Conferences in DBLP
Ari Juels , John G. Brainard Soft blocking: flexible blocker tags on the cheap. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:1-7 [Conf ] Keith B. Frikken , Mikhail J. Atallah Privacy preserving route planning. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:8-15 [Conf ] J. Alex Halderman , Brent R. Waters , Edward W. Felten Privacy management for portable recording devices. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:16-24 [Conf ] Julia Brande Earp , J. C. Poindexter , David L. Baumer Modeling privacy values with experimental economics. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:25- [Conf ] Keith B. Frikken , Mikhail J. Atallah , Jiangtao Li Hidden access control policies with hidden credentials. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:27- [Conf ] Emmanuel D. Pontikakis , Yannis Theodoridis , Achilleas A. Tsitsonis , LiWu Chang , Vassilios S. Verykios A quantitative and qualitative ANALYSIS of blocking in association rule hiding. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:29-30 [Conf ] Anas Abou El Kalam , Yves Deswarte , Gilles Trouessin , Emmanuel Cordonnier A generic approach for healthcare data anonymization. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:31-32 [Conf ] Arthur M. Keller , David Mertz , Joseph Lorenzo Hall , Arnold Urken Privacy issues in an electronic voting machine. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:33-34 [Conf ] William H. Stufflebeam , Annie I. Antón , Qingfeng He , Neha Jain Specifying privacy policies with P3P and EPAL: lessons learned. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:35- [Conf ] Frank Stajano Will your digital butlers betray you? [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:37-38 [Conf ] Philippe Golle , Ayman Farahat Defending email communication against profiling attacks. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:39-40 [Conf ] Nathan Good , David Molnar , Jennifer M. Urban , Deirdre K. Mulligan , Elizabeth Miles , Laura Quilter , David Wagner Radio frequency Id and privacy with information goods. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:41-42 [Conf ] Keith Irwin , Ting Yu An identifiability-based access control model for privacy protection in open systems. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:43- [Conf ] Adam Barth , John C. Mitchell , Justin Rosenstein Conflict and combination in privacy policy languages. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:45-46 [Conf ] Stefan Köpsell , Ulf Hillig How to achieve blocking resistance for existing systems enabling anonymous web surfing. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:47-58 [Conf ] George Danezis , Ben Laurie Minx: a simple and efficient anonymous packet format. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:59-65 [Conf ] Nick Feamster , Roger Dingledine Location diversity in anonymity networks. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:66-76 [Conf ] Nikita Borisov , Ian Goldberg , Eric A. Brewer Off-the-record communication, or, why not to use PGP. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:77-84 [Conf ] Traian Marius Truta , Farshad Fotouhi , Daniel C. Barth-Jones Assessing global disclosure risk in masked microdata. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:85-93 [Conf ] Christine M. O'Keefe , Ming Yung , Lifang Gu , Rohan A. Baxter Privacy-preserving data linkage protocols. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:94-102 [Conf ] Mikhail J. Atallah , Marina Bykova , Jiangtao Li , Keith B. Frikken , Mercan Topkara Private collaborative forecasting and benchmarking. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:103-114 [Conf ]