|
Conferences in DBLP
- Lorrie Faith Cranor, Manjula Arjula, Praveen Guduru
Use of a P3P user agent by early adopters. [Citation Graph (0, 0)][DBLP] WPES, 2002, pp:1-10 [Conf]
- Simon Byers, Aviel D. Rubin, David P. Kormann
Defending against an Internet-based attack on the physical world. [Citation Graph (0, 0)][DBLP] WPES, 2002, pp:11-18 [Conf]
- Giuseppe Ateniese, Breno de Medeiros
Anonymous E-prescriptions. [Citation Graph (0, 0)][DBLP] WPES, 2002, pp:19-31 [Conf]
- Dmitri Asonov, Johann Christoph Freytag
Repudiative information retrieval. [Citation Graph (0, 0)][DBLP] WPES, 2002, pp:32-40 [Conf]
- William H. Winsborough, Ninghui Li
Protecting sensitive attributes in automated trust negotiation. [Citation Graph (0, 0)][DBLP] WPES, 2002, pp:41-51 [Conf]
- Birgit Pfitzmann, Michael Waidner
Privacy in browser-based attribute exchange. [Citation Graph (0, 0)][DBLP] WPES, 2002, pp:52-62 [Conf]
- Yuval Elovici, Bracha Shapira, Adlai Maschiach
A new privacy model for hiding group interests while accessing the Web. [Citation Graph (0, 0)][DBLP] WPES, 2002, pp:63-70 [Conf]
- Bruno Gusmão Rocha, Virgílio A. F. Almeida, Lucila Ishitani, Wagner Meira Jr.
Disclosing users' data in an environment that preserves privacy. [Citation Graph (0, 0)][DBLP] WPES, 2002, pp:71-80 [Conf]
- Csilla Farkas, Gábor Ziegler, Attila Meretei, András Lörincz
Anonymity and accountability in self-organizing electronic communities. [Citation Graph (0, 0)][DBLP] WPES, 2002, pp:81-90 [Conf]
- Marc Rennhard, Bernhard Plattner
Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection. [Citation Graph (0, 0)][DBLP] WPES, 2002, pp:91-102 [Conf]
- Paul Ashley, Satoshi Hada, Günter Karjoth, Matthias Schunter
E-P3P privacy policies and privacy authorization. [Citation Graph (0, 0)][DBLP] WPES, 2002, pp:103-109 [Conf]
|