Conferences in DBLP
Matthias Franz , Bernd Meyer , Andreas Pashalidis Attacking Unlinkability: The Importance of Context. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:1-16 [Conf ] Andrei Serjantov A Fresh Look at the Generalised Mix Framework. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:17-29 [Conf ] George Danezis , Claudia Díaz , Carmela Troncoso Two-Sided Statistical Disclosure Attack. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:30-44 [Conf ] Gene Tsudik A Family of Dunces: Trivial RFID Identification and Authentication Protocols. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:45-61 [Conf ] Ge Zhong , Ian Goldberg , Urs Hengartner Louis, Lester and Pierre: Three Protocols for Location Privacy. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:62-76 [Conf ] Markulf Kohlweiss , Sebastian Faust , Lothar Fritsch , Bartek Gedrojc , Bart Preneel Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:77-94 [Conf ] Aniket Kate , Gregory M. Zaverucha , Ian Goldberg Pairing-Based Onion Routing. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:95-112 [Conf ] Peter C. Johnson , Apu Kapadia , Patrick P. Tsang , Sean W. Smith Nymble: Anonymous IP-Address Blocking. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:113-133 [Conf ] Lasse Øverlier , Paul Syverson Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:134-152 [Conf ] Saikat Guha , Paul Francis Identity Trail: Covert Surveillance Using DNS. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:153-166 [Conf ] Steven J. Murdoch , Piotr Zielinski Sampled Traffic Analysis by Internet-Exchange-Level Adversaries. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:167-183 [Conf ] Timothy G. Abbott , Katherine J. Lai , Michael R. Lieberman , Eric C. Price Browser-Based Attacks on Tor. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:184-199 [Conf ] Farzad Salim , Nicholas Paul Sheppard , Reihaneh Safavi-Naini Enforcing P3P Policies Using a Digital Rights Management System. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:200-217 [Conf ] Matthias Schunter , Michael Waidner Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:218-232 [Conf ] Rolf Wendolsky , Dominik Herrmann , Hannes Federrath Performance Comparison of Low-Latency Anonymisation Services from a User Perspective. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:233-253 [Conf ] Shishir Nagaraja Anonymity in the Wild: Mixes on Unstructured Networks. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:254-271 [Conf ]