Sonia Jahid

According to our database1, Sonia Jahid authored at least 8 papers between 2008 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Social networking: security, privacy, and applications
PhD thesis, 2013

2012
PIRATTE: Proxy-based Immediate Revocation of ATTribute-based Encryption
CoRR, 2012

DECENT: A decentralized architecture for enforcing privacy in online social networks.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Cachet: a decentralized architecture for privacy preserving social networking with caching.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012

2011
A Decentralized Architecture for Enforcing Privacy in Online Social Networks
CoRR, 2011

MyABDAC: compiling XACML policies for attribute-based database access control.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

EASiER: encryption-based access control in social networks with efficient revocation.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2008
Using rhythmic nonces for puzzle-based DoS resistance.
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, 2008


  Loading...