The SCEAS System
Navigation Menu

Conferences in DBLP

Privacy Enhancing Technologies (pet)
2005 (conf/pet/2005)

  1. George Dean Bissias, Marc Liberatore, David Jensen, Brian Neil Levine
    Privacy Vulnerabilities in Encrypted HTTP Streams. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:1-11 [Conf]
  2. Nikita Borisov
    An Analysis of Parallel Mixing with Attacker-Controlled Inputs. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:12-25 [Conf]
  3. Andrei Serjantov, Steven J. Murdoch
    Message Splitting Against the Partial Adversary. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:26-39 [Conf]
  4. Geir M. Køien, Vladimir A. Oleshchuk
    Location Privacy for Cellular Systems; Analysis and Solution. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:40-58 [Conf]
  5. Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki
    Towards Modeling Wireless Location Privacy. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:59-77 [Conf]
  6. Richard Clayton
    Failures in a Hybrid Content Blocking System. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:78-92 [Conf]
  7. Indrakshi Ray, Elisa Bertino, Anna Cinzia Squicciarini, Elena Ferrari
    Anonymity Preserving Techniques in Trust Negotiations. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:93-109 [Conf]
  8. Ye Zhu, Riccardo Bettati
    Unmixing Mix Traffic. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:110-127 [Conf]
  9. Jan Camenisch, Anton Mityagin
    Mix-Network with Stronger Security. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:128-146 [Conf]
  10. Norka B. Lucena, Grzegorz Lewandowski, Steve J. Chapin
    Covert Channels in IPv6. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:147-166 [Conf]
  11. Katrin Borcea, Hilko Donker, Elke Franz, Andreas Pfitzmann, Hagen Wahrig
    Towards Privacy-Aware eLearning. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:167-178 [Conf]
  12. Tønnes Brekne, André Årnes, Arne Øslebø
    Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:179-196 [Conf]
  13. Florian Dötzer
    Privacy Issues in Vehicular Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:197-209 [Conf]
  14. Ari Juels, Paul F. Syverson, Daniel V. Bailey
    High-Power Proxies for Enhancing RFID Privacy and Utility. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:210-226 [Conf]
  15. Ralph Gross, Edoardo Airoldi, Bradley Malin, Latanya Sweeney
    Integrating Utility into Face De-identification. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:227-242 [Conf]
  16. Ponnurangam Kumaraguru, Lorrie Faith Cranor
    Privacy in India: Attitudes and Awareness. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:243-258 [Conf]
  17. Sven Koble, Rainer Böhme
    Economics of Identity Management: A Supply-Side Perspective. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:259-272 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002