Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sonia Jahid
@phdthesis{DBLP:phd/us/Jahid13, author = {Sonia Jahid}, title = {Social networking: security, privacy, and applications}, school = {University of Illinois Urbana-Champaign, {USA}}, year = {2013}, url = {https://hdl.handle.net/2142/46568}, timestamp = {Fri, 13 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Jahid13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/NilizadehJMBK12, author = {Shirin Nilizadeh and Sonia Jahid and Prateek Mittal and Nikita Borisov and Apu Kapadia}, editor = {Chadi Barakat and Renata Teixeira and K. K. Ramakrishnan and Patrick Thiran}, title = {Cachet: a decentralized architecture for privacy preserving social networking with caching}, booktitle = {Conference on emerging Networking Experiments and Technologies, CoNEXT '12, Nice, France - December 10 - 13, 2012}, pages = {337--348}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2413176.2413215}, doi = {10.1145/2413176.2413215}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/NilizadehJMBK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/JahidNMBK12, author = {Sonia Jahid and Shirin Nilizadeh and Prateek Mittal and Nikita Borisov and Apu Kapadia}, title = {{DECENT:} {A} decentralized architecture for enforcing privacy in online social networks}, booktitle = {Tenth Annual {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2012, March 19-23, 2012, Lugano, Switzerland, Workshop Proceedings}, pages = {326--332}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/PerComW.2012.6197504}, doi = {10.1109/PERCOMW.2012.6197504}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/JahidNMBK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1208-4877, author = {Sonia Jahid and Nikita Borisov}, title = {{PIRATTE:} Proxy-based Immediate Revocation of ATTribute-based Encryption}, journal = {CoRR}, volume = {abs/1208.4877}, year = {2012}, url = {http://arxiv.org/abs/1208.4877}, eprinttype = {arXiv}, eprint = {1208.4877}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1208-4877.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JahidMB11, author = {Sonia Jahid and Prateek Mittal and Nikita Borisov}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {EASiER: encryption-based access control in social networks with efficient revocation}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {411--415}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966970}, doi = {10.1145/1966913.1966970}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JahidMB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/JahidGHO11, author = {Sonia Jahid and Carl A. Gunter and Imranul Hoque and Hamed Okhravi}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {MyABDAC: compiling {XACML} policies for attribute-based database access control}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {97--108}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943528}, doi = {10.1145/1943513.1943528}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/JahidGHO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-5377, author = {Sonia Jahid and Shirin Nilizadeh and Prateek Mittal and Nikita Borisov and Apu Kapadia}, title = {A Decentralized Architecture for Enforcing Privacy in Online Social Networks}, journal = {CoRR}, volume = {abs/1111.5377}, year = {2011}, url = {http://arxiv.org/abs/1111.5377}, eprinttype = {arXiv}, eprint = {1111.5377}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-5377.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChanGJPR08, author = {Ellick Chan and Carl A. Gunter and Sonia Jahid and Evgeni Peryshkin and Daniel Rebolledo}, editor = {Trent Jaeger}, title = {Using rhythmic nonces for puzzle-based DoS resistance}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Computer Security Architecture, {CSAW} 2008, Alexandria, VA, USA, October 31, 2008}, pages = {51--58}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456508.1456518}, doi = {10.1145/1456508.1456518}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChanGJPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.