08421 Working Group: Uncertainty and Trust H Aras, C Beckstein, S Buchegger, P Dittrich, T Hubauer, F Klan, ... Dagstuhl Seminar Proceedings, 2009 | 1 | 2009 |
2007 International Workshop on Peer-to-Peer Networked Virtual Environments (P2P-NVE 2007) S Buchegger, D Hales, A Harwood, J Huang, ROCS Joseph, Y Kawahara, ... | | |
2008 Index IEEE Technology and Society Magazine Vol. 27 RL Aguiar, T Ahmed, P Antoniadis, M Arnold, E Bales, JP Barraca, ... IEEE Technology and Society Magazine, 53, 2008 | | 2008 |
2011 Index IEEE Transactions on Mobile Computing Vol. 10 Z Abichar, AA Abouzeid, GD Abowd, F Abrantes, IF Akyildiz, T Alpcan, ... IEEE Transactions on Mobile Computing 10 (12), 1, 2011 | | 2011 |
A Bayesian approach to robust reputation systems for mobile ad hoc networks S Buchegger, JY Le Boudec IEEE Pervasive computing 2 (3), 95-96, 2003 | 2 | 2003 |
A case for P2P infrastructure for social networks-opportunities & challenges S Buchegger, A Datta 2009 Sixth International Conference on Wireless On-Demand Network Systems …, 2009 | 207 | 2009 |
A robust reputation system for mobile ad-hoc networks S Buchegger, JY Le Boudec | 1260 | 2003 |
A Robust Reputation System for P2P and M bile Ad hc Netw rks P2P and Mobile Ad-hoc Networks S Buchegger, JY Le Boudec A Robust Reputation System for P2P and M bile Ad hc Netw rks P2P and Mobile …, 2004 | 2 | 2004 |
A Test-Bed for Misbehavior Detection in Mobile Ad-hoc Networks---How Much Can Watchdogs Really Do? C Tissieres, S Buchegger, JY Le Boudec | 1 | 2003 |
A test-bed for misbehavior detection in mobile ad-hoc networks-how much can watchdogs really do? S Buchegger, C Tissieres, JY Le Boudec Sixth IEEE Workshop on Mobile Computing Systems and Applications, 102-111, 2004 | 115 | 2004 |
Access control in decentralized online social networks: Applying a policy-hiding cryptographic scheme and evaluating its performance O Bodriagov, G Kreitz, S Buchegger 2014 IEEE International Conference on Pervasive Computing and Communication …, 2014 | 32 | 2014 |
Anonfaces: Anonymizing faces adjusted to constraints on efficacy and security MH Le, MSN Khan, G Tsaloli, N Carlsson, S Buchegger Proceedings of the 19th Workshop on Privacy in the Electronic Society, 87-100, 2020 | 8 | 2020 |
Applying privacy-enhancing technologies: One alternative future of protests D Bosk, G Rodríguez-Cano, B Greschbach, S Buchegger Protests in the Information Age, 73-94, 2018 | 3 | 2018 |
ARCADIA-NeXtworking’07 workshop report S Buchegger, A Feldmann Relatório técnico, Deutsche Telekom Laboratories/TU Berlin, 2007 | 2 | 2007 |
Centrality analysis in vehicular ad hoc networks Y Do, S Buchegger, T Alpcan, JP Hubaux T-Labs/EPFL, Tech. Rep, 2008 | 28* | 2008 |
chowniot MSN Khan, S Marchal, S Buchegger, N Asokan Springer, 2019 | | 2019 |
chownIoT: enhancing IoT privacy by automated handling of ownership change MSN Khan, S Marchal, S Buchegger, N Asokan Privacy and Identity Management. Fairness, Accountability, and Transparency …, 2019 | 11 | 2019 |
Cooperative routing in mobile ad-hoc networks: Current efforts against malice and selfishness S Buchegger, JIL Boudec Gesellschaft für Informatik eV, 2002 | 74 | 2002 |
Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks S Buchegger, JY Le Boudec | 86 | 2003 |
Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks. EPFL Technical Report IC/2003/31 S Buchegger, JY Le Boudec | | |