Conferences in DBLP
Thomas S. Heydt-Benjamin , Hee-Jin Chae , Benessa Defend , Kevin Fu Privacy for Public Transportation. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:1-19 [Conf ] Richard Clayton , Steven J. Murdoch , Robert N. M. Watson Ignoring the Great Firewall of China. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:20-35 [Conf ] Alessandro Acquisti , Ralph Gross Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:36-58 [Conf ] Mansour Alsaleh , Carlisle Adams Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:59-77 [Conf ] Anna Cinzia Squicciarini , Abhilasha Bhargav-Spantzel , Alexei Czeskis , Elisa Bertino Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:78-98 [Conf ] Chris Vanden Berghe , Matthias Schunter Privacy Injector - Automated Privacy Enforcement Through Aspects. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:99-117 [Conf ] Marco Casassa Mont , Robert Thyne A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:118-134 [Conf ] Simson L. Garfinkel , David J. Malan One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:135-151 [Conf ] Nicholas Paul Sheppard , Reihaneh Safavi-Naini Protecting Privacy with the MPEG-21 IPMP Framework. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:152-171 [Conf ] Mina Deng , Lothar Fritsch , Klaus Kursawe Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:172-189 [Conf ] Giuseppe Ciaccio Improving Sender Anonymity in a Structured Overlay with Imprecise Routing. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:190-207 [Conf ] Luis von Ahn , Andrew Bortz , Nicholas J. Hopper , Kevin O'Neill Selectively Traceable Anonymity. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:208-222 [Conf ] Lasse Øverlier , Paul Syverson Valet Services: Improving Hidden Servers with a Personal Touch. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:223-244 [Conf ] Roger Dingledine , Andrei Serjantov , Paul F. Syverson Blending Different Latency Traffic with Alpha-mixing. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:245-257 [Conf ] Joseph A. Calandrino , Alfred C. Weaver Private Resource Pairing. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:258-276 [Conf ] Susan Hohenberger , Stephen A. Weis Honest-Verifier Private Disjointness Testing Without Random Oracles. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:277-294 [Conf ] Gene Tsudik , Shouhuai Xu A Flexible Framework for Secret Handshakes. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:295-315 [Conf ] Ian Goldberg On the Security of the Tor Authentication Protocol. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:316-331 [Conf ] Levente Buttyán , Tamás Holczer , István Vajda Optimal Key-Trees for Tree-Based Private Authentication. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:332-350 [Conf ] John Solis , Gene Tsudik Simple and Flexible Revocation Checking with Privacy. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:351-367 [Conf ] Parisa Tabriz , Nikita Borisov Breaking the Collusion Detection Mechanism of MorphMix. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:368-383 [Conf ] Andreas Pashalidis , Bernd Meyer Linking Anonymous Transactions: The Consistent View Attack. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:384-392 [Conf ] Reynold Cheng , Yu Zhang , Elisa Bertino , Sunil Prabhakar Preserving User Location Privacy in Mobile Data Management Infrastructures. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:393-412 [Conf ] Bradley Malin , Edoardo Airoldi The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:413-429 [Conf ]