Urs Hengartner
Urs Hengartner
Verified email at - Homepage
Cited by
Cited by
Facecloak: An architecture for user privacy on social networking sites
W Luo, Q Xie, U Hengartner
2009 international conference on computational science and engineering 3, 26-33, 2009
Louis, lester and pierre: Three protocols for location privacy
G Zhong, I Goldberg, U Hengartner
International Workshop on Privacy Enhancing Technologies, 62-76, 2007
TCP Vegas revisited
U Hengartner, J Bolliger, T Gross
Proceedings IEEE INFOCOM 2000. Conference on Computer Communications …, 2000
Anonymity and security in delay tolerant networks
A Kate, GM Zaverucha, U Hengartner
Security and Privacy in Communications Networks and the Workshops, 2007 …, 2007
Detection and analysis of routing loops in packet traces
U Hengartner, S Moon, R Mortier, C Diot
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, 107-112, 2002
VeriPlace: a privacy-aware location proof architecture
W Luo, U Hengartner
Proceedings of the 18th SIGSPATIAL International Conference on Advances in …, 2010
Protecting access to people location information
U Hengartner, P Steenkiste
Security in Pervasive Computing: First International Conference, Boppard …, 2004
Protecting people location information
U Hengartner, P Steenkiste
Proceedings of Workshop on Security in Ubiquitous Computing. Goteborg, Sweden, 2002
Achieving efficient query privacy for location based services
F Olumofin, PK Tysowski, I Goldberg, U Hengartner
International Symposium on Privacy Enhancing Technologies Symposium, 93-110, 2010
PrivacyGuard: A VPN-based Platform to Detect Information Leakage on Android Devices
Y Song, U Hengartner
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
Itus: an implicit authentication framework for android
H Khan, A Atwater, U Hengartner
Proceedings of the 20th annual international conference on Mobile computing …, 2014
Selections: Internet voting with over-the-shoulder coercion-resistance
J Clark, U Hengartner
International Conference on Financial Cryptography and Data Security, 47-61, 2011
Privacy-preserving processing of raw genomic data
E Ayday, JL Raisaro, U Hengartner, A Molyneaux, JP Hubaux
Proceedings of 8th Data Privacy Management (DPM 2013) International Workshop …, 2013
A distributed k-anonymity protocol for location privacy
G Zhong, U Hengartner
Pervasive Computing and Communications, 2009. PerCom 2009. IEEE …, 2009
MPEG system streams in best-effort networks
M Hemy, U Hengartner, P Steenkiste, T Gross
Proc. Packet Video Workshop 99, 1999
Implementing access control to people location information
U Hengartner, P Steenkiste
Proceedings of the ninth ACM symposium on Access control models and …, 2004
Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying
H Khan, U Hengartner, D Vogel
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 2015
Proving your location without giving up your privacy
W Luo, U Hengartner
Proceedings of the Eleventh Workshop on Mobile Computing Systems …, 2010
Privacy-preserving matchmaking For mobile social networking secure against malicious users
Q Xie, U Hengartner
Privacy, Security and Trust (PST), 2011 Ninth Annual International …, 2011
On the use of financial data as a random beacon
J Clark, U Hengartner
EVT/WOTE 89, 2010
The system can't perform the operation now. Try again later.
Articles 1–20