Bonneau

Results: 161



#Item
81Prying Data out of a Social Network Joseph Bonneau, Jonathan Anderson Computer Laboratory University of Cambridge ,

Prying Data out of a Social Network Joseph Bonneau, Jonathan Anderson Computer Laboratory University of Cambridge ,

Add to Reading List

Source URL: www.engr.mun.ca

Language: English - Date: 2015-01-04 23:00:53
    82Sharing good practices SC.2 Rail security task force UIC-EIM contribution MH Bonneau - UIC Security Division  Inland Transport Security Discussion Forum – 29th January 2010

    Sharing good practices SC.2 Rail security task force UIC-EIM contribution MH Bonneau - UIC Security Division Inland Transport Security Discussion Forum – 29th January 2010

    Add to Reading List

    Source URL: www.unece.org

    - Date: 2010-02-11 06:12:14
      83Eight Friends Are Enough: Social Graph Approximation via Public Listings Joseph Bonneau, Jonathan Anderson, Ross Anderson and Frank Stajano University of Cambridge Computer Laboratory {joseph.bonneau, jonathan.anderson,

      Eight Friends Are Enough: Social Graph Approximation via Public Listings Joseph Bonneau, Jonathan Anderson, Ross Anderson and Frank Stajano University of Cambridge Computer Laboratory {joseph.bonneau, jonathan.anderson,

      Add to Reading List

      Source URL: www.engr.mun.ca

      Language: English - Date: 2015-01-04 23:00:53
        84Intro to Bitcoin Research or “Why Bitcoin is a full employment act for security engineers”  Joseph Bonneau

        Intro to Bitcoin Research or “Why Bitcoin is a full employment act for security engineers” Joseph Bonneau

        Add to Reading List

        Source URL: www.cl.cam.ac.uk

        Language: English - Date: 2014-03-26 06:11:45
          85Inglorious Installers: Security in the Application Marketplace (Preliminary Version) Jonathan Anderson, Joseph Bonneau and Frank Stajano University of Cambridge

          Inglorious Installers: Security in the Application Marketplace (Preliminary Version) Jonathan Anderson, Joseph Bonneau and Frank Stajano University of Cambridge

          Add to Reading List

          Source URL: www.engr.mun.ca

          Language: English - Date: 2015-01-04 23:00:53
            86Comments on Facebook’s Proposed Governance Scheme Joseph Bonneau, Sören Preibusch, Jonathan Anderson, Richard Clayton, Ross Anderson University of Cambridge Computer Laboratory March 30, 2009

            Comments on Facebook’s Proposed Governance Scheme Joseph Bonneau, Sören Preibusch, Jonathan Anderson, Richard Clayton, Ross Anderson University of Cambridge Computer Laboratory March 30, 2009

            Add to Reading List

            Source URL: www.engr.mun.ca

            Language: English - Date: 2015-01-04 23:00:53
            87Security APIs for Online Applications Jonathan Anderson Joseph Bonneau  Frank Stajano

            Security APIs for Online Applications Jonathan Anderson Joseph Bonneau Frank Stajano

            Add to Reading List

            Source URL: www.engr.mun.ca

            Language: English - Date: 2015-01-04 23:00:53
            88SoK: Secure Messaging1 Nik Unger∗ , Sergej Dechand† Joseph Bonneau‡§ , Sascha Fahl¶ , Henning Perl¶ Ian Goldberg∗ , Matthew Smith† ∗

            SoK: Secure Messaging1 Nik Unger∗ , Sergej Dechand† Joseph Bonneau‡§ , Sascha Fahl¶ , Henning Perl¶ Ian Goldberg∗ , Matthew Smith† ∗

            Add to Reading List

            Source URL: www.cypherpunks.ca

            Language: English - Date: 2015-04-11 10:28:11
            89The Tangled Web of Password Reuse Anupam Das∗ , Joseph Bonneau† , Matthew Caesar∗ , Nikita Borisov∗ and XiaoFeng Wang‡ ∗ University of Illinois at Urbana-Champaign {das17, caesar, nikita}@illinois.edu

            The Tangled Web of Password Reuse Anupam Das∗ , Joseph Bonneau† , Matthew Caesar∗ , Nikita Borisov∗ and XiaoFeng Wang‡ ∗ University of Illinois at Urbana-Champaign {das17, caesar, nikita}@illinois.edu

            Add to Reading List

            Source URL: web.engr.illinois.edu

            Language: English - Date: 2013-12-13 12:04:32
            90Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract  Despite its critical importance, secure key veri

            Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri

            Add to Reading List

            Source URL: www.jbonneau.com

            Language: English - Date: 2015-04-10 15:07:29