Calculated based on number of publications stored in Pure and citations from Scopus
20052024

Research activity per year

Search results

  • 2013

    A scanner darkly: Protecting user privacy from perceptual applications

    Jana, S., Narayanan, A. & Shmatikov, V., 2013, Proceedings - 2013 IEEE Symposium on Security and Privacy, SP 2013. p. 349-363 15 p. 6547120. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    120 Scopus citations
  • What happened to the crypto dream?, part 1

    Narayanan, A., 2013, In: IEEE Security and Privacy. 11, 2, p. 75-76 2 p., 6493328.

    Research output: Contribution to journalArticlepeer-review

    23 Scopus citations
  • What happened to the crypto dream?, Part 2

    Narayanan, A., 2013, In: IEEE Security and Privacy. 11, 3, p. 68-71 4 p., 6521314.

    Research output: Contribution to journalArticlepeer-review

    6 Scopus citations
  • 2012

    On the feasibility of internet-scale author identification

    Narayanan, A., Paskov, H., Gong, N. Z., Bethencourt, J., Stefanov, E., Shin, E. C. R. & Song, D., 2012, Proceedings - 2012 IEEE Symposium on Security and Privacy, S and P 2012. Institute of Electrical and Electronics Engineers Inc., p. 300-314 15 p. 6234420. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    202 Scopus citations
  • 2011

    Link prediction by de-anonymization: How We Won the Kaggle Social Network Challenge

    Narayanan, A., Shi, E. & Rubinstein, B. I. P., 2011, 2011 International Joint Conference on Neural Networks, IJCNN 2011 - Final Program. p. 1825-1834 10 p. 6033446. (Proceedings of the International Joint Conference on Neural Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    114 Scopus citations
  • Location Privacy via Private Proximity Testing

    Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M. & Boneh, D., 2011.

    Research output: Contribution to conferencePaperpeer-review

    261 Scopus citations
  • The case for RAMC loud

    Ousterhout, J., Agrawal, P., Erickson, D., Kozyrakis, C., Leverich, J., Mazières, D., Mitra, S., Narayanan, A., Ongaro, D., Parulkar, G., Rosenblum, M., Rumble, S. M., Stratmann, E. & Stutsman, R., Jul 2011, In: Communications of the ACM. 54, 7, p. 121-130 10 p.

    Research output: Contribution to journalArticlepeer-review

    140 Scopus citations
  • "You might also like:" Privacy risks of collaborative filtering

    Calandrino, J. A., Kilzer, A., Narayanan, A., Felten, E. W. & Shmatikov, V., 2011, Proceedings - 2011 IEEE Symposium on Security and Privacy, SP 2011. Institute of Electrical and Electronics Engineers Inc., p. 231-246 16 p. 5958032. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    262 Scopus citations
  • 2010

    Adnostic: Privacy Preserving Targeted Advertising

    Toubiana, V., Narayanan, A., Boneh, D., Nissenbaum, H. & Barocas, S., 2010.

    Research output: Contribution to conferencePaperpeer-review

    196 Scopus citations
  • Myths and fallacies of personally identifiable information

    Narayanan, A. & Shmatikov, V., Jun 1 2010, In: Communications of the ACM. 53, 6, p. 24-26 3 p.

    Research output: Contribution to journalComment/debatepeer-review

    254 Scopus citations
  • 2009

    De-anonymizing social networks

    Narayanan, A. & Shmatikov, V., 2009, 2009 30th IEEE Symposium on Security and Privacy. p. 173-187 15 p. 5207644. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    974 Scopus citations
  • 2008

    Robust de-anonymization of large sparse datasets

    Narayanan, A. & Shmatikov, V., 2008, Proceedings - 2008 IEEE Symposium on Security and Privacy, SP. p. 111-125 15 p. 4531148. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1666 Scopus citations
  • 2007

    Uncircumventable enforcement of privacy policies via cryptographic obfuscation

    Narayanan, A. & Shmatikov, V., Jan 1 2007, Digital Privacy: Theory, Technologies, and Practices. CRC Press, p. 155-171 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2005

    Fast dictionary attacks on passwords using time-space tradeoff

    Narayanan, A. & Shmatikov, V., 2005, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security. p. 364-372 9 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    369 Scopus citations
  • Obfuscated databases and group privacy

    Narayanan, A. & Shmatikov, V., 2005, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security. p. 102-111 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Scopus citations