Sonja Buchegger

According to our database1, Sonja Buchegger authored at least 29 papers between 2002 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change.
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018

2015
Game-Theoretic Mechanisms to Increase Data Availability in Decentralized Storage Systems.
TAAS, 2015

Privacy-Preserving Access Control in Publicly Readable Storage Systems.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

Design of a Privacy-Preserving Document Submission and Grading System.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

Towards Perfectly Secure and Deniable Communication Using an NFC-Based Key-Exchange Scheme.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

2014
XACML-Based Access Control for Decentralized Online Social Networks.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

Event Invitations in Privacy-Preserving DOSNs - Formalization and Protocol Design.
Proceedings of the Privacy and Identity Management for the Future Internet in the Age of Globalisation, 2014

Access control in decentralized online social networks: Applying a policy-hiding cryptographic scheme and evaluating its performance.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

2013
Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062).
Dagstuhl Reports, 2013

User Search with Knowledge Thresholds in Decentralized Online Social Networks.
Proceedings of the Privacy and Identity Management for Emerging Services and Technologies, 2013

2012
The devil is in the metadata - New privacy challenges in Decentralised Online Social Networks.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Passwords in peer-to-peer.
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012

2011
Security Games for Vehicular Networks.
IEEE Trans. Mob. Comput., 2011

Encryption for Peer-to-Peer Social Networks.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

P2P Social Networks with Broadcast Encryption Protected Privacy.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
Decentralized Online Social Networks.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

Replica Placement in P2P Storage: Complexity and Game Theoretic Analyses.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

2009
PeerSoN: P2P social networking: early experiences and insights.
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 2009

Groupthink and Peer Pressure: Social Influence in Online Social Network Groups.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009

Enabling Secure Secret Sharing in Distributed Online Social Networks.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Reputation Systems for Self-Organized Networks.
IEEE Technol. Soc. Mag., 2008

08421 Working Group: Uncertainty and Trust.
Proceedings of the Uncertainty Management in Information Systems, 12.10. - 17.10.2008, 2008

2005
Self-policing mobile ad hoc networks by reputation systems.
IEEE Communications Magazine, 2005

2004
Self-Policing Mobile Ad Hoc Networks.
Proceedings of the Mobile Computing Handbook., 2004

A Test-Bed for Misbehavior Detection in Mobile Ad-hoc Networks -- How Much Can Watchdogs Really Do?
Proceedings of the 6th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2004), 2004

2002
The Performance of Measurement-Based Overlay Networks.
Proceedings of the From QoS Provisioning to QoS Charging, 2002

Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks.
Proceedings of the 10th Euromicro Workshop on Parallel, 2002

Performance analysis of the CONFIDANT protocol.
Proceedings of the 3rd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2002

Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness.
Proceedings of the Informatik bewegt: Informatik 2002 - 32. Jahrestagung der Gesellschaft für Informatik e.v. (GI), 30. September, 2002


  Loading...