Conferences in DBLP
Ian Goldberg Privacy-Enhancing Technologies for the Internet, II: Five Years Later. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:1-12 [Conf ] Adil Alsaid , David Martin Detecting Web Bugs with Bugnosis: Privacy Advocacy through Education. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:13-26 [Conf ] Martín Abadi Private Authentication. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:27-40 [Conf ] Andrei Serjantov , George Danezis Towards an Information Theoretic Metric for Anonymity. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:41-53 [Conf ] Claudia Díaz , Stefaan Seys , Joris Claessens , Bart Preneel Towards Measuring Anonymity. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:54-68 [Conf ] Günter Karjoth , Matthias Schunter , Michael Waidner Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:69-84 [Conf ] Péter Dornbach , Zoltán Németh Privacy Enhancing Profile Disclosure. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:85-98 [Conf ] Tero Alamäki , Margareta Björksten , Péter Dornbach , Casper Gripenberg , Norbert Gyorbíró , Gábor Márton , Zoltán Németh , Timo Skyttä , Mikko Tarkiainen Privacy Enhancing Service Architectures. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:99-109 [Conf ] Oliver Berthold , Heinrich Langos Dummy Traffic against Long Term Intersection Attacks. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:110-128 [Conf ] Kent E. Seamons , Marianne Winslett , Ting Yu , Lina Yu , Ryan Jarvis Protecting Privacy during On-Line Trust Negotiation. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:129-143 [Conf ] Alexander Iliev , Sean W. Smith Prototyping an Armored Data Vault: Rights Management on Big Brother's Computer. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:144-159 [Conf ] Yingjiu Li , Lingyu Wang , Sushil Jajodia Preventing Interval-Based Inference by Random Data Perturbation. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:160-170 [Conf ] Andrew Hintz Fingerprinting Websites Using Traffic Analysis. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:171-178 [Conf ] Thomas Demuth A Passive Attack on the Privacy of Web Users Using Standard Log Information. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:179-193 [Conf ] John Giffin , Rachel Greenstadt , Peter Litwack , Richard Tibbetts Covert Messaging through TCP Timestamps. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:194-208 [Conf ] Dmitri Asonov , Johann Christoph Freytag Almost Optimal Private Information Retrieval. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:209-223 [Conf ] Dogan Kesdogan , Mark Borning , Michael Schmeink Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach? [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:224-238 [Conf ]