BibTeX records: Sonia Jahid

download as .bib file

@phdthesis{DBLP:phd/us/Jahid13,
  author       = {Sonia Jahid},
  title        = {Social networking: security, privacy, and applications},
  school       = {University of Illinois Urbana-Champaign, {USA}},
  year         = {2013},
  url          = {https://hdl.handle.net/2142/46568},
  timestamp    = {Fri, 13 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Jahid13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/NilizadehJMBK12,
  author       = {Shirin Nilizadeh and
                  Sonia Jahid and
                  Prateek Mittal and
                  Nikita Borisov and
                  Apu Kapadia},
  editor       = {Chadi Barakat and
                  Renata Teixeira and
                  K. K. Ramakrishnan and
                  Patrick Thiran},
  title        = {Cachet: a decentralized architecture for privacy preserving social
                  networking with caching},
  booktitle    = {Conference on emerging Networking Experiments and Technologies, CoNEXT
                  '12, Nice, France - December 10 - 13, 2012},
  pages        = {337--348},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2413176.2413215},
  doi          = {10.1145/2413176.2413215},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/NilizadehJMBK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/JahidNMBK12,
  author       = {Sonia Jahid and
                  Shirin Nilizadeh and
                  Prateek Mittal and
                  Nikita Borisov and
                  Apu Kapadia},
  title        = {{DECENT:} {A} decentralized architecture for enforcing privacy in
                  online social networks},
  booktitle    = {Tenth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2012, March 19-23, 2012, Lugano, Switzerland,
                  Workshop Proceedings},
  pages        = {326--332},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/PerComW.2012.6197504},
  doi          = {10.1109/PERCOMW.2012.6197504},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/JahidNMBK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-4877,
  author       = {Sonia Jahid and
                  Nikita Borisov},
  title        = {{PIRATTE:} Proxy-based Immediate Revocation of ATTribute-based Encryption},
  journal      = {CoRR},
  volume       = {abs/1208.4877},
  year         = {2012},
  url          = {http://arxiv.org/abs/1208.4877},
  eprinttype    = {arXiv},
  eprint       = {1208.4877},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1208-4877.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JahidMB11,
  author       = {Sonia Jahid and
                  Prateek Mittal and
                  Nikita Borisov},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {EASiER: encryption-based access control in social networks with efficient
                  revocation},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {411--415},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966970},
  doi          = {10.1145/1966913.1966970},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JahidMB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/JahidGHO11,
  author       = {Sonia Jahid and
                  Carl A. Gunter and
                  Imranul Hoque and
                  Hamed Okhravi},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {MyABDAC: compiling {XACML} policies for attribute-based database access
                  control},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {97--108},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943528},
  doi          = {10.1145/1943513.1943528},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/JahidGHO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-5377,
  author       = {Sonia Jahid and
                  Shirin Nilizadeh and
                  Prateek Mittal and
                  Nikita Borisov and
                  Apu Kapadia},
  title        = {A Decentralized Architecture for Enforcing Privacy in Online Social
                  Networks},
  journal      = {CoRR},
  volume       = {abs/1111.5377},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.5377},
  eprinttype    = {arXiv},
  eprint       = {1111.5377},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-5377.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChanGJPR08,
  author       = {Ellick Chan and
                  Carl A. Gunter and
                  Sonia Jahid and
                  Evgeni Peryshkin and
                  Daniel Rebolledo},
  editor       = {Trent Jaeger},
  title        = {Using rhythmic nonces for puzzle-based DoS resistance},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture,
                  {CSAW} 2008, Alexandria, VA, USA, October 31, 2008},
  pages        = {51--58},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456508.1456518},
  doi          = {10.1145/1456508.1456518},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChanGJPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics