2019
In Content We Trust: Network-Layer Trust in Content-Centric Networking.
IEEE/ACM Trans. Netw., 2019
2017
Can We Make a Cake and Eat it Too? A Discussion of ICN Security and Privacy.
Comput. Commun. Rev., 2017
Mobile sessions in content-centric networks.
Proceedings of the 2017 IFIP Networking Conference, 2017
Closing the Floodgate with Stateless Content-Centric Networking.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
2016
Information-centric Networking and Security (Dagstuhl Seminar 16251).
Dagstuhl Reports, 2016
Trust in Information-Centric Networking: From Theory to Practice.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
AC3N: Anonymous communication in Content-Centric Networking.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
2015
Living in a PIT-less World: A Case Against Stateful Forwarding in Content-Centric Networking.
CoRR, 2015
Privacy, efficiency & fault tolerance in aggregate computations on massive star networks.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
An encryption-based access control framework for content-centric networking.
Proceedings of the 14th IFIP Networking Conference, 2015
2014
What's the Gist? Privacy-Preserving Aggregation of User Profiles.
IACR Cryptol. ePrint Arch., 2014
Elements of Trust in Named-Data Networking.
CoRR, 2014
Network-Layer Trust in Named-Data Networking.
Comput. Commun. Rev., 2014
A fuzzy commitment approach to privacy preserving behavioral targeting.
Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, 2014
Privacy Preserving Data Quality Assessment for High-Fidelity Data Sharing.
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 2014
CCN-KRS: a key resolution service for CCN.
Proceedings of the 1st International Conference on Information-Centric Networking, 2014
2013
Can Jannie verify? Usability of display-equipped RFID tags for security purposes.
J. Comput. Secur., 2013
Privacy in content-oriented networking: threats and countermeasures.
Comput. Commun. Rev., 2013
Interest flooding attack and countermeasures in Named Data Networking.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013
DoS and DDoS in Named Data Networking.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013
2012
Custodian-based information sharing.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
IEEE Commun. Mag., 2012
ANDaNA: Anonymous Named Data Networking Application.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Bitter to Better - How to Make Bitcoin a Better Currency.
Proceedings of the Financial Cryptography and Data Security, 2012
2011
User-aided reader revocation in PKI-based RFID systems.
J. Comput. Secur., 2011
Usability of Display-Equipped RFID Tags for Security Purposes.
Proceedings of the Computer Security - ESORICS 2011, 2011
Pairing devices for social interactions: a comparative usability evaluation.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
2010
Groupthink: usability of secure group association for wireless devices.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
2009
A comparative study of secure device pairing methods.
Pervasive Mob. Comput., 2009
Secure pairing of interface constrained devices.
Int. J. Secur. Networks, 2009
Using audio in secure device pairing.
Int. J. Secur. Networks, 2009
Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems.
IACR Cryptol. ePrint Arch., 2009
Alice Meets Bob: A Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting
CoRR, 2009
Serial hook-ups: a comparative usability study of secure device pairing methods.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
A Reputation-based Trust Management System for P2P Networks.
Int. J. Netw. Secur., 2008
HAPADEP: Human-Assisted Pure Audio Device Pairing.
Proceedings of the Information Security, 11th International Conference, 2008
2007
BEDA: Button-Enabled Device Pairing.
IACR Cryptol. ePrint Arch., 2007
HAPADEP: Human Asisted Pure Audio Device Pairing.
IACR Cryptol. ePrint Arch., 2007
Usability Analysis of Secure Pairing Methods.
Proceedings of the Financial Cryptography and Data Security, 2007
2005
Loud and Clear: Human-Verifiable Authentication Based on Audio.
IACR Cryptol. ePrint Arch., 2005