You are here

Bibliography

Export 4 results:
Author Title Type [ Year(Asc)]
Filters: Author is Murdoch, StevenJ.  [Clear All Filters]
2014
Devet C, Goldberg I. The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency. In: De Cristofaro E, Murdoch SJ Privacy Enhancing Technologies. Vol. 8555. Privacy Enhancing Technologies. Springer International Publishing; 2014. pp. 63-82. Available from: http://dx.doi.org/10.1007/978-3-319-08506-7_4
Oya S, Troncoso C, Pérez-González F. Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications. In: De Cristofaro E, Murdoch SJ Privacy Enhancing Technologies. Vol. 8555. Privacy Enhancing Technologies. Springer International Publishing; 2014. pp. 204-223. Available from: http://dx.doi.org/10.1007/978-3-319-08506-7_11
Chen T, Boreli R, Kaafar M-A, Friedman A. On the Effectiveness of Obfuscation Techniques in Online Social Networks. In: De Cristofaro E, Murdoch SJ Privacy Enhancing Technologies. Vol. 8555. Privacy Enhancing Technologies. Springer International Publishing; 2014. pp. 42-62. Available from: http://dx.doi.org/10.1007/978-3-319-08506-7_3
Lueks W, Hoepman J-H, Kursawe K. Forward-Secure Distributed Encryption. In: De Cristofaro E, Murdoch SJ Privacy Enhancing Technologies. Vol. 8555. Privacy Enhancing Technologies. Springer International Publishing; 2014. pp. 123-142. Available from: http://dx.doi.org/10.1007/978-3-319-08506-7_7