default search action
Sonja Buchegger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j5]Md Sakib Nizam Khan, Sonja Buchegger:
Systematization of Knowledge of Ambient Assisted Living Systems: A Privacy Perspective. Trans. Data Priv. 15(1): 1-40 (2022) - 2015
- [j4]Krzysztof Rzadca, Anwitaman Datta, Gunnar Kreitz, Sonja Buchegger:
Game-Theoretic Mechanisms to Increase Data Availability in Decentralized Storage Systems. ACM Trans. Auton. Adapt. Syst. 10(3): 14:1-14:32 (2015) - 2011
- [j3]Tansu Alpcan, Sonja Buchegger:
Security Games for Vehicular Networks. IEEE Trans. Mob. Comput. 10(2): 280-290 (2011) - 2008
- [j2]Sonja Buchegger, Jochen Mundinger, Jean-Yves Le Boudec:
Reputation Systems for Self-Organized Networks. IEEE Technol. Soc. Mag. 27(1): 41-47 (2008) - 2005
- [j1]Sonja Buchegger, Jean-Yves Le Boudec:
Self-policing mobile ad hoc networks by reputation systems. IEEE Commun. Mag. 43(7): 101-107 (2005)
Conference and Workshop Papers
- 2023
- [c25]Md Sakib Nizam Khan, Sonja Buchegger:
The Impact of Synthetic Data on Membership Inference Attacks. SocialSec 2023: 93-108 - 2020
- [c24]Daniel Bosk, Simon Bouget, Sonja Buchegger:
Distance-Bounding, Privacy-Preserving Attribute-Based Credentials. CANS 2020: 147-166 - [c23]Minh-Ha Le, Md Sakib Nizam Khan, Georgia Tsaloli, Niklas Carlsson, Sonja Buchegger:
AnonFACES: Anonymizing Faces Adjusted to Constraints on Efficacy and Security. WPES@CCS 2020: 87-100 - 2018
- [c22]Md Sakib Nizam Khan, Samuel Marchal, Sonja Buchegger, N. Asokan:
chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change. Privacy and Identity Management 2018: 205-221 - 2015
- [c21]Benjamin Greschbach, Guillermo Rodríguez-Cano, Tomas Ericsson, Sonja Buchegger:
Design of a Privacy-Preserving Document Submission and Grading System. NordSec 2015: 64-71 - [c20]Daniel Bosk, Martin Kjellqvist, Sonja Buchegger:
Towards Perfectly Secure and Deniable Communication Using an NFC-Based Key-Exchange Scheme. NordSec 2015: 72-87 - [c19]Daniel Bosk, Sonja Buchegger:
Privacy-Preserving Access Control in Publicly Readable Storage Systems. Privacy and Identity Management 2015: 327-342 - 2014
- [c18]Oleksandr Bodriagov, Gunnar Kreitz, Sonja Buchegger:
Access control in decentralized online social networks: Applying a policy-hiding cryptographic scheme and evaluating its performance. PerCom Workshops 2014: 622-628 - [c17]Guillermo Rodríguez-Cano, Benjamin Greschbach, Sonja Buchegger:
Event Invitations in Privacy-Preserving DOSNs - Formalization and Protocol Design. Privacy and Identity Management 2014: 185-200 - [c16]Robayet Nasim, Sonja Buchegger:
XACML-Based Access Control for Decentralized Online Social Networks. UCC 2014: 671-676 - 2013
- [c15]Benjamin Greschbach, Gunnar Kreitz, Sonja Buchegger:
User Search with Knowledge Thresholds in Decentralized Online Social Networks. Privacy and Identity Management 2013: 188-202 - 2012
- [c14]Gunnar Kreitz, Oleksandr Bodriagov, Benjamin Greschbach, Guillermo Rodríguez-Cano, Sonja Buchegger:
Passwords in peer-to-peer. P2P 2012: 167-178 - [c13]Benjamin Greschbach, Gunnar Kreitz, Sonja Buchegger:
The devil is in the metadata - New privacy challenges in Decentralised Online Social Networks. PerCom Workshops 2012: 333-339 - 2011
- [c12]Oleksandr Bodriagov, Sonja Buchegger:
P2P Social Networks with Broadcast Encryption Protected Privacy. PrimeLife 2011: 197-206 - [c11]Oleksandr Bodriagov, Sonja Buchegger:
Encryption for Peer-to-Peer Social Networks. SocialCom/PASSAT 2011: 1302-1309 - 2010
- [c10]Krzysztof Rzadca, Anwitaman Datta, Sonja Buchegger:
Replica Placement in P2P Storage: Complexity and Game Theoretic Analyses. ICDCS 2010: 599-609 - 2009
- [c9]Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitaman Datta:
Enabling Secure Secret Sharing in Distributed Online Social Networks. ACSAC 2009: 419-428 - [c8]Pan Hui, Sonja Buchegger:
Groupthink and Peer Pressure: Social Influence in Online Social Network Groups. ASONAM 2009: 53-59 - [c7]Sonja Buchegger, Doris Schiöberg, Le-Hung Vu, Anwitaman Datta:
PeerSoN: P2P social networking: early experiences and insights. SNS 2009: 46-52 - 2008
- [c6]Sonja Buchegger, Tansu Alpcan:
Security games for vehicular networks. Allerton 2008: 244-251 - 2004
- [c5]Sonja Buchegger, Cédric Tissières, Jean-Yves Le Boudec:
A Test-Bed for Misbehavior Detection in Mobile Ad-hoc Networks -- How Much Can Watchdogs Really Do? WMCSA 2004: 102-111 - 2002
- [c4]Sonja Buchegger, Jean Ives Le Boundec:
Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness. GI Jahrestagung 2002: 513-517 - [c3]Sonja Buchegger, Jean-Yves Le Boudec:
Performance analysis of the CONFIDANT protocol. MobiHoc 2002: 226-236 - [c2]Sonja Buchegger, Jean-Yves Le Boudec:
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. PDP 2002: 403-410 - [c1]Daniel Bauer, Sean Rooney, Paolo Scotton, Sonja Buchegger, Ilias Iliadis:
The Performance of Measurement-Based Overlay Networks. QofIS 2002: 115-124
Parts in Books or Collections
- 2010
- [p1]Anwitaman Datta, Sonja Buchegger, Le-Hung Vu, Thorsten Strufe, Krzysztof Rzadca:
Decentralized Online Social Networks. Handbook of Social Network Technologies 2010: 349-378
Editorship
- 2015
- [e1]Sonja Buchegger, Mads Dam:
Secure IT Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings. Lecture Notes in Computer Science 9417, Springer 2015, ISBN 978-3-319-26501-8 [contents]
Reference Works
- 2004
- [r1]Jean-Yves Le Boudec, Sonja Buchegger:
Self-Policing Mobile Ad Hoc Networks. Mobile Computing Handbook 2004
Informal and Other Publications
- 2022
- [i4]Md Sakib Nizam Khan, Niklas Reje, Sonja Buchegger:
Utility Assessment of Synthetic Data Generation Methods. CoRR abs/2211.14428 (2022) - 2020
- [i3]Daniel Bosk, Yérom-David Bromberg, Sonja Buchegger, Adrien Luxey, François Taïani:
Spores: Stateless Predictive Onion Routing for E-Squads. CoRR abs/2007.04766 (2020) - 2013
- [i2]Sonja Buchegger, Jon Crowcroft, Balachander Krishnamurthy, Thorsten Strufe:
Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062). Dagstuhl Reports 3(2): 22-44 (2013) - 2008
- [i1]Hidir Aras, Clemens Beckstein, Sonja Buchegger, Peter Dittrich, Thomas Hubauer, Friederike Klan, Birgitta König-Ries, Ouri Wolfson:
08421 Working Group: Uncertainty and Trust. Uncertainty Management in Information Systems 2008
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint