Follow
Jessica Staddon
Jessica Staddon
JP Morgan Chase, AI Research
Verified email at jpmchase.com
Title
Cited by
Cited by
Year
Controlling data in the cloud: outsourcing computation without outsourcing control
R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina
Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90, 2009
12422009
Secure conjunctive keyword search over encrypted data
P Golle, J Staddon, B Waters
Applied Cryptography and Network Security: Second International Conference …, 2004
11152004
Detecting and correcting malicious data in VANETs
P Golle, D Greene, J Staddon
Proceedings of the 1st ACM international workshop on Vehicular ad hoc …, 2004
7442004
Combinatorial properties of frameproof and traceability codes
JN Staddon, DR Stinson, R Wei
IEEE transactions on information theory 47 (3), 1042-1049, 2001
4302001
Combinatorial properties of frameproof and traceability codes
JN Staddon, DR Stinson, R Wei
IEEE transactions on information theory 47 (3), 1042-1049, 2001
4302001
Secret handshakes from pairing-based key agreements
D Balfanz, G Durfee, N Shankar, D Smetters, J Staddon, HC Wong
2003 Symposium on Security and Privacy, 2003., 180-196, 2003
3782003
Adjusting security level of mobile device based on presence or absence of other mobile devices nearby
R Chow, PJP Golle, JN Staddon
US Patent 8,095,112, 2012
3352012
Self-healing key distribution with revocation
J Staddon, S Miner, M Franklin, D Balfanz, M Malkin, D Dean
Proceedings 2002 IEEE Symposium on Security and Privacy, 241-257, 2002
3082002
Efficient tracing of failed nodes in sensor networks
J Staddon, D Balfanz, G Durfee
Proceedings of the 1st ACM international workshop on Wireless sensor …, 2002
2792002
Efficient tracing of failed nodes in sensor networks
J Staddon, D Balfanz, G Durfee
Proceedings of the 1st ACM international workshop on Wireless sensor …, 2002
2792002
System and method for privacy setting differentiation detection
J Staddon, JS McPhie
US Patent 8,832,854, 2014
2332014
Graph-based authentication of digital streams
S Miner, J Staddon
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 232-246, 2000
2272000
PKCS# 1: RSA cryptography specifications version 2.0
B Kaliski, J Staddon
1961998
Combinatorial bounds for broadcast encryption
M Luby, J Staddon
International Conference on the Theory and Applications of Cryptographic …, 1998
1941998
Long-lived broadcast encryption
JA Garay, J Staddon, A Wool
Annual International Cryptology Conference, 333-352, 2000
1822000
Randomness re-use in multi-recipient encryption schemeas
M Bellare, A Boldyreva, J Staddon
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
1662002
Efficient methods for integrating traceability and broadcast encryption
E Gafni, J Staddon, YL Yin
Annual International Cryptology Conference, 372-387, 1999
1611999
Indirect content privacy surveys: measuring privacy without asking about it
A Braunstein, L Granka, J Staddon
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-14, 2011
1342011
Are privacy concerns a turn-off? Engagement and privacy in social networks
J Staddon, D Huffaker, L Brown, A Sedley
Proceedings of the eighth symposium on usable privacy and security, 1-13, 2012
1042012
Systems and methods for protecting private information in a mobile environment
TF Lunt, DH Greene, PJ Golle, RH Bruce, JN Staddon
US Patent 7,707,413, 2010
1042010
The system can't perform the operation now. Try again later.
Articles 1–20