Conferences in DBLP
Len Sassaman , Bram Cohen , Nick Mathewson The pynchon gate: a secure method of pseudonymous mail retrieval. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:1-9 [Conf ] Nicola Zannone , Sushil Jajodia , Fabio Massacci , Duminda Wijesekera Maintaining privacy on derived objects. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:10-19 [Conf ] Brian Shand , Jem Rashbass Protecting privacy in tabular healthcare data: explicit uncertainty for disclosure control. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:20-26 [Conf ] Günter Karjoth , Paul A. Moskowitz Disabling RFID tags with visible confirmation: clipped tags are silenced. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:27-30 [Conf ] David Molnar , Andrea Soppera , David Wagner Privacy for RFID through trusted computing. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:31-34 [Conf ] Theodoros Balopoulos , Stefanos Gritzalis , Sokratis K. Katsikas Specifying electronic voting protocols in typed MSR. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:35-39 [Conf ] Michael Backes , Jan Camenisch , Dieter Sommer Anonymous yet accountable access control. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:40-46 [Conf ] Keith Irwin , Ting Yu Determining user privacy preferences by asking the right questions: an automated approach. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:47-50 [Conf ] Travis D. Breaux , Annie I. Antón Mining rule semantics to understand legislative compliance. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:51-54 [Conf ] Yasunobu Nohara , Sozo Inoue , Kensuke Baba , Hiroto Yasuura Quantitative evaluation of unlinkable ID matching schemes. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:55-60 [Conf ] Ari Juels , Dario Catalano , Markus Jakobsson Coercion-resistant electronic elections. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:61-70 [Conf ] Ralph Gross , Alessandro Acquisti , H. John Heinz III Information revelation and privacy in online social networks. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:71-80 [Conf ] Mario Di Raimondo , Rosario Gennaro , Hugo Krawczyk Secure off-the-record messaging. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:81-89 [Conf ] Braden Kowitz , Lorrie Faith Cranor Peripheral privacy notifications for wireless networks. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:90-96 [Conf ] Sumit Joshi , Yu-An Sun , Poorvi L. Vora The privacy cost of the second-chance offer. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:97-106 [Conf ]