default search action
14th PETS 2014: Amsterdam, The Netherlands
- Emiliano De Cristofaro, Steven J. Murdoch:
Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings. Lecture Notes in Computer Science 8555, Springer 2014, ISBN 978-3-319-08505-0 - Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov:
CloudTransport: Using Cloud Storage for Censorship-Resistant Networking. 1-20 - Konstantinos Chatzikokolakis, Catuscia Palamidessi, Marco Stronati:
A Predictive Differentially-Private Mechanism for Mobility Traces. 21-41 - Terence Chen, Roksana Boreli, Mohamed Ali Kâafar, Arik Friedman:
On the Effectiveness of Obfuscation Techniques in Online Social Networks. 42-62 - Casey Devet, Ian Goldberg:
The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency. 63-82 - Jens Grossklags, Nigel J. Barradale:
Social Status and the Demand for Security and Privacy. 83-101 - Hamza Harkous, Rameez Rahman, Karl Aberer:
C3P: Context-Aware Crowdsourced Cloud Privacy. 102-122 - Wouter Lueks, Jaap-Henk Hoepman, Klaus Kursawe:
Forward-Secure Distributed Encryption. 123-142 - Brad Miller, Ling Huang, Anthony D. Joseph, J. D. Tygar:
I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis. 143-163 - Tehila Minkus, Keith W. Ross:
I Know What You're Buying: Privacy Breaches on eBay. 164-183 - Alexandra-Mihaela Olteanu, Kévin Huguenin, Reza Shokri, Jean-Pierre Hubaux:
Quantifying the Effect of Co-location Information on Location Privacy. 184-203 - Simon Oya, Carmela Troncoso, Fernando Pérez-González:
Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications. 204-223 - Vasile Claudiu Perta, Marco Valerio Barbera, Alessandro Mei:
Exploiting Delay Patterns for User IPs Identification in Cellular Networks. 224-243 - Karen Renaud, Melanie Volkamer, Arne Renkema-Padmos:
Why Doesn't Jane Protect Her Privacy? 244-262 - Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe:
Measuring Freenet in the Wild: Censorship-Resilience under Observation. 263-282 - Jody Sankey, Matthew K. Wright:
Dovetail: Stronger Anonymity in Next-Generation Internet Routing. 283-303 - Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar R. Weippl:
Spoiled Onions: Exposing Malicious Tor Exit Relays. 304-331
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.