Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Tidjani Négadi
Claudia Calabrese
Berdakh Abibullaev
Silvia N. Schiaffino
Bhuvana, J.
Jhonathan Pinzon
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
RAQUEL HILL
Author Info
Open Visualization
Name
Affiliation
Papers
RAQUEL HILL
Indiana University, Bloomington, US
18
Collaborators
Citations
PageRank
40
57
7.81
Referers
Referees
References
135
371
170
Search Limit
100
371
Publications (18 rows)
Collaborators (40 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Integrity Protection for Scientific Workflow Data: Motivation and Initial Experiences
0
0.34
2019
Using Bursty Announcements for Early Detection of BGP Routing Anomalies.
0
0.34
2019
Bridging the Trust Gap: Integrating Models of Behavior and Perception
1
0.36
2015
A Quantitative Approach for Evaluating the Utility of a Differentially Private Behavioral Science Dataset
0
0.34
2014
Quantifying and Classifying Covert Communications on Android
0
0.34
2014
First international workshop on privacy and security in programming (PSP).
0
0.34
2014
A Language Based Security Approach for Securing Map-Reduce Computations in the Cloud
1
0.37
2013
Uniqueness and how it impacts privacy in health-related social science datasets
1
0.36
2012
Original Article: Access control using threshold cryptography for ubiquitous computing environments
3
0.39
2011
StaticTrust: A Practical Framework for Trusted Networked Devices
2
0.40
2011
Access control using threshold cryptography for ubiquitous computing environments
2
0.37
2011
An Access Control Architecture for Distributing Trust in Pervasive Computing Environments
0
0.34
2010
Building a trusted image for embedded systems
2
0.39
2010
Trust Model for Open Resource Control Architecture
0
0.34
2010
Context and Location-Aware Encryption for Pervasive Computing Environments
16
0.83
2006
Supporting dynamically changing authorizations in pervasive communication systems
10
0.69
2005
Quantifying Non-Functional Requirements: A Process Oriented Approach
6
0.60
2004
A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures
13
0.69
2004
1