The SCEAS System
Navigation Menu

Conferences in DBLP

Workshop on Privacy in the Electronic Society (wpes)
2005 (conf/wpes/2005)

  1. Len Sassaman, Bram Cohen, Nick Mathewson
    The pynchon gate: a secure method of pseudonymous mail retrieval. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:1-9 [Conf]
  2. Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera
    Maintaining privacy on derived objects. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:10-19 [Conf]
  3. Brian Shand, Jem Rashbass
    Protecting privacy in tabular healthcare data: explicit uncertainty for disclosure control. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:20-26 [Conf]
  4. Günter Karjoth, Paul A. Moskowitz
    Disabling RFID tags with visible confirmation: clipped tags are silenced. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:27-30 [Conf]
  5. David Molnar, Andrea Soppera, David Wagner
    Privacy for RFID through trusted computing. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:31-34 [Conf]
  6. Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas
    Specifying electronic voting protocols in typed MSR. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:35-39 [Conf]
  7. Michael Backes, Jan Camenisch, Dieter Sommer
    Anonymous yet accountable access control. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:40-46 [Conf]
  8. Keith Irwin, Ting Yu
    Determining user privacy preferences by asking the right questions: an automated approach. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:47-50 [Conf]
  9. Travis D. Breaux, Annie I. Antón
    Mining rule semantics to understand legislative compliance. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:51-54 [Conf]
  10. Yasunobu Nohara, Sozo Inoue, Kensuke Baba, Hiroto Yasuura
    Quantitative evaluation of unlinkable ID matching schemes. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:55-60 [Conf]
  11. Ari Juels, Dario Catalano, Markus Jakobsson
    Coercion-resistant electronic elections. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:61-70 [Conf]
  12. Ralph Gross, Alessandro Acquisti, H. John Heinz III
    Information revelation and privacy in online social networks. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:71-80 [Conf]
  13. Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
    Secure off-the-record messaging. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:81-89 [Conf]
  14. Braden Kowitz, Lorrie Faith Cranor
    Peripheral privacy notifications for wireless networks. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:90-96 [Conf]
  15. Sumit Joshi, Yu-An Sun, Poorvi L. Vora
    The privacy cost of the second-chance offer. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:97-106 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002