The SCEAS System
Navigation Menu

Conferences in DBLP

Privacy Enhancing Technologies (pet)
2007 (conf/pet/2007)

  1. Matthias Franz, Bernd Meyer, Andreas Pashalidis
    Attacking Unlinkability: The Importance of Context. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:1-16 [Conf]
  2. Andrei Serjantov
    A Fresh Look at the Generalised Mix Framework. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:17-29 [Conf]
  3. George Danezis, Claudia Díaz, Carmela Troncoso
    Two-Sided Statistical Disclosure Attack. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:30-44 [Conf]
  4. Gene Tsudik
    A Family of Dunces: Trivial RFID Identification and Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:45-61 [Conf]
  5. Ge Zhong, Ian Goldberg, Urs Hengartner
    Louis, Lester and Pierre: Three Protocols for Location Privacy. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:62-76 [Conf]
  6. Markulf Kohlweiss, Sebastian Faust, Lothar Fritsch, Bartek Gedrojc, Bart Preneel
    Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:77-94 [Conf]
  7. Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
    Pairing-Based Onion Routing. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:95-112 [Conf]
  8. Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, Sean W. Smith
    Nymble: Anonymous IP-Address Blocking. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:113-133 [Conf]
  9. Lasse Øverlier, Paul Syverson
    Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:134-152 [Conf]
  10. Saikat Guha, Paul Francis
    Identity Trail: Covert Surveillance Using DNS. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:153-166 [Conf]
  11. Steven J. Murdoch, Piotr Zielinski
    Sampled Traffic Analysis by Internet-Exchange-Level Adversaries. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:167-183 [Conf]
  12. Timothy G. Abbott, Katherine J. Lai, Michael R. Lieberman, Eric C. Price
    Browser-Based Attacks on Tor. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:184-199 [Conf]
  13. Farzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini
    Enforcing P3P Policies Using a Digital Rights Management System. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:200-217 [Conf]
  14. Matthias Schunter, Michael Waidner
    Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:218-232 [Conf]
  15. Rolf Wendolsky, Dominik Herrmann, Hannes Federrath
    Performance Comparison of Low-Latency Anonymisation Services from a User Perspective. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:233-253 [Conf]
  16. Shishir Nagaraja
    Anonymity in the Wild: Mixes on Unstructured Networks. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:254-271 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002