You are here

Bibliography

Export 82 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is privacy  [Clear All Filters]
2017
Grothoff C. The GNUnet System. Informatique [Internet]. 2017 ;HDR:181. Available from: https://grothoff.org/christian/habil.pdf
2013
Uzunov A. Speeding Up Tor with SPDY. Computer Science. 2013 ;Master's in Computer Science:124.
Biryukov A, Pustogarov I, Weinmann R. Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization. In: Security and Privacy (SP), 2013 IEEE Symposium on. Security and Privacy (SP), 2013 IEEE Symposium on. ; 2013.
2012
Narayanan A, Toubiana V, Barocas S, Nissenbaum H, Boneh D. A Critical Look at Decentralized Personal Data Architectures. CoRR. 2012 ;abs/1202.4503.
Dyer KP, Coull SE, Ristenpart T, Shrimpton T. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy. Proceedings of the 2012 IEEE Symposium on Security and Privacy. San Francisco, CA, USA: IEEE Computer Society; 2012.
Toch E, Wang Y, Cranor LF. Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Modeling and User-Adapted Interaction [Internet]. 2012 ;22:203-220. Available from: http://dx.doi.org/10.1007/s11257-011-9110-z
2011
Luo X, Zhou P, Zhang J, Perdisci R, Lee W, Chang RKC. Exposing Invisible Timing-based Traffic Watermarks with BACKLIT. In: ACSAC'11 - Proceedings of 2011 Annual Computer Security Applications Conference . ACSAC'11 - Proceedings of 2011 Annual Computer Security Applications Conference . Orlando, FL, USA; 2011.
Au MH, Tsang PP, Kapadia A. PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users. ACM Transactions on Information and System Security ({ACM TISSEC}) [Internet]. 2011 ;14:29:1–29:34. Available from: http://doi.acm.org/10.1145/2043628.2043630
Alaggan M, Gambs S, Kermarrec A-M. Private Similarity Computation in Distributed Systems: From Cryptography to Differential Privacy. In: Anta AFernàndez, Lipari G, Roy M Principles of Distributed Systems. Vol. 7109. Principles of Distributed Systems. Springer Berlin Heidelberg; 2011. pp. 357-377. Available from: http://dx.doi.org/10.1007/978-3-642-25873-2_25
v. Loesch C, Toth GX, Baumann M. Scalability & Paranoia in a Decentralized Social Network. In: Federated Social Web. Federated Social Web. Berlin, Germany; 2011. Available from: http://secushare.org/2011-FSW-Scalability-Paranoia
Johnson A, Syverson P, Dingledine R, Mathewson N. Trust-based Anonymous Communication: Adversary Models and Routing Algorithms. In: CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. Chicago, IL, United States: ACM; 2011.
Panchenko A, Niessen L, Zinnen A, Engel T. Website Fingerprinting in Onion Routing Based Anonymization Networks. In: WPES'11 - Proceedings of the Workshop on Privacy in the Electronic Society. WPES'11 - Proceedings of the Workshop on Privacy in the Electronic Society. Chicago, IL, United States: ACM; 2011.
Calandrino JA, Kilzer A, Narayanan A, Felten EW, Shmatikov V. "You Might Also Like:" Privacy Risks of Collaborative Filtering. In: Security and Privacy (SP), 2011 IEEE Symposium on. Security and Privacy (SP), 2011 IEEE Symposium on. ; 2011.
2010
Pang H, Shen J, Krishnan R. Privacy-preserving similarity-based text retrieval. ACM Trans. Internet Technol. 2010 ;10:1–39.
Inan A, Kantarcioglu M, Ghinita G, Bertino E. Private Record Matching Using Differential Privacy. In: Proceedings of the 13th International Conference on Extending Database Technology. Proceedings of the 13th International Conference on Extending Database Technology. New York, NY, USA: ACM; 2010. Available from: http://doi.acm.org/10.1145/1739041.1739059
Burkhart M, Strasser M, Many D, Dimitropoulos X. SEPIA: privacy-preserving aggregation of multi-domain network events and statistics. In: Proceedings of the 19th USENIX conference on Security. Proceedings of the 19th USENIX conference on Security. Washington, DC, USA: USENIX Association; 2010. pp. 15–15. Available from: http://dl.acm.org/citation.cfm?id=1929820.1929840
2009
Edman M, Syverson P. AS-awareness in Tor path selection. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 380–389. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653708
Narayanan A, Shmatikov V. De-anonymizing Social Networks. In: Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. IEEE Computer Society; 2009. pp. 173–187. Available from: http://randomwalker.info/social-networks/
Bogetoft P, Christensen DL, Damgárd I, Geisler M, Jakobsen T, Krøigaard M, Nielsen JD, Nielsen JB, Nielsen K, Pagter J, et al. Financial Cryptography and Data Security. In: Dingledine R, Golle P Financial Cryptography and Data Security. Vol. 6052. 1stst ed. Financial Cryptography and Data Security. Berlin, Heidelberg: Springer-Verlag; 2009. pp. 325–343. Available from: http://dx.doi.org/10.1007/978-3-642-03549-4_20
Vasserman EY, Jansen R, Tyra J, Hopper NJ, Kim Y. Membership-concealing overlay networks. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 390–399. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653709
Tsang PP, Kapadia A, Cornelius C, Smith S. Nymble: Blocking Misbehaving Users in Anonymizing Networks. IEEE Transactions on Dependable and Secure Computing (TDSC) [Internet]. 2009 . Available from: http://www.computer.org/portal/web/csdl/doi/10.1109/TDSC.2009.38
Wright C, Coull SE, Monrose F. Traffic Morphing: An efficient defense against statistical traffic analysis. In: Proceedings of the Network and Distributed Security Symposium - {NDSS} '09. Proceedings of the Network and Distributed Security Symposium - {NDSS} '09. IEEE; 2009.
Chen Y, Sion R, Carbunar B. XPay: Practical anonymous payments for Tor routing and other networked services. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). ACM; 2009. Available from: http://portal.acm.org/citation.cfm?id=1655188.1655195

Pages