Follow
Jessica Staddon
Jessica Staddon
JP Morgan Chase, AI Research
Verified email at jpmchase.com - Homepage
Title
Cited by
Cited by
Year
Controlling data in the cloud: outsourcing computation without outsourcing control
R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina
Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90, 2009
11872009
Secure conjunctive keyword search over encrypted data
P Golle, J Staddon, B Waters
Applied Cryptography and Network Security: Second International Conference …, 2004
10532004
Detecting and correcting malicious data in VANETs
P Golle, D Greene, J Staddon
Proceedings of the 1st ACM international workshop on Vehicular ad hoc …, 2004
7172004
Combinatorial properties of frameproof and traceability codes
JN Staddon, DR Stinson, R Wei
IEEE transactions on information theory 47 (3), 1042-1049, 2001
4182001
Combinatorial properties of frameproof and traceability codes
JN Staddon, DR Stinson, R Wei
IEEE transactions on information theory 47 (3), 1042-1049, 2001
4182001
Secret handshakes from pairing-based key agreements
D Balfanz, G Durfee, N Shankar, D Smetters, J Staddon, HC Wong
2003 Symposium on Security and Privacy, 2003., 180-196, 2003
3672003
Self-healing key distribution with revocation
J Staddon, S Miner, M Franklin, D Balfanz, M Malkin, D Dean
Proceedings 2002 IEEE Symposium on Security and Privacy, 241-257, 2002
3112002
Adjusting security level of mobile device based on presence or absence of other mobile devices nearby
R Chow, PJP Golle, JN Staddon
US Patent 8,095,112, 2012
3042012
Efficient tracing of failed nodes in sensor networks
J Staddon, D Balfanz, G Durfee
Proceedings of the 1st ACM international workshop on Wireless sensor …, 2002
2702002
Efficient tracing of failed nodes in sensor networks
J Staddon, D Balfanz, G Durfee
Proceedings of the 1st ACM international workshop on Wireless sensor …, 2002
2702002
Graph-based authentication of digital streams
S Miner, J Staddon
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 232-246, 2000
2282000
Combinatorial bounds for broadcast encryption
M Luby, J Staddon
Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998
2041998
System and method for privacy setting differentiation detection
J Staddon, JS McPhie
US Patent 8,832,854, 2014
1982014
Long-lived broadcast encryption
JA Garay, J Staddon, A Wool
Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000
1872000
PKCS# 1: RSA cryptography specifications version 2.0
B Kaliski, J Staddon
1871998
Efficient methods for integrating traceability and broadcast encryption
E Gafni, J Staddon, YL Yin
Crypto 99, 372-387, 1999
1641999
Randomness re-use in multi-recipient encryption schemeas
M Bellare, A Boldyreva, J Staddon
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
1512002
Indirect content privacy surveys: measuring privacy without asking about it
A Braunstein, L Granka, J Staddon
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-14, 2011
1182011
Are privacy concerns a turn-off? Engagement and privacy in social networks
J Staddon, D Huffaker, L Brown, A Sedley
Proceedings of the eighth symposium on usable privacy and security, 1-13, 2012
1022012
Method and apparatus for facilitating document sanitization
R Chow, JN Staddon, IS Oberst
US Patent 8,566,350, 2013
992013
The system can't perform the operation now. Try again later.
Articles 1–20