Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Julien Freudiger
@article{DBLP:journals/corr/abs-2102-08503, author = {Matthias Paulik and Matt Seigel and Henry Mason and Dominic Telaar and Joris Kluivers and Rogier C. van Dalen and Chi Wai Lau and Luke Carlson and Filip Granqvist and Chris Vandevelde and Sudeep Agarwal and Julien Freudiger and Andrew Byde and Abhishek Bhowmick and Gaurav Kapoor and Si Beaumont and {\'{A}}ine Cahill and Dominic Hughes and Omid Javidbakht and Fei Dong and Rehan Rishi and Stanley Hung}, title = {Federated Evaluation and Tuning for On-Device Personalization: System Design {\&} Applications}, journal = {CoRR}, volume = {abs/2102.08503}, year = {2021}, url = {https://arxiv.org/abs/2102.08503}, eprinttype = {arXiv}, eprint = {2102.08503}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-08503.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-00984, author = {Abhishek Bhowmick and John C. Duchi and Julien Freudiger and Gaurav Kapoor and Ryan Rogers}, title = {Protection Against Reconstruction and Its Applications in Private Federated Learning}, journal = {CoRR}, volume = {abs/1812.00984}, year = {2018}, url = {http://arxiv.org/abs/1812.00984}, eprinttype = {arXiv}, eprint = {1812.00984}, timestamp = {Tue, 16 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-00984.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/FreudigerCB15, author = {Julien Freudiger and Emiliano De Cristofaro and Alejandro E. Brito}, editor = {Magnus Almgren and Vincenzo Gulisano and Federico Maggi}, title = {Controlled Data Sharing for Collaborative Predictive Blacklisting}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, {DIMVA} 2015, Milan, Italy, July 9-10, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9148}, pages = {327--349}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20550-2\_17}, doi = {10.1007/978-3-319-20550-2\_17}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/FreudigerCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/RaneFBU15, author = {Shantanu Rane and Julien Freudiger and Alejandro E. Brito and Ersin Uzun}, title = {Privacy, efficiency {\&} fault tolerance in aggregate computations on massive star networks}, booktitle = {2015 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2015, Roma, Italy, November 16-19, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/WIFS.2015.7368608}, doi = {10.1109/WIFS.2015.7368608}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/RaneFBU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Freudiger15, author = {Julien Freudiger}, title = {How talkative is your mobile device?: an experimental study of Wi-Fi probe requests}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {8:1--8:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766517}, doi = {10.1145/2766498.2766517}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Freudiger15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FreudigerCB15, author = {Julien Freudiger and Emiliano De Cristofaro and Alejandro E. Brito}, title = {Controlled Data Sharing for Collaborative Predictive Blacklisting}, journal = {CoRR}, volume = {abs/1502.05337}, year = {2015}, url = {http://arxiv.org/abs/1502.05337}, eprinttype = {arXiv}, eprint = {1502.05337}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FreudigerCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FreudigerRBU14, author = {Julien Freudiger and Shantanu Rane and Alejandro E. Brito and Ersin Uzun}, editor = {Gail{-}Joon Ahn and Tomas Sander}, title = {Privacy Preserving Data Quality Assessment for High-Fidelity Data Sharing}, booktitle = {Proceedings of the 2014 {ACM} Workshop on Information Sharing {\&} Collaborative Security, {WISCS} '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {21--29}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663876.2663885}, doi = {10.1145/2663876.2663885}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FreudigerRBU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BilogrevicFCU14, author = {Igor Bilogrevic and Julien Freudiger and Emiliano De Cristofaro and Ersin Uzun}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {What's the Gist? Privacy-Preserving Aggregation of User Profiles}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {128--145}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_8}, doi = {10.1007/978-3-319-11212-1\_8}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BilogrevicFCU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BilogrevicFCU14, author = {Igor Bilogrevic and Julien Freudiger and Emiliano De Cristofaro and Ersin Uzun}, title = {What's the Gist? Privacy-Preserving Aggregation of User Profiles}, journal = {CoRR}, volume = {abs/1405.1328}, year = {2014}, url = {http://arxiv.org/abs/1405.1328}, eprinttype = {arXiv}, eprint = {1405.1328}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BilogrevicFCU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BilogrevicFCU14, author = {Igor Bilogrevic and Julien Freudiger and Emiliano De Cristofaro and Ersin Uzun}, title = {What's the Gist? Privacy-Preserving Aggregation of User Profiles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {502}, year = {2014}, url = {http://eprint.iacr.org/2014/502}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BilogrevicFCU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/FreudigerJHNG13, author = {Julien Freudiger and Murtuza Jadliwala and Jean{-}Pierre Hubaux and Valtteri Niemi and Philip Ginzboorg}, title = {Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks}, journal = {Mob. Networks Appl.}, volume = {18}, number = {3}, pages = {413--428}, year = {2013}, url = {https://doi.org/10.1007/s11036-012-0406-y}, doi = {10.1007/S11036-012-0406-Y}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/FreudigerJHNG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FreudigerMHP13, author = {Julien Freudiger and Mohammad Hossein Manshaei and Jean{-}Pierre Hubaux and David C. Parkes}, title = {Non-Cooperative Location Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {2}, pages = {84--98}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2012.85}, doi = {10.1109/TDSC.2012.85}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FreudigerMHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CristofaroDFN13, author = {Emiliano De Cristofaro and Honglu Du and Julien Freudiger and Gregory Norcie}, title = {Two-Factor or not Two-Factor? {A} Comparative Usability Study of Two-Factor Authentication}, journal = {CoRR}, volume = {abs/1309.5344}, year = {2013}, url = {http://arxiv.org/abs/1309.5344}, eprinttype = {arXiv}, eprint = {1309.5344}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CristofaroDFN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ch/Freudiger11, author = {Julien Freudiger}, title = {When Whereabouts is No Longer Thereabouts - Location Privacy in Wireless Networks}, school = {EPFL, Switzerland}, year = {2011}, url = {https://doi.org/10.5075/epfl-thesis-4928}, doi = {10.5075/EPFL-THESIS-4928}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ch/Freudiger11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FreudigerSH11, author = {Julien Freudiger and Reza Shokri and Jean{-}Pierre Hubaux}, editor = {George Danezis}, title = {Evaluating the Privacy Risk of Location-Based Services}, booktitle = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7035}, pages = {31--46}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27576-0\_3}, doi = {10.1007/978-3-642-27576-0\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/FreudigerSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/VratonjicFBH11, author = {Nevena Vratonjic and Julien Freudiger and Vincent Bindschaedler and Jean{-}Pierre Hubaux}, title = {The Inconvenient Truth about Web Certificates}, booktitle = {10th Annual Workshop on the Economics of Information Security, {WEIS} 2011, George Mason University, Fairfax, VA, USA, June 14-15, 2011}, year = {2011}, url = {http://weis2011.econinfosec.org/papers/The\%20Inconvenient\%20Truth\%20about\%20Web\%20Certificates.pdf}, timestamp = {Thu, 22 Jul 2021 16:15:44 +0200}, biburl = {https://dblp.org/rec/conf/weis/VratonjicFBH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/VratonjicFBH11a, author = {Nevena Vratonjic and Julien Freudiger and Vincent Bindschaedler and Jean{-}Pierre Hubaux}, editor = {Bruce Schneier}, title = {The Inconvenient Truth About Web Certificates}, booktitle = {Economics of Information Security and Privacy {III} [papers from the Tenth Workshop on Economics and Information Security, {WEIS} 2011]}, pages = {79--117}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-1981-5\_5}, doi = {10.1007/978-1-4614-1981-5\_5}, timestamp = {Fri, 16 Aug 2019 12:52:37 +0200}, biburl = {https://dblp.org/rec/conf/weis/VratonjicFBH11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/JadliwalaFAHN11, author = {Murtuza Jadliwala and Julien Freudiger and Imad Aad and Jean{-}Pierre Hubaux and Valtteri Niemi}, title = {Privacy-triggered communications in pervasive social networks}, booktitle = {12th {IEEE} International Symposium on a World of Wireless, Mobile and Multimedia Networks, {WOWMOM} 2011, Lucca, Italy, 20-24 June, 2011}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WoWMoM.2011.5986143}, doi = {10.1109/WOWMOM.2011.5986143}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/JadliwalaFAHN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/CostanzaPZNFHH10, author = {Enrico Costanza and Jacques Panchard and Guillaume Zufferey and Julien Nembrini and Julien Freudiger and Jeffrey Huang and Jean{-}Pierre Hubaux}, editor = {Elizabeth D. Mynatt and Don Schoner and Geraldine Fitzpatrick and Scott E. Hudson and W. Keith Edwards and Tom Rodden}, title = {SensorTune: a mobile auditory interface for {DIY} wireless sensor networks}, booktitle = {Proceedings of the 28th International Conference on Human Factors in Computing Systems, {CHI} 2010, Atlanta, Georgia, USA, April 10-15, 2010}, pages = {2317--2326}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1753326.1753675}, doi = {10.1145/1753326.1753675}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/CostanzaPZNFHH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HumbertMFH10, author = {Mathias Humbert and Mohammad Hossein Manshaei and Julien Freudiger and Jean{-}Pierre Hubaux}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Tracking Games in Mobile Networks}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {38--57}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_3}, doi = {10.1007/978-3-642-17197-0\_3}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/HumbertMFH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/FreudigerMBH10, author = {Julien Freudiger and Mohammad Hossein Manshaei and Jean{-}Yves Le Boudec and Jean{-}Pierre Hubaux}, title = {On the Age of Pseudonyms in Mobile Ad Hoc Networks}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {1577--1585}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5461975}, doi = {10.1109/INFCOM.2010.5461975}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/FreudigerMBH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/VratonjicFH10, author = {Nevena Vratonjic and Julien Freudiger and Jean{-}Pierre Hubaux}, editor = {Nadav Aharony and Yaniv Altshuler and Yuval Elovici}, title = {Integrity of the Web Content: The Case of Online Advertising}, booktitle = {2010 Workshop on Collaborative Methods for Security and Privacy, CollSec'10, Washington, D.C., USA, August 10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/collsec10/integrity-web-content-case-online-advertising}, timestamp = {Mon, 01 Feb 2021 08:42:51 +0100}, biburl = {https://dblp.org/rec/conf/uss/VratonjicFH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/ShokriTDFH10, author = {Reza Shokri and Carmela Troncoso and Claudia D{\'{\i}}az and Julien Freudiger and Jean{-}Pierre Hubaux}, editor = {Ehab Al{-}Shaer and Keith B. Frikken}, title = {Unraveling an old cloak: k-anonymity for location privacy}, booktitle = {Proceedings of the 2010 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2010, Chicago, Illinois, USA, October 4, 2010}, pages = {115--118}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866919.1866936}, doi = {10.1145/1866919.1866936}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/ShokriTDFH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FreudigerMHP09, author = {Julien Freudiger and Mohammad Hossein Manshaei and Jean{-}Pierre Hubaux and David C. Parkes}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {On non-cooperative location privacy: a game-theoretic analysis}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {324--337}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653702}, doi = {10.1145/1653662.1653702}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FreudigerMHP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/FreudigerSH09, author = {Julien Freudiger and Reza Shokri and Jean{-}Pierre Hubaux}, editor = {Ian Goldberg and Mikhail J. Atallah}, title = {On the Optimal Placement of Mix Zones}, booktitle = {Privacy Enhancing Technologies, 9th International Symposium, {PETS} 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5672}, pages = {216--234}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03168-7\_13}, doi = {10.1007/978-3-642-03168-7\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/FreudigerSH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/FreudigerRH09, author = {Julien Freudiger and Maxim Raya and Jean{-}Pierre Hubaux}, editor = {Yan Chen and Tassos Dimitriou and Jianying Zhou}, title = {Self-organized Anonymous Authentication in Mobile Ad Hoc Networks}, booktitle = {Security and Privacy in Communication Networks - 5th International {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {19}, pages = {350--372}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05284-2\_21}, doi = {10.1007/978-3-642-05284-2\_21}, timestamp = {Sun, 07 Jan 2018 16:56:18 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/FreudigerRH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/ShokriFJH09, author = {Reza Shokri and Julien Freudiger and Murtuza Jadliwala and Jean{-}Pierre Hubaux}, editor = {Ehab Al{-}Shaer and Stefano Paraboschi}, title = {A distortion-based metric for location privacy}, booktitle = {Proceedings of the 2009 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2009, Chicago, Illinois, USA, November 9, 2009}, pages = {21--30}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655188.1655192}, doi = {10.1145/1655188.1655192}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/ShokriFJH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0912-5391, author = {Panagiotis Papadimitratos and Levente Butty{\'{a}}n and Tam{\'{a}}s Holczer and Elmar Schoch and Julien Freudiger and Maxim Raya and Zhendong Ma and Frank Kargl and Antonio Kung and Jean{-}Pierre Hubaux}, title = {Secure Vehicular Communication Systems: Design and Architecture}, journal = {CoRR}, volume = {abs/0912.5391}, year = {2009}, url = {http://arxiv.org/abs/0912.5391}, eprinttype = {arXiv}, eprint = {0912.5391}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0912-5391.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/PapadimitratosB08, author = {Panagiotis Papadimitratos and Levente Butty{\'{a}}n and Tam{\'{a}}s Holczer and Elmar Schoch and Julien Freudiger and Maxim Raya and Zhendong Ma and Frank Kargl and Antonio Kung and Jean{-}Pierre Hubaux}, title = {Secure vehicular communication systems: design and architecture}, journal = {{IEEE} Commun. Mag.}, volume = {46}, number = {11}, pages = {100--109}, year = {2008}, url = {https://doi.org/10.1109/MCOM.2008.4689252}, doi = {10.1109/MCOM.2008.4689252}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/PapadimitratosB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ManshaeiFFMH08, author = {Mohammad Hossein Manshaei and Julien Freudiger and M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and Peter Marbach and Jean{-}Pierre Hubaux}, title = {On Wireless Social Community Networks}, booktitle = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, {USA}}, pages = {1552--1560}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/INFOCOM.2008.215}, doi = {10.1109/INFOCOM.2008.215}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ManshaeiFFMH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.