default search action
6th PET 2006: Cambridge, UK
- George Danezis, Philippe Golle:
Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4258, Springer 2006, ISBN 3-540-68790-4 - Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, Kevin Fu:
Privacy for Public Transportation. 1-19 - Richard Clayton, Steven J. Murdoch, Robert N. M. Watson:
Ignoring the Great Firewall of China. 20-35 - Alessandro Acquisti, Ralph Gross:
Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. 36-58 - Mansour Alsaleh, Carlisle Adams:
Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks. 59-77 - Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Alexei Czeskis, Elisa Bertino:
Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management. 78-98 - Chris Vanden Berghe, Matthias Schunter:
Privacy Injector - Automated Privacy Enforcement Through Aspects. 99-117 - Marco Casassa Mont, Robert Thyne:
A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. 118-134 - Simson L. Garfinkel, David J. Malan:
One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique. 135-151 - Nicholas Paul Sheppard, Reihaneh Safavi-Naini:
Protecting Privacy with the MPEG-21 IPMP Framework. 152-171 - Mina Deng, Lothar Fritsch, Klaus Kursawe:
Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement. 172-189 - Giuseppe Ciaccio:
Improving Sender Anonymity in a Structured Overlay with Imprecise Routing. 190-207 - Luis von Ahn, Andrew Bortz, Nicholas J. Hopper, Kevin O'Neill:
Selectively Traceable Anonymity. 208-222 - Lasse Øverlier, Paul F. Syverson:
Valet Services: Improving Hidden Servers with a Personal Touch. 223-244 - Roger Dingledine, Andrei Serjantov, Paul F. Syverson:
Blending Different Latency Traffic with Alpha-mixing. 245-257 - Joseph A. Calandrino, Alfred C. Weaver:
Private Resource Pairing. 258-276 - Susan Hohenberger, Stephen A. Weis:
Honest-Verifier Private Disjointness Testing Without Random Oracles. 277-294 - Gene Tsudik, Shouhuai Xu:
A Flexible Framework for Secret Handshakes. 295-315 - Ian Goldberg:
On the Security of the Tor Authentication Protocol. 316-331 - Levente Buttyán, Tamás Holczer, István Vajda:
Optimal Key-Trees for Tree-Based Private Authentication. 332-350 - John Solis, Gene Tsudik:
Simple and Flexible Revocation Checking with Privacy. 351-367 - Parisa Tabriz, Nikita Borisov:
Breaking the Collusion Detection Mechanism of MorphMix. 368-383 - Andreas Pashalidis, Bernd Meyer:
Linking Anonymous Transactions: The Consistent View Attack. 384-392 - Reynold Cheng, Yu Zhang, Elisa Bertino, Sunil Prabhakar:
Preserving User Location Privacy in Mobile Data Management Infrastructures. 393-412 - Bradley A. Malin, Edoardo M. Airoldi:
The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment. 413-429
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.