
BibTeX records: John Solis
@inproceedings{DBLP:conf/sp/NithyanandS12, author = {Rishab Nithyanand and John Solis}, title = {A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {1--11}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.16}, doi = {10.1109/SPW.2012.16}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/NithyanandS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NithyanandSS11, author = {Rishab Nithyanand and Radu Sion and John Solis}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: making the case for intrinsic personal physical unclonable functions (IP-PUFs)}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {825--828}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093503}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NithyanandSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/HuletteS11, author = {Geoffrey C. Hulette and John Solis}, editor = {Jomi Fred H{\"{u}}bner and Jean{-}Marc Petit and Einoshin Suzuki}, title = {On Source Code Transformations for Steganographic Applications}, booktitle = {Proceedings of the 2011 {IEEE/WIC/ACM} International Joint Conference on Web Intelligence and Intelligent Agent Technology - Workshops, {WI-IAT} 2011, Campus Scientifique de la Doua, Lyon, France, August 22-27, 2011}, pages = {261--264}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WI-IAT.2011.89}, doi = {10.1109/WI-IAT.2011.89}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iat/HuletteS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/SolisGAO11, author = {John Solis and Philip Ginzboorg and N. Asokan and J{\"{o}}rg Ott}, editor = {Sheng Zhong and Dejing Dou and Yu Wang}, title = {Best-effort authentication for opportunistic networks}, booktitle = {30th {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2011, Orlando, Florida, USA, November 17-19, 2011}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PCCC.2011.6108110}, doi = {10.1109/PCCC.2011.6108110}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/ipccc/SolisGAO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Solis11, author = {John Solis}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Private Searching for Sensitive File Signatures}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {341--344}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Solis11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/SolisAKGO10, author = {John Solis and N. Asokan and Kari Kostiainen and Philip Ginzboorg and J{\"{o}}rg Ott}, title = {Controlling resource hogs in mobile delay-tolerant networks}, journal = {Comput. Commun.}, volume = {33}, number = {1}, pages = {2--10}, year = {2010}, url = {https://doi.org/10.1016/j.comcom.2009.07.019}, doi = {10.1016/j.comcom.2009.07.019}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/SolisAKGO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/NarasimhaST09, author = {Maithili Narasimha and John Solis and Gene Tsudik}, title = {Privacy-preserving revocation checking}, journal = {Int. J. Inf. Sec.}, volume = {8}, number = {1}, pages = {61--75}, year = {2009}, url = {https://doi.org/10.1007/s10207-008-0064-z}, doi = {10.1007/s10207-008-0064-z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/NarasimhaST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GoodrichSSSTU09, author = {Michael T. Goodrich and Michael Sirivianos and John Solis and Claudio Soriente and Gene Tsudik and Ersin Uzun}, title = {Using audio in secure device pairing}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {1/2}, pages = {57--68}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.023426}, doi = {10.1504/IJSN.2009.023426}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/GoodrichSSSTU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/DefrawyST09, author = {Karim M. El Defrawy and John Solis and Gene Tsudik}, editor = {Sheikh Iqbal Ahamed and Elisa Bertino and Carl K. Chang and Vladimir Getov and Lin Liu and Hua Ming and Rajesh Subramanyan}, title = {Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks}, booktitle = {Proceedings of the 33rd Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 1}, pages = {271--279}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/COMPSAC.2009.43}, doi = {10.1109/COMPSAC.2009.43}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/DefrawyST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/GoodrichSSTU06, author = {Michael T. Goodrich and Michael Sirivianos and John Solis and Gene Tsudik and Ersin Uzun}, title = {Loud and Clear: Human-Verifiable Authentication Based on Audio}, booktitle = {26th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal}, pages = {10}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICDCS.2006.52}, doi = {10.1109/ICDCS.2006.52}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/GoodrichSSTU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/SolisT06, author = {John Solis and Gene Tsudik}, editor = {George Danezis and Philippe Golle}, title = {Simple and Flexible Revocation Checking with Privacy}, booktitle = {Privacy Enhancing Technologies, 6th International Workshop, {PET} 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4258}, pages = {351--367}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11957454\_20}, doi = {10.1007/11957454\_20}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/SolisT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SolisT06, author = {John Solis and Gene Tsudik}, title = {Simple and Flexible Private Revocation Checking}, journal = {{IACR} Cryptol. ePrint Arch.}, volume = {2006}, pages = {66}, year = {2006}, url = {http://eprint.iacr.org/2006/066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SolisT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoodrichSSTU05, author = {Michael T. Goodrich and Michael Sirivianos and John Solis and Gene Tsudik and Ersin Uzun}, title = {Loud and Clear: Human-Verifiable Authentication Based on Audio}, journal = {{IACR} Cryptol. ePrint Arch.}, volume = {2005}, pages = {428}, year = {2005}, url = {http://eprint.iacr.org/2005/428}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoodrichSSTU05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.