Jessica Staddon
Jessica Staddon
Northeastern University
Verified email at
Cited by
Cited by
Controlling data in the cloud: outsourcing computation without outsourcing control
R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina
Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90, 2009
Secure conjunctive keyword search over encrypted data
P Golle, J Staddon, B Waters
Applied Cryptography and Network Security: Second International Conference …, 2004
Detecting and correcting malicious data in VANETs
P Golle, D Greene, J Staddon
Proceedings of the 1st ACM international workshop on Vehicular ad hoc …, 2004
Combinatorial properties of frameproof and traceability codes
JN Staddon, DR Stinson, R Wei
IEEE transactions on information theory 47 (3), 1042-1049, 2001
Secret handshakes from pairing-based key agreements
D Balfanz, G Durfee, N Shankar, D Smetters, J Staddon, HC Wong
2003 Symposium on Security and Privacy, 2003., 180-196, 2003
Adjusting security level of mobile device based on presence or absence of other mobile devices nearby
R Chow, PJP Golle, JN Staddon
US Patent 8,095,112, 2012
Self-healing key distribution with revocation
J Staddon, S Miner, M Franklin, D Balfanz, M Malkin, D Dean
Proceedings 2002 IEEE Symposium on Security and Privacy, 241-257, 2002
Efficient tracing of failed nodes in sensor networks
J Staddon, D Balfanz, G Durfee
Proceedings of the 1st ACM international workshop on Wireless sensor …, 2002
System and method for privacy setting differentiation detection
J Staddon, JS McPhie
US Patent 8,832,854, 2014
Graph-based authentication of digital streams
S Miner, J Staddon
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 232-246, 2000
PKCS# 1: RSA cryptography specifications version 2.0
B Kaliski, J Staddon
Combinatorial bounds for broadcast encryption
M Luby, J Staddon
International Conference on the Theory and Applications of Cryptographic …, 1998
Long-lived broadcast encryption
JA Garay, J Staddon, A Wool
Annual International Cryptology Conference, 333-352, 2000
Randomness re-use in multi-recipient encryption schemeas
M Bellare, A Boldyreva, J Staddon
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
Efficient methods for integrating traceability and broadcast encryption
E Gafni, J Staddon, YL Yin
Annual International Cryptology Conference, 372-387, 1999
Indirect content privacy surveys: measuring privacy without asking about it
A Braunstein, L Granka, J Staddon
Proceedings of the seventh symposium on usable privacy and security, 1-14, 2011
Are privacy concerns a turn-off? Engagement and privacy in social networks
J Staddon, D Huffaker, L Brown, A Sedley
Proceedings of the eighth symposium on usable privacy and security, 1-13, 2012
Systems and methods for protecting private information in a mobile environment
TF Lunt, DH Greene, PJ Golle, RH Bruce, JN Staddon
US Patent 7,707,413, 2010
Method and apparatus for facilitating document sanitization
R Chow, JN Staddon, IS Oberst
US Patent 8,566,350, 2013
Applications of list decoding to tracing traitors
A Silverberg, J Staddon, JL Walker
IEEE Transactions on Information Theory 49 (5), 1312-1318, 2003
The system can't perform the operation now. Try again later.
Articles 1–20