Philippe Golle

According to our database1, Philippe Golle authored at least 45 papers between 2001 and 2010.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Deterring voluntary trace disclosure in re-encryption mix-networks.
ACM Trans. Inf. Syst. Secur., 2010

The Web as a Privacy Lab.
Proceedings of the Intelligent Information Privacy Management, 2010

2009
The Rules of Redaction: Identify, Protect, Review (and Repeat).
IEEE Secur. Priv., 2009

Faking contextual data for fun, profit, and privacy.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

On the Anonymity of Home/Work Location Pairs.
Proceedings of the Pervasive Computing, 7th International Conference, 2009

Controlling data in the cloud: outsourcing computation without outsourcing control.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
Data Collection with Self-Enforcing Privacy.
ACM Trans. Inf. Syst. Secur., 2008

Machine Learning Attacks Against the ASIRRA CAPTCHA.
IACR Cryptol. ePrint Arch., 2008

Making CAPTCHAs clickable.
Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, 2008

Testable commitments.
Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, 2008

Detecting privacy leaks using corpus-based association rules.
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008

A content-driven access control system.
Proceedings of the IDtrust 2008, 2008

On using existing time-use study data for ubiquitous computing applications.
Proceedings of the UbiComp 2008: Ubiquitous Computing, 10th International Conference, 2008

2007
Web-Based Inference Detection.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract).
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

2006
Cryptanalysis of a Cognitive Authentication Scheme.
IACR Cryptol. ePrint Arch., 2006

Revisiting the uniqueness of simple demographics in the US population.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

Private social network analysis: how to assemble pieces of a graph privately.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

A Private Stable Matching Algorithm.
Proceedings of the Financial Cryptography and Data Security, 2006

Auditable Privacy: On Tamper-Evident Mix Networks.
Proceedings of the Financial Cryptography and Data Security, 2006

Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

2005
Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware.
IACR Cryptol. ePrint Arch., 2005

Preventing bots from playing online games.
Comput. Entertain., 2005

Enhancing the privacy of web-based communication.
Proceedings of the 14th international conference on World Wide Web, 2005

Dealing Cards in Poker Games.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Event Driven Private Counters.
Proceedings of the Financial Cryptography and Data Security, 2005

Keeping bots out of online games.
Proceedings of the International Conference on Advances in Computer Entertainment Technology, 2005

2004
Approximate guarantees of security via probabilistic checking.
PhD thesis, 2004

Defending email communication against profiling attacks.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

Reputable Mix Networks.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

Detecting and correcting malicious data in VANETs.
Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004

Dining Cryptographers Revisited.
Proceedings of the Advances in Cryptology, 2004

Universal Re-encryption for Mixnets.
Proceedings of the Topics in Cryptology, 2004

Parallel mixing.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

Secure Conjunctive Keyword Search over Encrypted Data.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Reusable anonymous return channels.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

The Design and Implementation of Protocol-Based Hidden Key Recovery.
Proceedings of the Information Security, 6th International Conference, 2003

2002
Cryptographic Primitives Enforcing Communication and Storage Complexity.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

Almost entirely correct mixing with applications to voting.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

Optimistic Mixing for Exit-Polls.
Proceedings of the Advances in Cryptology, 2002

2001
Incentives for Sharing in Peer-to-Peer Networks.
Proceedings of the Electronic Commerce, Second International Workshop, 2001

Incentives for sharing in peer-to-peer networks.
Proceedings of the Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), 2001

Authenticating Streamed Data in the Presence of Random Packet Loss.
Proceedings of the Network and Distributed System Security Symposium, 2001

Secure Distributed Computing in a Commercial Environment.
Proceedings of the Financial Cryptography, 2001

Uncheatable Distributed Computations.
Proceedings of the Topics in Cryptology, 2001


  Loading...