default search action
BibTeX records: Alex Tsow
@article{DBLP:journals/tissec/WangGJT10, author = {XiaoFeng Wang and Philippe Golle and Markus Jakobsson and Alex Tsow}, title = {Deterring voluntary trace disclosure in re-encryption mix-networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {18:1--18:24}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698758}, doi = {10.1145/1698750.1698758}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/WangGJT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ibmrd/VieccoTC09, author = {Camilo H. Viecco and Alex Tsow and L. Jean Camp}, title = {A privacy-aware architecture for a Web rating system}, journal = {{IBM} J. Res. Dev.}, volume = {53}, number = {2}, pages = {7}, year = {2009}, url = {https://doi.org/10.1147/JRD.2009.5429049}, doi = {10.1147/JRD.2009.5429049}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ibmrd/VieccoTC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Tsow09, author = {Alex Tsow}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {An Improved Recovery Algorithm for Decayed {AES} Key Schedule Images}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {215--230}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_14}, doi = {10.1007/978-3-642-05445-7\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Tsow09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JakobssonTSBL07, author = {Markus Jakobsson and Alex Tsow and Ankur Shah and Eli Blevis and Youn{-}Kyung Lim}, editor = {Sven Dietrich and Rachna Dhamija}, title = {What Instills Trust? {A} Qualitative Study of Phishing}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {356--361}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_32}, doi = {10.1007/978-3-540-77366-5\_32}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/JakobssonTSBL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/TsowJYW06, author = {Alex Tsow and Markus Jakobsson and Liu Yang and Susanne Wetzel}, title = {Warkitting: The Drive-by Subversion of Wireless Home Routers}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {3}, pages = {179--192}, year = {2006}, url = {https://doi.org/10.1080/15567280600995832}, doi = {10.1080/15567280600995832}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/TsowJYW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mtw/Tsow06, author = {Alex Tsow}, editor = {Tim Finin and Lalana Kagal and Daniel Olmedilla}, title = {Phishing with Consumer Electronics - Malicious Home Routers}, booktitle = {Proceedings of the WWW'06 Workshop on Models of Trust for the Web (MTW'06), Edinburgh, Scotland, UK, May 22, 2006}, series = {{CEUR} Workshop Proceedings}, volume = {190}, publisher = {CEUR-WS.org}, year = {2006}, url = {https://ceur-ws.org/Vol-190/paper011.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:58 +0100}, biburl = {https://dblp.org/rec/conf/mtw/Tsow06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GolleWJT06, author = {Philippe Golle and XiaoFeng Wang and Markus Jakobsson and Alex Tsow}, title = {Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {121--131}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.14}, doi = {10.1109/SP.2006.14}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/GolleWJT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/charme/TsowJ05, author = {Alex Tsow and Steven D. Johnson}, editor = {Dominique Borrione and Wolfgang J. Paul}, title = {Data Refinement for Synchronous System Specification and Construction}, booktitle = {Correct Hardware Design and Verification Methods, 13th {IFIP} {WG} 10.5 Advanced Research Working Conference, {CHARME} 2005, Saarbr{\"{u}}cken, Germany, October 3-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3725}, pages = {398--401}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560548\_40}, doi = {10.1007/11560548\_40}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/charme/TsowJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmcad/TsowJ00, author = {Alex Tsow and Steven D. Johnson}, editor = {Warren A. Hunt Jr. and Steven D. Johnson}, title = {Visualizing System Factorizations with Behavior Tables}, booktitle = {Formal Methods in Computer-Aided Design, Third International Conference, {FMCAD} 2000, Austin, Texas, USA, November 1-3, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1954}, pages = {520--537}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-40922-X\_32}, doi = {10.1007/3-540-40922-X\_32}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fmcad/TsowJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.