Search Results

You are looking at 1 - 2 of 2 items for :

  • IT-Security and Cryptology x
Clear All
Open access

Stephan Heuser, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter, Alexandra Dmitrienko, William Enck, Negar Kiyavash, Ahmad-Reza Sadeghi and Patrick Traynor

-Cartigny.Closed-circuit unobservable Voice over IP. In Annual Computer Security Applications Conference. IEEE, 2007. [5] Android Developers Documentation. Android Debug Bridge. http://developer.android.com/tools/help/adb.html. [6] V. A. Balasubramaniyan, A. Poonawalla, M. Ahamad, M. T.Hunter, and P. Traynor. PinDr0P: using single-ended audio features to determine call provenance. In ACM Conference on Computer and Communications Security, 2010. [7] M. Baugher. The Secure Real-time Transport Protocol (SRTP). IETF RFC 3711, Mar. 2013. https

Open access

Archita Agarwal, Maurice Herlihy, Seny Kamara and Tarik Moataz

, and S. Goryczka. Dpcube: differentially private histogram release through multidimensional partitioning. arXiv preprint arXiv:1202.5358 , 2012. [66] J. Xu, Z. Zhang, X. Xiao, Y. Yang, G. Yu, and M. Winslett. Differentially private histogram publication. The VLDB Journal - The International Journal on Very Large Data Bases , 22(6):797–822, 2013. [67] Y. Zhang, A. O’Neill, M. Sherr, and W. Zhou. Privacypreserving network provenance. Proc. VLDB Endow. , 10(11):1550–1561, Aug. 2017.