Kim Pecina

According to our database1, Kim Pecina authored at least 13 papers between 2008 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Trustworthy and privacy-preserving processing of personal information: cryptographic constructions, protocols, and tools.
PhD thesis, 2016

2015
Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Symbolic Malleable Zero-Knowledge Proofs.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2013
Security and Privacy by Declarative Design.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

2012
ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Automated Synthesis of Secure Distributed Applications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
G2C: Cryptographic Protocols from Goal-Driven Specifications.
Proceedings of the Theory of Security and Applications - Joint Workshop, 2011

Securing social networks.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

Privacy-aware proof-carrying authorization.
Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, 2011

A Security API for Distributed Social Networks.
Proceedings of the Network and Distributed System Security Symposium, 2011

2010
Brief announcement: anonymity and trust in distributed systems.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Anonymous Webs of Trust.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

2008
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis.
Proceedings of the Computer Aided Verification, 20th International Conference, 2008


  Loading...