The SCEAS System
Navigation Menu

Conferences in DBLP

Privacy Enhancing Technologies (pet)
2002 (conf/pet/2002)

  1. Ian Goldberg
    Privacy-Enhancing Technologies for the Internet, II: Five Years Later. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:1-12 [Conf]
  2. Adil Alsaid, David Martin
    Detecting Web Bugs with Bugnosis: Privacy Advocacy through Education. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:13-26 [Conf]
  3. Martín Abadi
    Private Authentication. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:27-40 [Conf]
  4. Andrei Serjantov, George Danezis
    Towards an Information Theoretic Metric for Anonymity. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:41-53 [Conf]
  5. Claudia Díaz, Stefaan Seys, Joris Claessens, Bart Preneel
    Towards Measuring Anonymity. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:54-68 [Conf]
  6. Günter Karjoth, Matthias Schunter, Michael Waidner
    Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:69-84 [Conf]
  7. Péter Dornbach, Zoltán Németh
    Privacy Enhancing Profile Disclosure. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:85-98 [Conf]
  8. Tero Alamäki, Margareta Björksten, Péter Dornbach, Casper Gripenberg, Norbert Gyorbíró, Gábor Márton, Zoltán Németh, Timo Skyttä, Mikko Tarkiainen
    Privacy Enhancing Service Architectures. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:99-109 [Conf]
  9. Oliver Berthold, Heinrich Langos
    Dummy Traffic against Long Term Intersection Attacks. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:110-128 [Conf]
  10. Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis
    Protecting Privacy during On-Line Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:129-143 [Conf]
  11. Alexander Iliev, Sean W. Smith
    Prototyping an Armored Data Vault: Rights Management on Big Brother's Computer. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:144-159 [Conf]
  12. Yingjiu Li, Lingyu Wang, Sushil Jajodia
    Preventing Interval-Based Inference by Random Data Perturbation. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:160-170 [Conf]
  13. Andrew Hintz
    Fingerprinting Websites Using Traffic Analysis. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:171-178 [Conf]
  14. Thomas Demuth
    A Passive Attack on the Privacy of Web Users Using Standard Log Information. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:179-193 [Conf]
  15. John Giffin, Rachel Greenstadt, Peter Litwack, Richard Tibbetts
    Covert Messaging through TCP Timestamps. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:194-208 [Conf]
  16. Dmitri Asonov, Johann Christoph Freytag
    Almost Optimal Private Information Retrieval. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:209-223 [Conf]
  17. Dogan Kesdogan, Mark Borning, Michael Schmeink
    Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach? [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:224-238 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002