BibTeX records: Philip Ginzboorg

download as .bib file

@inproceedings{DBLP:conf/fruct/AkmanNG19,
  author    = {Gizem Akman and
               Valtteri Niemi and
               Philip Ginzboorg},
  title     = {{AKMA} Support in Multi {SIM} User Equipment},
  booktitle = {25th Conference of Open Innovations Association, {FRUCT} 2019, Helsinki,
               Finland, November 5-8, 2019},
  pages     = {15--24},
  publisher = {{IEEE}},
  year      = {2019},
  url       = {https://doi.org/10.23919/FRUCT48121.2019.8981494},
  doi       = {10.23919/FRUCT48121.2019.8981494},
  timestamp = {Tue, 18 Feb 2020 08:29:23 +0100},
  biburl    = {https://dblp.org/rec/conf/fruct/AkmanNG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/KhanGN19,
  author    = {Mohsin Khan and
               Philip Ginzboorg and
               Valtteri Niemi},
  editor    = {Maryam Mehrnezhad and
               Thyla van der Merwe and
               Feng Hao},
  title     = {Privacy Preserving {AKMA} in 5G},
  booktitle = {Proceedings of the 5th {ACM} Workshop on Security Standardisation
               Research Workshop, London, UK, November 11, 2019},
  pages     = {45--56},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3338500.3360337},
  doi       = {10.1145/3338500.3360337},
  timestamp = {Tue, 12 Nov 2019 13:15:07 +0100},
  biburl    = {https://dblp.org/rec/conf/secsr/KhanGN19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/KhanG0N18,
  author    = {Mohsin Khan and
               Philip Ginzboorg and
               Kimmo J{\"{a}}rvinen and
               Valtteri Niemi},
  editor    = {Cas Cremers and
               Anja Lehmann},
  title     = {Defeating the Downgrade Attack on Identity Privacy in 5G},
  booktitle = {Security Standardisation Research - 4th International Conference,
               {SSR} 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11322},
  pages     = {95--119},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-04762-7\_6},
  doi       = {10.1007/978-3-030-04762-7\_6},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/conf/secsr/KhanG0N18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spawc/GinzboorgNO18,
  author    = {Philip Ginzboorg and
               Valtteri Niemi and
               J{\"{o}}rg Ott},
  title     = {Estimating Message Transmission Time Over Heterogeneous Disrupted
               Links},
  booktitle = {19th {IEEE} International Workshop on Signal Processing Advances in
               Wireless Communications, {SPAWC} 2018, Kalamata, Greece, June 25-28,
               2018},
  pages     = {1--5},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/SPAWC.2018.8446038},
  doi       = {10.1109/SPAWC.2018.8446038},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/conf/spawc/GinzboorgNO18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-02293,
  author    = {Mohsin Khan and
               Philip Ginzboorg and
               Kimmo J{\"{a}}rvinen and
               Valtteri Niemi},
  title     = {Defeating the Downgrade Attack on Identity Privacy in 5G},
  journal   = {CoRR},
  volume    = {abs/1811.02293},
  year      = {2018},
  url       = {http://arxiv.org/abs/1811.02293},
  archivePrefix = {arXiv},
  eprint    = {1811.02293},
  timestamp = {Thu, 22 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1811-02293.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KhanJGN17,
  author    = {Mohsin Khan and
               Kimmo J{\"{a}}rvinen and
               Philip Ginzboorg and
               Valtteri Niemi},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {On De-synchronization of User Pseudonyms in Mobile Networks},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {347--366},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_22},
  doi       = {10.1007/978-3-319-72598-7\_22},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KhanJGN17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-07545,
  author    = {Philip Ginzboorg},
  title     = {On estimating the alphabet size of a discrete random source},
  journal   = {CoRR},
  volume    = {abs/1711.07545},
  year      = {2017},
  url       = {http://arxiv.org/abs/1711.07545},
  archivePrefix = {arXiv},
  eprint    = {1711.07545},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1711-07545.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobimedia/GinzboorgN16,
  author    = {Philip Ginzboorg and
               Valtteri Niemi},
  editor    = {Zheng Yan and
               Honggang Wang},
  title     = {Privacy of the long-term identities in cellular networks},
  booktitle = {Proceedings of the 9th {EAI} International Conference on Mobile Multimedia
               Communications, MobiMedia 2016, Xi'an, China, June 18-20, 2016},
  pages     = {167--175},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=3021416},
  timestamp = {Thu, 19 Oct 2017 12:55:22 +0200},
  biburl    = {https://dblp.org/rec/conf/mobimedia/GinzboorgN16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nof/KrendzelG15,
  author    = {Andrey Krendzel and
               Philip Ginzboorg},
  title     = {From the rigid hierarchical to flexible flow-based 5G architecture:
               Dimensioning issues},
  booktitle = {6th International Conference on the Network of the Future, {NOF} 2015,
               Montreal, QC, Canada, September 30 - October 2, 2015},
  pages     = {1--6},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {https://doi.org/10.1109/NOF.2015.7333281},
  doi       = {10.1109/NOF.2015.7333281},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/nof/KrendzelG15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/GinzboorgNO14,
  author    = {Philip Ginzboorg and
               Valtteri Niemi and
               J{\"{o}}rg Ott},
  title     = {Message fragmentation for a chain of disrupted links},
  journal   = {Comput. Commun.},
  volume    = {48},
  pages     = {84--97},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.comcom.2014.03.015},
  doi       = {10.1016/j.comcom.2014.03.015},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/comcom/GinzboorgNO14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/GinzboorgNO13,
  author    = {Philip Ginzboorg and
               Valtteri Niemi and
               J{\"{o}}rg Ott},
  title     = {Fragmentation algorithms for {DTN} links},
  journal   = {Comput. Commun.},
  volume    = {36},
  number    = {3},
  pages     = {279--290},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.comcom.2012.10.001},
  doi       = {10.1016/j.comcom.2012.10.001},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/comcom/GinzboorgNO13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/FreudigerJHNG13,
  author    = {Julien Freudiger and
               Murtuza Jadliwala and
               Jean{-}Pierre Hubaux and
               Valtteri Niemi and
               Philip Ginzboorg},
  title     = {Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks},
  journal   = {{MONET}},
  volume    = {18},
  number    = {3},
  pages     = {413--428},
  year      = {2013},
  url       = {https://doi.org/10.1007/s11036-012-0406-y},
  doi       = {10.1007/s11036-012-0406-y},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/monet/FreudigerJHNG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/BilogrevicHJLHGN13,
  author    = {Igor Bilogrevic and
               K{\'{e}}vin Huguenin and
               Murtuza Jadliwala and
               Florent Lopez and
               Jean{-}Pierre Hubaux and
               Philip Ginzboorg and
               Valtteri Niemi},
  editor    = {Friedemann Mattern and
               Silvia Santini and
               John F. Canny and
               Marc Langheinrich and
               Jun Rekimoto},
  title     = {Inferring social ties in pervasive networks: an on-campus comparative
               study},
  booktitle = {The 2013 {ACM} International Joint Conference on Pervasive and Ubiquitous
               Computing, UbiComp '13, Zurich, Switzerland, September 8-12, 2013
               - Adjunct Publication},
  pages     = {123--126},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2494091.2494128},
  doi       = {10.1145/2494091.2494128},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/huc/BilogrevicHJLHGN13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/BilogrevicHJLHGN13,
  author    = {Igor Bilogrevic and
               K{\'{e}}vin Huguenin and
               Murtuza Jadliwala and
               Florent Lopez and
               Jean{-}Pierre Hubaux and
               Philip Ginzboorg and
               Valtteri Niemi},
  editor    = {Ahmad{-}Reza Sadeghi and
               Sara Foresti},
  title     = {Inferring social ties in academic networks using short-range wireless
               communications},
  booktitle = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  pages     = {179--188},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517840.2517842},
  doi       = {10.1145/2517840.2517842},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/wpes/BilogrevicHJLHGN13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BindschaedlerJBAGNH12,
  author    = {Laurent Bindschaedler and
               Murtuza Jadliwala and
               Igor Bilogrevic and
               Imad Aad and
               Philip Ginzboorg and
               Valtteri Niemi and
               Jean{-}Pierre Hubaux},
  title     = {Track Me If You Can: On the Effectiveness of Context-based Identifier
               Changes in Deployed Mobile Networks},
  booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS}
               2012, San Diego, California, USA, February 5-8, 2012},
  publisher = {The Internet Society},
  year      = {2012},
  url       = {https://www.ndss-symposium.org/ndss2012/track-me-if-you-can-effectiveness-context-based-identifier-changes-deployed-mobile-networks},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/conf/ndss/BindschaedlerJBAGNH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pervasive/BilogrevicJLAGNBH12,
  author    = {Igor Bilogrevic and
               Murtuza Jadliwala and
               Istv{\'{a}}n L{\'{a}}m and
               Imad Aad and
               Philip Ginzboorg and
               Valtteri Niemi and
               Laurent Bindschaedler and
               Jean{-}Pierre Hubaux},
  editor    = {Judy Kay and
               Paul Lukowicz and
               Hideyuki Tokuda and
               Patrick Olivier and
               Antonio Kr{\"{u}}ger},
  title     = {Big Brother Knows Your Friends: On Privacy of Social Communities in
               Pervasive Networks},
  booktitle = {Pervasive Computing - 10th International Conference, Pervasive 2012,
               Newcastle, UK, June 18-22, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7319},
  pages     = {370--387},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31205-2\_23},
  doi       = {10.1007/978-3-642-31205-2\_23},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/pervasive/BilogrevicJLAGNBH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/GinzboorgNO12,
  author    = {Philip Ginzboorg and
               Valtteri Niemi and
               J{\"{o}}rg Ott},
  title     = {Message fragmentation for a chain of disrupted links},
  booktitle = {2012 {IEEE} International Symposium on a World of Wireless, Mobile
               and Multimedia Networks, WoWMoM 2012, San Francisco, CA, USA, June
               25-28, 2012},
  pages     = {1--7},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {https://doi.org/10.1109/WoWMoM.2012.6263747},
  doi       = {10.1109/WoWMoM.2012.6263747},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/wowmom/GinzboorgNO12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ew/GinzboorgNO11,
  author    = {Philip Ginzboorg and
               Valtteri Niemi and
               J{\"{o}}rg Ott},
  title     = {Message Fragmentation for Disrupted Links},
  booktitle = {European Wireless 2011, April 27-29, 2011, Vienna, Austria},
  publisher = {VDE-Verlag},
  year      = {2011},
  url       = {http://www.vde-verlag.de/proceedings-de/563343088.html},
  timestamp = {Sun, 19 May 2013 16:54:47 +0200},
  biburl    = {https://dblp.org/rec/conf/ew/GinzboorgNO11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/SolisGAO11,
  author    = {John Solis and
               Philip Ginzboorg and
               N. Asokan and
               J{\"{o}}rg Ott},
  editor    = {Sheng Zhong and
               Dejing Dou and
               Yu Wang},
  title     = {Best-effort authentication for opportunistic networks},
  booktitle = {30th {IEEE} International Performance Computing and Communications
               Conference, {IPCCC} 2011, Orlando, Florida, USA, November 17-19, 2011},
  pages     = {1--6},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {https://doi.org/10.1109/PCCC.2011.6108110},
  doi       = {10.1109/PCCC.2011.6108110},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/ipccc/SolisGAO11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SolisAKGO10,
  author    = {John Solis and
               N. Asokan and
               Kari Kostiainen and
               Philip Ginzboorg and
               J{\"{o}}rg Ott},
  title     = {Controlling resource hogs in mobile delay-tolerant networks},
  journal   = {Comput. Commun.},
  volume    = {33},
  number    = {1},
  pages     = {2--10},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.comcom.2009.07.019},
  doi       = {10.1016/j.comcom.2009.07.019},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/comcom/SolisAKGO10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/GinzboorgN10,
  author    = {Philip Ginzboorg and
               Valtteri Niemi},
  title     = {Reachability in Restricted Walk on Integers},
  journal   = {J. {UCS}},
  volume    = {16},
  number    = {5},
  pages     = {686--714},
  year      = {2010},
  url       = {https://doi.org/10.3217/jucs-016-05-0686},
  doi       = {10.3217/jucs-016-05-0686},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jucs/GinzboorgN10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ism/AsokanMGK05,
  author    = {N. Asokan and
               Seamus Moloney and
               Philip Ginzboorg and
               Kari Kostiainen},
  title     = {Visitor Access Management in Personal Wireless Networks},
  booktitle = {Seventh {IEEE} International Symposium on Multimedia {(ISM} 2005),
               12-14 December 2005, Irvine, CA, {USA}},
  pages     = {686--694},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {https://doi.org/10.1109/ISM.2005.122},
  doi       = {10.1109/ISM.2005.122},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/ism/AsokanMGK05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/MoloneyG04,
  author    = {Seamus Moloney and
               Philip Ginzboorg},
  editor    = {Claude Castelluccia and
               Hannes Hartenstein and
               Christof Paar and
               Dirk Westhoff},
  title     = {Security for Interactions in Pervasive Networks: Applicability of
               Recommendation Systems},
  booktitle = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
               2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3313},
  pages     = {95--106},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/978-3-540-30496-8\_9},
  doi       = {10.1007/978-3-540-30496-8\_9},
  timestamp = {Tue, 14 May 2019 10:00:55 +0200},
  biburl    = {https://dblp.org/rec/conf/esas/MoloneyG04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Ginzboorg00,
  author    = {Philip Ginzboorg},
  title     = {Seven comments on charging and billing},
  journal   = {Commun. {ACM}},
  volume    = {43},
  number    = {11},
  pages     = {89--92},
  year      = {2000},
  url       = {https://doi.org/10.1145/353360.353369},
  doi       = {10.1145/353360.353369},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/cacm/Ginzboorg00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/AsokanG00,
  author    = {N. Asokan and
               Philip Ginzboorg},
  title     = {Key agreement in ad hoc networks},
  journal   = {Comput. Commun.},
  volume    = {23},
  number    = {17},
  pages     = {1627--1637},
  year      = {2000},
  url       = {https://doi.org/10.1016/S0140-3664(00)00249-8},
  doi       = {10.1016/S0140-3664(00)00249-8},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/comcom/AsokanG00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics