BibTeX records: John Solis

download as .bib file

@inproceedings{DBLP:conf/sp/NithyanandS12,
  author    = {Rishab Nithyanand and
               John Solis},
  title     = {A Theoretical Analysis: Physical Unclonable Functions and the Software
               Protection Problem},
  booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
               CA, USA, May 24-25, 2012},
  pages     = {1--11},
  year      = {2012},
  crossref  = {DBLP:conf/sp/2012w},
  url       = {https://doi.org/10.1109/SPW.2012.16},
  doi       = {10.1109/SPW.2012.16},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/NithyanandS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NithyanandSS11,
  author    = {Rishab Nithyanand and
               Radu Sion and
               John Solis},
  title     = {Poster: making the case for intrinsic personal physical unclonable
               functions (IP-PUFs)},
  booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications
               Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages     = {825--828},
  year      = {2011},
  crossref  = {DBLP:conf/ccs/2011},
  url       = {https://dl.acm.org/citation.cfm?id=2093503},
  timestamp = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/NithyanandSS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/HuletteS11,
  author    = {Geoffrey C. Hulette and
               John Solis},
  title     = {On Source Code Transformations for Steganographic Applications},
  booktitle = {Proceedings of the 2011 {IEEE/WIC/ACM} International Joint Conference
               on Web Intelligence and Intelligent Agent Technology - Workshops,
               {WI-IAT} 2011, Campus Scientifique de la Doua, Lyon, France, August
               22-27, 2011},
  pages     = {261--264},
  year      = {2011},
  crossref  = {DBLP:conf/iat/2011w},
  url       = {https://doi.org/10.1109/WI-IAT.2011.89},
  doi       = {10.1109/WI-IAT.2011.89},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iat/HuletteS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/SolisGAO11,
  author    = {John Solis and
               Philip Ginzboorg and
               N. Asokan and
               J{\"{o}}rg Ott},
  title     = {Best-effort authentication for opportunistic networks},
  booktitle = {30th {IEEE} International Performance Computing and Communications
               Conference, {IPCCC} 2011, Orlando, Florida, USA, November 17-19, 2011},
  pages     = {1--6},
  year      = {2011},
  crossref  = {DBLP:conf/ipccc/2011},
  url       = {https://doi.org/10.1109/PCCC.2011.6108110},
  doi       = {10.1109/PCCC.2011.6108110},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ipccc/SolisGAO11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Solis11,
  author    = {John Solis},
  title     = {Private Searching for Sensitive File Signatures},
  booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
               and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
               part of {ICETE} - The International Joint Conference on e-Business
               and Telecommunications},
  pages     = {341--344},
  year      = {2011},
  crossref  = {DBLP:conf/secrypt/2011},
  timestamp = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/Solis11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SolisAKGO10,
  author    = {John Solis and
               N. Asokan and
               Kari Kostiainen and
               Philip Ginzboorg and
               J{\"{o}}rg Ott},
  title     = {Controlling resource hogs in mobile delay-tolerant networks},
  journal   = {Computer Communications},
  volume    = {33},
  number    = {1},
  pages     = {2--10},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.comcom.2009.07.019},
  doi       = {10.1016/j.comcom.2009.07.019},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/SolisAKGO10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/NarasimhaST09,
  author    = {Maithili Narasimha and
               John Solis and
               Gene Tsudik},
  title     = {Privacy-preserving revocation checking},
  journal   = {Int. J. Inf. Sec.},
  volume    = {8},
  number    = {1},
  pages     = {61--75},
  year      = {2009},
  url       = {https://doi.org/10.1007/s10207-008-0064-z},
  doi       = {10.1007/s10207-008-0064-z},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/NarasimhaST09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GoodrichSSSTU09,
  author    = {Michael T. Goodrich and
               Michael Sirivianos and
               John Solis and
               Claudio Soriente and
               Gene Tsudik and
               Ersin Uzun},
  title     = {Using audio in secure device pairing},
  journal   = {{IJSN}},
  volume    = {4},
  number    = {1/2},
  pages     = {57--68},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJSN.2009.023426},
  doi       = {10.1504/IJSN.2009.023426},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijsn/GoodrichSSSTU09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/DefrawyST09,
  author    = {Karim M. El Defrawy and
               John Solis and
               Gene Tsudik},
  title     = {Leveraging Social Contacts for Message Confidentiality in Delay Tolerant
               Networks},
  booktitle = {Proceedings of the 33rd Annual {IEEE} International Computer Software
               and Applications Conference, {COMPSAC} 2009, Seattle, Washington,
               USA, July 20-24, 2009. Volume 1},
  pages     = {271--279},
  year      = {2009},
  crossref  = {DBLP:conf/compsac/2009},
  url       = {https://doi.org/10.1109/COMPSAC.2009.43},
  doi       = {10.1109/COMPSAC.2009.43},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/compsac/DefrawyST09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/GoodrichSSTU06,
  author    = {Michael T. Goodrich and
               Michael Sirivianos and
               John Solis and
               Gene Tsudik and
               Ersin Uzun},
  title     = {Loud and Clear: Human-Verifiable Authentication Based on Audio},
  booktitle = {26th {IEEE} International Conference on Distributed Computing Systems
               {(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal},
  pages     = {10},
  year      = {2006},
  crossref  = {DBLP:conf/icdcs/2006},
  url       = {https://doi.org/10.1109/ICDCS.2006.52},
  doi       = {10.1109/ICDCS.2006.52},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/GoodrichSSTU06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/SolisT06,
  author    = {John Solis and
               Gene Tsudik},
  title     = {Simple and Flexible Revocation Checking with Privacy},
  booktitle = {Privacy Enhancing Technologies, 6th International Workshop, {PET}
               2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers},
  pages     = {351--367},
  year      = {2006},
  crossref  = {DBLP:conf/pet/2006},
  url       = {https://doi.org/10.1007/11957454\_20},
  doi       = {10.1007/11957454\_20},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pet/SolisT06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SolisT06,
  author    = {John Solis and
               Gene Tsudik},
  title     = {Simple and Flexible Private Revocation Checking},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {66},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/066},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SolisT06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoodrichSSTU05,
  author    = {Michael T. Goodrich and
               Michael Sirivianos and
               John Solis and
               Gene Tsudik and
               Ersin Uzun},
  title     = {Loud and Clear: Human-Verifiable Authentication Based on Audio},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {428},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/428},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GoodrichSSTU05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2012w,
  title     = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
               CA, USA, May 24-25, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6226981/proceeding},
  isbn      = {978-1-4673-2157-0},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2012w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011,
  editor    = {Yan Chen and
               George Danezis and
               Vitaly Shmatikov},
  title     = {Proceedings of the 18th {ACM} Conference on Computer and Communications
               Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0948-6},
  timestamp = {Thu, 20 Oct 2011 19:38:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iat/2011w,
  editor    = {Jomi Fred H{\"{u}}bner and
               Jean{-}Marc Petit and
               Einoshin Suzuki},
  title     = {Proceedings of the 2011 {IEEE/WIC/ACM} International Joint Conference
               on Web Intelligence and Intelligent Agent Technology - Workshops,
               {WI-IAT} 2011, Campus Scientifique de la Doua, Lyon, France, August
               22-27, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=6036728},
  timestamp = {Mon, 15 Jun 2015 19:00:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iat/2011w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ipccc/2011,
  editor    = {Sheng Zhong and
               Dejing Dou and
               Yu Wang},
  title     = {30th {IEEE} International Performance Computing and Communications
               Conference, {IPCCC} 2011, Orlando, Florida, USA, November 17-19, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6097202/proceeding},
  isbn      = {978-1-4673-0010-0},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ipccc/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2011,
  editor    = {Javier L{\'{o}}pez and
               Pierangela Samarati},
  title     = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
               and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
               part of {ICETE} - The International Joint Conference on e-Business
               and Telecommunications},
  publisher = {SciTePress},
  year      = {2011},
  isbn      = {978-989-8425-71-3},
  timestamp = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/compsac/2009,
  editor    = {Sheikh Iqbal Ahamed and
               Elisa Bertino and
               Carl K. Chang and
               Vladimir Getov and
               Lin Liu and
               Hua Ming and
               Rajesh Subramanyan},
  title     = {Proceedings of the 33rd Annual {IEEE} International Computer Software
               and Applications Conference, {COMPSAC} 2009, Seattle, Washington,
               USA, July 20-24, 2009. Volume 1},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5254161},
  isbn      = {978-0-7695-3726-9},
  timestamp = {Thu, 23 Jun 2016 15:53:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/compsac/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcs/2006,
  title     = {26th {IEEE} International Conference on Distributed Computing Systems
               {(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/10967/proceeding},
  isbn      = {0-7695-2540-7},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pet/2006,
  editor    = {George Danezis and
               Philippe Golle},
  title     = {Privacy Enhancing Technologies, 6th International Workshop, {PET}
               2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4258},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11957454},
  doi       = {10.1007/11957454},
  isbn      = {3-540-68790-4},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pet/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics