Calculated based on number of publications stored in Pure and citations from Scopus
20052022

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • 2009

    De-anonymizing social networks

    Narayanan, A. & Shmatikov, V., 2009, 2009 30th IEEE Symposium on Security and Privacy. p. 173-187 15 p. 5207644. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    865 Scopus citations
  • 2008

    Robust de-anonymization of large sparse datasets

    Narayanan, A. & Shmatikov, V., 2008, Proceedings - 2008 IEEE Symposium on Security and Privacy, SP. p. 111-125 15 p. 4531148. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1335 Scopus citations
  • 2007

    Uncircumventable enforcement of privacy policies via cryptographic obfuscation

    Narayanan, A. & Shmatikov, V., Jan 1 2007, Digital Privacy: Theory, Technologies, and Practices. CRC Press, p. 155-171 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2005

    Fast dictionary attacks on passwords using time-space tradeoff

    Narayanan, A. & Shmatikov, V., 2005, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security. p. 364-372 9 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    298 Scopus citations
  • Obfuscated databases and group privacy

    Narayanan, A. & Shmatikov, V., 2005, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security. p. 102-111 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Scopus citations