Author of the publication

Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches.

, , and . IEEE Trans. Inf. Forensics Secur., 7 (6): 1876-1889 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An empirical study of the performance, security and privacy implications of domain name prefetching., and . DSN, page 61-72. IEEE Compute Society, (2011)TimeCapsule: secure recording of accesses to a protected datastore., and . VMSec@CCS, page 23-32. ACM, (2009)SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks., , , and . USENIX Security Symposium, USENIX Association, (2011)Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches., , and . IEEE Trans. Inf. Forensics Secur., 7 (6): 1876-1889 (2012)Remote 3D Medical Consultation., , , , , , , , , and . Virtual Realities, page 139-159. Springer, (2008)A utility-driven framework for loss and encoding aware video adaptation., and . ACM Multimedia, page 1026-1035. ACM, (2007)Trail of bytes: efficient support for forensic analysis., , and . ACM Conference on Computer and Communications Security, page 50-60. ACM, (2010)DNS Prefetching and Its Privacy Implications: When Good Things Go Bad., and . LEET, USENIX Association, (2010)Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing., , , and . DSN, page 1-12. IEEE Computer Society, (2013)Clear and Present Data: Opaque Traffic and its Security Implications for the Future., , , , and . NDSS, The Internet Society, (2013)