop on Mobile Computing Systems and …, 2014 | 84 | 2014 |