Volgen
Jessica Staddon
Jessica Staddon
JP Morgan Chase, AI Research
Geverifieerd e-mailadres voor jpmchase.com
Titel
Geciteerd door
Geciteerd door
Jaar
Controlling data in the cloud: outsourcing computation without outsourcing control
R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina
Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90, 2009
12422009
Secure conjunctive keyword search over encrypted data
P Golle, J Staddon, B Waters
Applied Cryptography and Network Security: Second International Conference …, 2004
11152004
Detecting and correcting malicious data in VANETs
P Golle, D Greene, J Staddon
Proceedings of the 1st ACM international workshop on Vehicular ad hoc …, 2004
7442004
Combinatorial properties of frameproof and traceability codes
JN Staddon, DR Stinson, R Wei
IEEE transactions on information theory 47 (3), 1042-1049, 2001
4302001
Combinatorial properties of frameproof and traceability codes
JN Staddon, DR Stinson, R Wei
IEEE transactions on information theory 47 (3), 1042-1049, 2001
4302001
Secret handshakes from pairing-based key agreements
D Balfanz, G Durfee, N Shankar, D Smetters, J Staddon, HC Wong
2003 Symposium on Security and Privacy, 2003., 180-196, 2003
3782003
Adjusting security level of mobile device based on presence or absence of other mobile devices nearby
R Chow, PJP Golle, JN Staddon
US Patent 8,095,112, 2012
3352012
Self-healing key distribution with revocation
J Staddon, S Miner, M Franklin, D Balfanz, M Malkin, D Dean
Proceedings 2002 IEEE Symposium on Security and Privacy, 241-257, 2002
3082002
Efficient tracing of failed nodes in sensor networks
J Staddon, D Balfanz, G Durfee
Proceedings of the 1st ACM international workshop on Wireless sensor …, 2002
2792002
Efficient tracing of failed nodes in sensor networks
J Staddon, D Balfanz, G Durfee
Proceedings of the 1st ACM international workshop on Wireless sensor …, 2002
2792002
System and method for privacy setting differentiation detection
J Staddon, JS McPhie
US Patent 8,832,854, 2014
2332014
Graph-based authentication of digital streams
S Miner, J Staddon
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 232-246, 2000
2272000
PKCS# 1: RSA cryptography specifications version 2.0
B Kaliski, J Staddon
1961998
Combinatorial bounds for broadcast encryption
M Luby, J Staddon
International Conference on the Theory and Applications of Cryptographic …, 1998
1941998
Long-lived broadcast encryption
JA Garay, J Staddon, A Wool
Annual International Cryptology Conference, 333-352, 2000
1822000
Randomness re-use in multi-recipient encryption schemeas
M Bellare, A Boldyreva, J Staddon
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
1662002
Efficient methods for integrating traceability and broadcast encryption
E Gafni, J Staddon, YL Yin
Annual International Cryptology Conference, 372-387, 1999
1611999
Indirect content privacy surveys: measuring privacy without asking about it
A Braunstein, L Granka, J Staddon
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-14, 2011
1342011
Are privacy concerns a turn-off? Engagement and privacy in social networks
J Staddon, D Huffaker, L Brown, A Sedley
Proceedings of the eighth symposium on usable privacy and security, 1-13, 2012
1042012
Systems and methods for protecting private information in a mobile environment
TF Lunt, DH Greene, PJ Golle, RH Bruce, JN Staddon
US Patent 7,707,413, 2010
1042010
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20