Jessica Staddon
Jessica Staddon
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
Controlling data in the cloud: outsourcing computation without outsourcing control
R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina
Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90, 2009
10482009
Secure conjunctive keyword search over encrypted data
P Golle, J Staddon, B Waters
International conference on applied cryptography and network security, 31-45, 2004
8932004
Detecting and correcting malicious data in VANETs
P Golle, D Greene, J Staddon
Proceedings of the 1st ACM international workshop on Vehicular ad hoc …, 2004
6392004
Combinatorial properties of frameproof and traceability codes
JN Staddon, DR Stinson, R Wei
IEEE transactions on information theory 47 (3), 1042-1049, 2001
3872001
Combinatorial properties of frameproof and traceability codes
JN Staddon, DR Stinson, R Wei
IEEE transactions on information theory 47 (3), 1042-1049, 2001
3872001
Secret handshakes from pairing-based key agreements
D Balfanz, G Durfee, N Shankar, D Smetters, J Staddon, HC Wong
2003 Symposium on Security and Privacy, 2003., 180-196, 2003
3272003
Self-healing key distribution with revocation
J Staddon, S Miner, M Franklin, D Balfanz, M Malkin, D Dean
Proceedings 2002 IEEE Symposium on Security and Privacy, 241-257, 2002
2902002
Efficient tracing of failed nodes in sensor networks
J Staddon, D Balfanz, G Durfee
Proceedings of the 1st ACM international workshop on Wireless sensor …, 2002
2492002
Efficient tracing of failed nodes in sensor networks
J Staddon, D Balfanz, G Durfee
Proceedings of the 1st ACM international workshop on Wireless sensor …, 2002
2492002
Adjusting security level of mobile device based on presence or absence of other mobile devices nearby
R Chow, PJP Golle, JN Staddon
US Patent 8,095,112, 2012
2412012
Graph-based authentication of digital streams
S Miner, J Staddon
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 232-246, 2000
2202000
Combinatorial bounds for broadcast encryption
M Luby, J Staddon
International Conference on the Theory and Applications of Cryptographic …, 1998
1931998
Long-lived broadcast encryption
JA Garay, J Staddon, A Wool
Annual International Cryptology Conference, 333-352, 2000
1742000
PKCS# 1: RSA cryptography specifications version 2.0
B Kaliski, J Staddon
RFC 2437, October, 1998
1721998
Efficient methods for integrating traceability and broadcast encryption
E Gafni, J Staddon, YL Yin
Annual International Cryptology Conference, 372-387, 1999
1531999
Randomness re-use in multi-recipient encryption schemeas
M Bellare, A Boldyreva, J Staddon
International Workshop on Public Key Cryptography, 85-99, 2003
1382003
Indirect content privacy surveys: measuring privacy without asking about it
A Braunstein, L Granka, J Staddon
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-14, 2011
922011
A content-driven access control system
J Staddon, P Golle, M Gagné, P Rasmussen
Proceedings of the 7th symposium on Identity and trust on the Internet, 26-35, 2008
902008
Are privacy concerns a turn-off? Engagement and privacy in social networks
J Staddon, D Huffaker, L Brown, A Sedley
Proceedings of the eighth symposium on usable privacy and security, 1-13, 2012
892012
Systems and methods for protecting private information in a mobile environment
TF Lunt, DH Greene, PJ Golle, RH Bruce, JN Staddon
US Patent 7,707,413, 2010
872010
The system can't perform the operation now. Try again later.
Articles 1–20