John Solis

According to our database1, John Solis authored at least 12 papers between 2005 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

2011
Private Searching for Sensitive File Signatures.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Best-effort authentication for opportunistic networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

On Source Code Transformations for Steganographic Applications.
Proceedings of the 2011 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2011

Poster: making the case for intrinsic personal physical unclonable functions (IP-PUFs).
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Controlling resource hogs in mobile delay-tolerant networks.
Comput. Commun., 2010

2009
Using audio in secure device pairing.
Int. J. Secur. Networks, 2009

Privacy-preserving revocation checking.
Int. J. Inf. Sec., 2009

Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2006
Simple and Flexible Private Revocation Checking.
IACR Cryptol. ePrint Arch., 2006

Simple and Flexible Revocation Checking with Privacy.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

2005
Loud and Clear: Human-Verifiable Authentication Based on Audio.
IACR Cryptol. ePrint Arch., 2005


  Loading...