BibTeX records: Alex Tsow

download as .bib file

@article{DBLP:journals/tissec/WangGJT10,
  author       = {XiaoFeng Wang and
                  Philippe Golle and
                  Markus Jakobsson and
                  Alex Tsow},
  title        = {Deterring voluntary trace disclosure in re-encryption mix-networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {18:1--18:24},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698758},
  doi          = {10.1145/1698750.1698758},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/WangGJT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ibmrd/VieccoTC09,
  author       = {Camilo H. Viecco and
                  Alex Tsow and
                  L. Jean Camp},
  title        = {A privacy-aware architecture for a Web rating system},
  journal      = {{IBM} J. Res. Dev.},
  volume       = {53},
  number       = {2},
  pages        = {7},
  year         = {2009},
  url          = {https://doi.org/10.1147/JRD.2009.5429049},
  doi          = {10.1147/JRD.2009.5429049},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ibmrd/VieccoTC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Tsow09,
  author       = {Alex Tsow},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {An Improved Recovery Algorithm for Decayed {AES} Key Schedule Images},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {215--230},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_14},
  doi          = {10.1007/978-3-642-05445-7\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Tsow09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonTSBL07,
  author       = {Markus Jakobsson and
                  Alex Tsow and
                  Ankur Shah and
                  Eli Blevis and
                  Youn{-}Kyung Lim},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {What Instills Trust? {A} Qualitative Study of Phishing},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {356--361},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_32},
  doi          = {10.1007/978-3-540-77366-5\_32},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/JakobssonTSBL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/TsowJYW06,
  author       = {Alex Tsow and
                  Markus Jakobsson and
                  Liu Yang and
                  Susanne Wetzel},
  title        = {Warkitting: The Drive-by Subversion of Wireless Home Routers},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {3},
  pages        = {179--192},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280600995832},
  doi          = {10.1080/15567280600995832},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/TsowJYW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mtw/Tsow06,
  author       = {Alex Tsow},
  editor       = {Tim Finin and
                  Lalana Kagal and
                  Daniel Olmedilla},
  title        = {Phishing with Consumer Electronics - Malicious Home Routers},
  booktitle    = {Proceedings of the WWW'06 Workshop on Models of Trust for the Web
                  (MTW'06), Edinburgh, Scotland, UK, May 22, 2006},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {190},
  publisher    = {CEUR-WS.org},
  year         = {2006},
  url          = {https://ceur-ws.org/Vol-190/paper011.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:58 +0100},
  biburl       = {https://dblp.org/rec/conf/mtw/Tsow06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GolleWJT06,
  author       = {Philippe Golle and
                  XiaoFeng Wang and
                  Markus Jakobsson and
                  Alex Tsow},
  title        = {Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {121--131},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.14},
  doi          = {10.1109/SP.2006.14},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GolleWJT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/charme/TsowJ05,
  author       = {Alex Tsow and
                  Steven D. Johnson},
  editor       = {Dominique Borrione and
                  Wolfgang J. Paul},
  title        = {Data Refinement for Synchronous System Specification and Construction},
  booktitle    = {Correct Hardware Design and Verification Methods, 13th {IFIP} {WG}
                  10.5 Advanced Research Working Conference, {CHARME} 2005, Saarbr{\"{u}}cken,
                  Germany, October 3-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3725},
  pages        = {398--401},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560548\_40},
  doi          = {10.1007/11560548\_40},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/charme/TsowJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmcad/TsowJ00,
  author       = {Alex Tsow and
                  Steven D. Johnson},
  editor       = {Warren A. Hunt Jr. and
                  Steven D. Johnson},
  title        = {Visualizing System Factorizations with Behavior Tables},
  booktitle    = {Formal Methods in Computer-Aided Design, Third International Conference,
                  {FMCAD} 2000, Austin, Texas, USA, November 1-3, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1954},
  pages        = {520--537},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-40922-X\_32},
  doi          = {10.1007/3-540-40922-X\_32},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fmcad/TsowJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}