Urs Hengartner
Urs Hengartner
Verified email at uwaterloo.ca - Homepage
TitleCited byYear
Facecloak: An architecture for user privacy on social networking sites
W Luo, Q Xie, U Hengartner
2009 international conference on computational science and engineering 3, 26-33, 2009
2322009
Louis, lester and pierre: Three protocols for location privacy
G Zhong, I Goldberg, U Hengartner
International Workshop on Privacy Enhancing Technologies, 62-76, 2007
2292007
TCP Vegas revisited
U Hengartner, J Bolliger, T Gross
Proceedings IEEE INFOCOM 2000. Conference on Computer Communications …, 2000
2122000
Anonymity and security in delay tolerant networks
A Kate, GM Zaverucha, U Hengartner
Security and Privacy in Communications Networks and the Workshops, 2007 …, 2007
1822007
Detection and analysis of routing loops in packet traces
U Hengartner, S Moon, R Mortier, C Diot
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, 107-112, 2002
1422002
Achieving efficient query privacy for location based services
F Olumofin, PK Tysowski, I Goldberg, U Hengartner
International Symposium on Privacy Enhancing Technologies Symposium, 93-110, 2010
1192010
Protecting access to people location information
U Hengartner, P Steenkiste
Security in Pervasive Computing, 25-38, 2004
1132004
VeriPlace: a privacy-aware location proof architecture
W Luo, U Hengartner
Proceedings of the 18th SIGSPATIAL International Conference on Advances in …, 2010
1042010
MPEG system streams in best-effort networks
M Hemy, U Hengartner, P Steenkiste, T Gross
Proc. Packet Video Workshop 99, 1999
951999
Implementing access control to people location information
U Hengartner, P Steenkiste
Proceedings of the ninth ACM symposium on Access control models and …, 2004
902004
A distributed k-anonymity protocol for location privacy
G Zhong, U Hengartner
Pervasive Computing and Communications, 2009. PerCom 2009. IEEE …, 2009
802009
Proving your location without giving up your privacy
W Luo, U Hengartner
Proceedings of the Eleventh Workshop on Mobile Computing Systems …, 2010
762010
Privacy-preserving processing of raw genomic data
E Ayday, JL Raisaro, U Hengartner, A Molyneaux, JP Hubaux
Proceedings of 8th Data Privacy Management (DPM 2013) International Workshop …, 2013
752013
Privacy-preserving matchmaking For mobile social networking secure against malicious users
Q Xie, U Hengartner
Privacy, Security and Trust (PST), 2011 Ninth Annual International …, 2011
712011
Bandwidth modelling for network-aware applications
J Bolliger, T Gross, U Hengartner
INFOCOM'99. Eighteenth Annual Joint Conference of the IEEE Computer and …, 1999
661999
Itus: an implicit authentication framework for android
H Khan, A Atwater, U Hengartner
Proceedings of the 20th annual international conference on Mobile computing …, 2014
642014
Access control to information in pervasive computing environments
U Hengartner, P Steenkiste
Proceedings of 9th Workshop on Hot Topics in Operating Systems (HotOS IX …, 2003
602003
Exploiting hierarchical identity-based encryption for access control to pervasive computing information
U Hengartner, P Steenkiste
Security and Privacy for Emerging Areas in Communications Networks, 2005 …, 2005
592005
Selections: Internet voting with over-the-shoulder coercion-resistance
J Clark, U Hengartner
International Conference on Financial Cryptography and Data Security, 47-61, 2011
582011
PrivacyGuard: A VPN-based Platform to Detect Information Leakage on Android Devices
Y Song, U Hengartner
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
572015
The system can't perform the operation now. Try again later.
Articles 1–20