John Bethencourt

According to our database1, John Bethencourt authored at least 12 papers between 2005 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
On the Feasibility of Internet-Scale Author Identification.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

2011
Cryptographic Techniques for Privacy Preserving Identity.
PhD thesis, 2011

2010
Signatures of Reputation.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
New Techniques for Private Stream Searching.
ACM Trans. Inf. Syst. Secur., 2009

2008
Analysis-Resistant Malware.
Proceedings of the Network and Distributed System Security Symposium, 2008

2007
Multi-Dimensional Range Query over Encrypted Data.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Establishing darknet connections: an evaluation of usability and security.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Cryptographic Methods for Storing Ballots on a Voting Machine.
Proceedings of the Network and Distributed System Security Symposium, 2007

2006
Running Quake II on a grid.
IBM Syst. J., 2006

New Constructions and Practical Applications for Private Stream Searching (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

2005
Mapping Internet Sensors with Probe Response Attacks.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005


  Loading...