Conferences in DBLP
George Dean Bissias , Marc Liberatore , David Jensen , Brian Neil Levine Privacy Vulnerabilities in Encrypted HTTP Streams. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:1-11 [Conf ] Nikita Borisov An Analysis of Parallel Mixing with Attacker-Controlled Inputs. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:12-25 [Conf ] Andrei Serjantov , Steven J. Murdoch Message Splitting Against the Partial Adversary. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:26-39 [Conf ] Geir M. Køien , Vladimir A. Oleshchuk Location Privacy for Cellular Systems; Analysis and Solution. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:40-58 [Conf ] Leping Huang , Hiroshi Yamane , Kanta Matsuura , Kaoru Sezaki Towards Modeling Wireless Location Privacy. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:59-77 [Conf ] Richard Clayton Failures in a Hybrid Content Blocking System. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:78-92 [Conf ] Indrakshi Ray , Elisa Bertino , Anna Cinzia Squicciarini , Elena Ferrari Anonymity Preserving Techniques in Trust Negotiations. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:93-109 [Conf ] Ye Zhu , Riccardo Bettati Unmixing Mix Traffic. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:110-127 [Conf ] Jan Camenisch , Anton Mityagin Mix-Network with Stronger Security. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:128-146 [Conf ] Norka B. Lucena , Grzegorz Lewandowski , Steve J. Chapin Covert Channels in IPv6. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:147-166 [Conf ] Katrin Borcea , Hilko Donker , Elke Franz , Andreas Pfitzmann , Hagen Wahrig Towards Privacy-Aware eLearning. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:167-178 [Conf ] Tønnes Brekne , André Årnes , Arne Øslebø Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:179-196 [Conf ] Florian Dötzer Privacy Issues in Vehicular Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:197-209 [Conf ] Ari Juels , Paul F. Syverson , Daniel V. Bailey High-Power Proxies for Enhancing RFID Privacy and Utility. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:210-226 [Conf ] Ralph Gross , Edoardo Airoldi , Bradley Malin , Latanya Sweeney Integrating Utility into Face De-identification. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:227-242 [Conf ] Ponnurangam Kumaraguru , Lorrie Faith Cranor Privacy in India: Attitudes and Awareness. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:243-258 [Conf ] Sven Koble , Rainer Böhme Economics of Identity Management: A Supply-Side Perspective. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2005, pp:259-272 [Conf ]