Elaine Shi Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

8EEEmily Shen, Elaine Shi, Brent Waters: Predicate Privacy in Encryption Systems. TCC 2009: 457-473
7EEElaine Shi, Brent Waters: Delegating Capabilities in Predicate Encryption Systems. ICALP (2) 2008: 560-578
6EEElaine Shi, John Bethencourt, Hubert T.-H. Chan, Dawn Xiaodong Song, Adrian Perrig: Multi-Dimensional Range Query over Encrypted Data. IEEE Symposium on Security and Privacy 2007: 350-364
5EEBryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu: Portcullis: protecting connection setup from denial-of-capability attacks. SIGCOMM 2007: 289-300
4EEElaine Shi, Adrian Perrig, Leendert van Doorn: BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. IEEE Symposium on Security and Privacy 2005: 154-168
3EEJonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter: Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. IEEE Symposium on Security and Privacy 2005: 64-78
2EEArvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla: Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. SOSP 2005: 1-16
1EEJames Newsome, Elaine Shi, Dawn Xiaodong Song, Adrian Perrig: The sybil attack in sensor networks: analysis & defenses. IPSN 2004: 259-268

Coauthor Index

1John Bethencourt [6]
2T.-H. Hubert Chan (Hubert T.-H. Chan) [6]
3Leendert van Doorn [2] [4]
4Yih-Chun Hu [5]
5Pradeep K. Khosla [2]
6Mark Luk [2]
7Bruce M. Maggs [5]
8Jonathan M. McCune [3]
9James Newsome [1]
10Bryan Parno [5]
11Adrian Perrig [1] [2] [3] [4] [5] [6]
12Michael K. Reiter [3]
13Arvind Seshadri [2]
14Emily Shen [8]
15Dawn Xiaodong Song (Dawn Song) [1] [6]
16Brent Waters (Brent R. Waters) [7] [8]
17Dan Wendlandt [5]

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)