


default search action
6th PET 2006: Cambridge, UK
- George Danezis, Philippe Golle:

Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4258, Springer 2006, ISBN 3-540-68790-4 - Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, Kevin Fu:

Privacy for Public Transportation. 1-19 - Richard Clayton, Steven J. Murdoch

, Robert N. M. Watson:
Ignoring the Great Firewall of China. 20-35 - Alessandro Acquisti, Ralph Gross:

Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. 36-58 - Mansour Alsaleh, Carlisle Adams:

Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks. 59-77 - Anna Cinzia Squicciarini

, Abhilasha Bhargav-Spantzel, Alexei Czeskis, Elisa Bertino:
Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management. 78-98 - Chris Vanden Berghe, Matthias Schunter:

Privacy Injector - Automated Privacy Enforcement Through Aspects. 99-117 - Marco Casassa Mont

, Robert Thyne:
A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. 118-134 - Simson L. Garfinkel

, David J. Malan:
One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique. 135-151 - Nicholas Paul Sheppard

, Reihaneh Safavi-Naini:
Protecting Privacy with the MPEG-21 IPMP Framework. 152-171 - Mina Deng, Lothar Fritsch, Klaus Kursawe:

Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement. 172-189 - Giuseppe Ciaccio:

Improving Sender Anonymity in a Structured Overlay with Imprecise Routing. 190-207 - Luis von Ahn, Andrew Bortz, Nicholas J. Hopper, Kevin O'Neill:

Selectively Traceable Anonymity. 208-222 - Lasse Øverlier, Paul F. Syverson:

Valet Services: Improving Hidden Servers with a Personal Touch. 223-244 - Roger Dingledine, Andrei Serjantov, Paul F. Syverson:

Blending Different Latency Traffic with Alpha-mixing. 245-257 - Joseph A. Calandrino

, Alfred C. Weaver
:
Private Resource Pairing. 258-276 - Susan Hohenberger, Stephen A. Weis

:
Honest-Verifier Private Disjointness Testing Without Random Oracles. 277-294 - Gene Tsudik, Shouhuai Xu:

A Flexible Framework for Secret Handshakes. 295-315 - Ian Goldberg:

On the Security of the Tor Authentication Protocol. 316-331 - Levente Buttyán, Tamás Holczer, István Vajda:

Optimal Key-Trees for Tree-Based Private Authentication. 332-350 - John Solis, Gene Tsudik:

Simple and Flexible Revocation Checking with Privacy. 351-367 - Parisa Tabriz, Nikita Borisov

:
Breaking the Collusion Detection Mechanism of MorphMix. 368-383 - Andreas Pashalidis, Bernd Meyer:

Linking Anonymous Transactions: The Consistent View Attack. 384-392 - Reynold Cheng

, Yu Zhang, Elisa Bertino, Sunil Prabhakar
:
Preserving User Location Privacy in Mobile Data Management Infrastructures. 393-412 - Bradley A. Malin

, Edoardo M. Airoldi
:
The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment. 413-429

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














