You are here

Bibliography

Export 20 results:
Author Title Type [ Year(Asc)]
Filters: Author is Philippe Golle  [Clear All Filters]
2009
Bogetoft P, Christensen DL, Damgárd I, Geisler M, Jakobsen T, Krøigaard M, Nielsen JD, Nielsen JB, Nielsen K, Pagter J, et al. Financial Cryptography and Data Security. In: Dingledine R, Golle P Financial Cryptography and Data Security. Vol. 6052. 1stst ed. Financial Cryptography and Data Security. Berlin, Heidelberg: Springer-Verlag; 2009. pp. 325–343. Available from: http://dx.doi.org/10.1007/978-3-642-03549-4_20
2007
Øverlier L, Syverson P. Improving Efficiency and Simplicity of Tor circuit establishment and hidden services. In: Borisov N, Golle P Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Ottawa, Canada: Springer; 2007. Available from: http://www.springerlink.com/content/j68v312681l8v874/
Murdoch SJ, Zieliński P. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries. In: Borisov N, Golle P Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Ottawa, Canada: Springer; 2007.
Danezis G, Diaz C, Troncoso C. Two-Sided Statistical Disclosure Attack. In: Borisov N, Golle P Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Ottawa, Canada: Springer; 2007. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.7347
2006
Dingledine R, Serjantov A, Syverson P. Blending Different Latency Traffic with Alpha-Mixing. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 245–257. Available from: http://www.springerlink.com/content/m23510526727k317/
Tabriz P, Borisov N. Breaking the Collusion Detection Mechanism of MorphMix. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 368–384. Available from: http://www.springerlink.com/content/p2612108665331n7/
Golle P, Wang XF, Jakobsson M, Tsow A. Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy. Proceedings of the 2006 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE CS; 2006. pp. 121–131. Available from: http://portal.acm.org/citation.cfm?id=1698750.1698758
Clayton R, Murdoch SJ, Watson RNM. Ignoring the Great Firewall of China. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 20–35. Available from: http://www.springerlink.com/content/7224582654260k03/
Ciaccio G. Improving Sender Anonymity in a Structured Overlay with Imprecise Routing. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 190–207. Available from: http://www.springerlink.com/content/v473127846n07255/
Pashalidis A, Meyer B. Linking Anonymous Transactions: The Consistent View Attack. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 384–392. Available from: http://www.springerlink.com/content/y6l6412387663581/
Heydt-Benjamin TS, Chae H-J, Defend B, Fu K. Privacy for Public Transportation. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 1–19. Available from: http://www.springerlink.com/content/c75053mr42n82wv5/
Goldberg I. On the Security of the Tor Authentication Protocol. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 316–331. Available from: http://www.springerlink.com/content/n77w19002743xu51/
Øverlier L, Syverson P. Valet Services: Improving Hidden Servers with a Personal Touch. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 223–244. Available from: http://www.springerlink.com/content/d58607007777r8l1/
2004
Golle P, Juels A. Dining Cryptographers Revisited. In: Proceedings of Eurocrypt 2004. Proceedings of Eurocrypt 2004. Springer Berlin / Heidelberg; 2004. Available from: http://www.springerlink.com/content/ud2tb1fyk5m2ywlu/
Golle P, Juels A. Parallel Mixing. In: Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004). Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004). Washington DC, USA: ACM Press; 2004. Available from: http://portal.acm.org/citation.cfm?id=1030113
Golle P. Reputable Mix Networks. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2004). Vol. 3424. Proceedings of Privacy Enhancing Technologies workshop (PET 2004). ; 2004. pp. 51–63. Available from: http://www.springerlink.com/content/mqpu4nyljy82ca90/
Golle P, Jakobsson M, Juels A, Syverson P. Universal Re-Encryption for Mixnets. In: Proceedings of the 2004 RSA Conference, Cryptographer's track. Proceedings of the 2004 RSA Conference, Cryptographer's track. San Francisco, USA: Springer Berlin / Heidelberg; 2004. Available from: http://www.springerlink.com/content/1fu5qrb1a2kfe7f9/
2003
Golle P, Jakobsson M. Reusable Anonymous Return Channels. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003). Washington, DC, USA: ACM New York, NY, USA; 2003. Available from: http://portal.acm.org/citation.cfm?id=1005155
2002
Boneh D, Golle P. Almost Entirely Correct Mixing With Application to Voting. In: Atluri V Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002). Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002). Washington, DC: ACM New York, NY, USA; 2002. pp. 68–77. Available from: http://portal.acm.org/citation.cfm?id=586121
2001
Golle P, Leyton-Brown K, Mironov I, Lillibridge M. Incentives for Sharing in Peer-to-Peer Networks. In: EC'01: Proceedings of the Second International Workshop on Electronic Commerce. EC'01: Proceedings of the Second International Workshop on Electronic Commerce. London, UK: Springer-Verlag; 2001. pp. 75-87 .