Bogdan Carbunar

According to our database1, Bogdan Carbunar authored at least 87 papers between 2001 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Tithonus: A Bitcoin Based Censorship Resilient System.
PoPETs, 2019

Private and Atomic Exchange of Assets over Zero Knowledge Based Payment Ledger.
CoRR, 2019

The Art and Craft of Fraudulent App Promotion in Google Play.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
AbuSniff: Automatic Detection and Defenses Against Abusive Facebook Friends.
Proceedings of the Twelfth International Conference on Web and Social Media, 2018

Search Rank Fraud De-Anonymization in Online Systems.
Proceedings of the 29th on Hypertext and Social Media, 2018

CipherLocker: Encrypted File Sharing with Ranked Search https: //cipherlocker.com.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Fraud De-Anonymization for Fun and Profit.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Video Liveness for Citizen Journalism: Attacks and Defenses.
IEEE Trans. Mob. Comput., 2017

Search Rank Fraud and Malware Detection in Google Play.
IEEE Trans. Knowl. Data Eng., 2017

A Longitudinal Study of Google Play.
IEEE Trans. Comput. Social Systems, 2017

Hardening Stratum, the Bitcoin Pool Mining Protocol.
PoPETs, 2017

Camera Based Two Factor Authentication Through Mobile and Wearable Devices.
IMWUT, 2017

Resilient Design of Networked Control Systems Under Time Delay Switch Attacks, Application in Smart Grid.
IEEE Access, 2017

When Friend Becomes Abuser: Evidence of Friend Abuse in Facebook.
Proceedings of the 2017 ACM on Web Science Conference, 2017

Stateless Puzzles for Real Time Online Fraud Preemption.
Proceedings of the 2017 ACM on Web Science Conference, 2017

A Secure Mobile Authentication Alternative to Biometrics.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Movee: Video Liveness Verification for Mobile Devices Using Built-In Motion Sensors.
IEEE Trans. Mob. Comput., 2016

Secure Management of Low Power Fitness Trackers.
IEEE Trans. Mob. Comput., 2016

GeoPal: Friend Spam Detection in Social Networks Using Private Location Proofs.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

FairPlay: Fraud and Malware Detection in Google Play.
Proceedings of the 2016 SIAM International Conference on Data Mining, 2016

2015
To catch a fake: Curbing deceptive Yelp ratings and venues.
Statistical Analysis and Data Mining, 2015

In-Network Trajectory Privacy Preservation.
ACM Comput. Surv., 2015

Spotting Suspicious Reviews via (Quasi-)clique Extraction.
CoRR, 2015

Liveness verifications for citizen journalism videos.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

A Longitudinal Study of the Google App Market.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Towards Safe Cities: A Mobile and Social Networking Approach.
IEEE Trans. Parallel Distrib. Syst., 2014

Errata for: A Framework for Network Aware Caching for Video on Demand Systems.
TOMM, 2014

Private Badges for Geosocial Networks.
IEEE Trans. Mob. Comput., 2014

${\rm PROFIL}_{R}$: Toward Preserving Privacy and Functionality in Geosocial Networks.
IEEE Trans. Information Forensics and Security, 2014

Turning the Tide: Curbing Deceptive Yelp Behaviors.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

Geofit: Verifiable Fitness Challenges.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

SensCrypt: A Secure Protocol for Managing Low Power Fitness Trackers.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

2013
A framework for network aware caching for video on demand systems.
TOMCCAP, 2013

Fit and Vulnerable: Attacks and Defenses for a Health Monitoring Device
CoRR, 2013

Eat the Cake and Have It Too: Privacy Preserving Location Aggregates in Geosocial Networks
CoRR, 2013

A survey of privacy vulnerabilities and defenses in geosocial networks.
IEEE Communications Magazine, 2013

Continuous Mobile Authentication Using Virtual Key Typing Biometrics.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Toward preserving privacy and functionality in geosocial networks.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

Yelp Events: Making Bricks Without Clay?
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Seeing is not believing: visual verifications through liveness analysis using mobile devices.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Payments for Outsourced Computations.
IEEE Trans. Parallel Distrib. Syst., 2012

Toward Private Joins on Outsourced Data.
IEEE Trans. Knowl. Data Eng., 2012

Tipping Pennies? Privately Practical Anonymous Micropayments.
IEEE Trans. Information Forensics and Security, 2012

Network Aware Caching for Video on Demand systems.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Continuous Remote Mobile Identity Management Using Biometric Integrated Touch-Display.
Proceedings of the 45th Annual IEEE/ACM International Symposium on Microarchitecture, 2012

You unlocked the Mt. Everest badge on foursquare! Countering location fraud in Geosocial Networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Safe cities. A participatory sensing approach.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Private location centric profiles for GeoSocial networks.
Proceedings of the SIGSPATIAL 2012 International Conference on Advances in Geographic Information Systems (formerly known as GIS), 2012

The Shy Mayor: Private Badges in GeoSocial Networks.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Write-Once Read-Many Oblivious RAM.
IEEE Trans. Information Forensics and Security, 2011

Conditional e-payments with transferability.
J. Parallel Distributed Comput., 2011

Predictive Caching for Video on Demand CDNs.
Proceedings of the Global Communications Conference, 2011

Private geosocial networking.
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011

Oblivious Outsourced Storage with Delegation.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Secure Synchronization of Periodic Updates in Ad Hoc Networks.
IEEE Trans. Parallel Distrib. Syst., 2010

Query privacy in wireless sensor networks.
TOSN, 2010

Fair Payments for Outsourced Computations.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

Joining Privately on Outsourced Data.
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010

iFriendU: leveraging 3-cliques to enhance infiltration attacks in online social networks.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Regulatory Compliant Oblivious RAM.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks.
IEEE Trans. Dependable Sec. Comput., 2009

Efficient tag detection in RFID systems.
J. Parallel Distributed Comput., 2009

A personal mobile DRM manager for smartphones.
Comput. Secur., 2009

XPay: practical anonymous payments for tor routing and other networked services.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

Efficient access enforcement in distributed role-based access control (RBAC) deployments.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

2008
Byzantine resilient synchronization for content and presence updates in MANETS.
Proceedings of the 16th annual IEEE International Conference on Network Protocols, 2008

Building castles out of mud: practical access pattern privacy and correctness on untrusted storage.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

Conditional Payments for Computing Markets.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
NS2: Networked Searchable Store with Correctness.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

On the Practicality of Private Information Retrieval.
Proceedings of the Network and Distributed System Security Symposium, 2007

Verifiable Credit Based Transfers in Wireless Ad Hoc Networks.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Conditional E-Cash.
Proceedings of the Financial Cryptography and Data Security, 2007

Personal Digital Rights Management for Mobile Cellular Devices.
Proceedings of the Financial Cryptography and Data Security, 2007

2006
Redundancy and coverage detection in sensor networks.
TOSN, 2006

Uncheatable Reputation for Distributed Computation Markets.
Proceedings of the Financial Cryptography and Data Security, 2006

2005
High Throughput Routing in Hybrid Cellular and Ad-Hoc Networks.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

Redundant reader elimination in RFID systems.
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor, 2005

2004
Coordination and mobility in CoreLime.
Mathematical Structures in Computer Science, 2004

JANUS: towards robust and malicious resilient routing in hybrid wireless networks.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004

Coverage preserving redundancy elimination in sensor networks.
Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004

Scalable routing in hybrid cellular and ad-hoc networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

A public key algorithm for ad-hoc networks.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Distributed and Dynamic Voronoi Overlays for Coverage Detection and Distributed Hash Tables in Ad-Hoc Networks.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004

A Secure Crediting Protocol for Hybrid Cellular and Ad-Hoc Networks.
Proceedings of the ICETE 2004, 2004

2002
Boundary Tracking Solutions for Mobile Ad Hoc Networks.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002

2001
CoreLime: A Coordination Model for Mobile Agents.
Electr. Notes Theor. Comput. Sci., 2001

Lime Revisited.
Proceedings of the Mobile Agents, 5th International Conference, 2001


  Loading...