|
Conferences in DBLP
FlyByNight: mitigating the privacy risks of social networking. [Citation Graph (, )][DBLP]
Privacy-preserving social network analysis for criminal investigations. [Citation Graph (, )][DBLP]
Forensic genomics: kin privacy, driftnets and other open questions. [Citation Graph (, )][DBLP]
Identification via location-profiling in GSM networks. [Citation Graph (, )][DBLP]
Toward a distributed k-anonymity protocol for location privacy. [Citation Graph (, )][DBLP]
TwoKind authentication: protecting private information in untrustworthy environments. [Citation Graph (, )][DBLP]
A user study of the expandable grid applied to P3P privacy policy visualization. [Citation Graph (, )][DBLP]
CPG: closed pseudonymous groups. [Citation Graph (, )][DBLP]
Protecting privacy with protocol stack virtualization. [Citation Graph (, )][DBLP]
Preserving confidentiality of security policies in data outsourcing. [Citation Graph (, )][DBLP]
Avoiding information leakage in security-policy-aware planning. [Citation Graph (, )][DBLP]
Secure aggregation in a publish-subscribe system. [Citation Graph (, )][DBLP]
Measuring unlinkability revisited. [Citation Graph (, )][DBLP]
Revisiting a combinatorial approach toward measuring anonymity. [Citation Graph (, )][DBLP]
Yet another privacy metric for publishing micro-data. [Citation Graph (, )][DBLP]
|