Year |
Citation |
Score |
2018 |
Huguenin K, Bilogrevic I, Machado JS, Mihaila S, Shokri R, Dacosta I, Hubaux J. A Predictive Model for User Motivation and Utility Implications of Privacy-Protection Mechanisms in Location Check-Ins Ieee Transactions On Mobile Computing. 17: 760-774. DOI: 10.1109/Tmc.2017.2741958 |
0.366 |
|
2016 |
Pham A, Huguenin K, Bilogrevic I, Dacosta I, Hubaux JP. SecureRun: Cheat-Proof and Private Summaries for Location-Based Activities Ieee Transactions On Mobile Computing. 15: 2109-2123. DOI: 10.1109/Tmc.2015.2483498 |
0.424 |
|
2015 |
Milutinovic M, Dacosta I, Put A, De Decker B. UCentive: An efficient, anonymous and unlinkable incentives scheme Proceedings - 14th Ieee International Conference On Trust, Security and Privacy in Computing and Communications, Trustcom 2015. 1: 588-595. DOI: 10.1109/Trustcom.2015.423 |
0.306 |
|
2014 |
Dacosta I, Put A, De Decker B. EmailCloak: A practical and flexible approach to improve email privacy Proceedings - 9th International Conference On Availability, Reliability and Security, Ares 2014. 242-250. DOI: 10.1109/ARES.2014.39 |
0.345 |
|
2014 |
Carter H, Amrutkar C, Dacosta I, Traynor P. For your phone only: Custom protocols for efficient secure function evaluation on mobile devices Security and Communication Networks. 7: 1165-1176. DOI: 10.1002/Sec.851 |
0.501 |
|
2012 |
Dacosta I, Chakradeo S, Ahamad M, Traynor P. One-time cookies: Preventing session hijacking attacks with stateless authentication tokens Acm Transactions On Internet Technology. 12. DOI: 10.1145/2220352.2220353 |
0.687 |
|
2012 |
Dacosta I, Ahamad M, Traynor P. Trust no one else: Detecting MITM attacks against SSL/TLS without third-parties Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 199-216. DOI: 10.1007/978-3-642-33167-1_12 |
0.636 |
|
2011 |
Dacosta I, Balasubramaniyan V, Ahamad M, Traynor P. Improving aquthentication performance of distributed SIP proxies Ieee Transactions On Parallel and Distributed Systems. 22: 1804-1812. DOI: 10.1109/Tpds.2011.62 |
0.53 |
|
2009 |
Dacosta I, Balasubramaniyan V, Ahamad M, Traynor P. Improving authentication performance of distributed SIP proxies Iptcomm 2009: Services and Security For Next Generation Networks - Proceedings of the 3rd International Conference On Principles, Systems and Applications of Ip Telecommunications. DOI: 10.1145/1595637.1595639 |
0.754 |
|
2008 |
Balasubramaniyan VA, Acharya A, Ahamad M, Srivatsa M, Dacosta I, Wright CP. SERvartuka: Dynamic distribution of state to improve SIP server scalability Proceedings - the 28th International Conference On Distributed Computing Systems, Icdcs 2008. 562-572. DOI: 10.1109/ICDCS.2008.42 |
0.527 |
|
2008 |
Dacosta I, Mehta N, Metrock E, Giffin J. Security analysis of an IP phone: Cisco 7960G Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5310: 236-255. DOI: 10.1007/978-3-540-89054-6-12 |
0.337 |
|
Show low-probability matches. |