The SCEAS System
Navigation Menu

Conferences in DBLP

Privacy Enhancing Technologies (pet)
2006 (conf/pet/2006)

  1. Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, Kevin Fu
    Privacy for Public Transportation. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:1-19 [Conf]
  2. Richard Clayton, Steven J. Murdoch, Robert N. M. Watson
    Ignoring the Great Firewall of China. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:20-35 [Conf]
  3. Alessandro Acquisti, Ralph Gross
    Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:36-58 [Conf]
  4. Mansour Alsaleh, Carlisle Adams
    Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:59-77 [Conf]
  5. Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Alexei Czeskis, Elisa Bertino
    Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:78-98 [Conf]
  6. Chris Vanden Berghe, Matthias Schunter
    Privacy Injector - Automated Privacy Enforcement Through Aspects. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:99-117 [Conf]
  7. Marco Casassa Mont, Robert Thyne
    A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:118-134 [Conf]
  8. Simson L. Garfinkel, David J. Malan
    One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:135-151 [Conf]
  9. Nicholas Paul Sheppard, Reihaneh Safavi-Naini
    Protecting Privacy with the MPEG-21 IPMP Framework. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:152-171 [Conf]
  10. Mina Deng, Lothar Fritsch, Klaus Kursawe
    Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:172-189 [Conf]
  11. Giuseppe Ciaccio
    Improving Sender Anonymity in a Structured Overlay with Imprecise Routing. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:190-207 [Conf]
  12. Luis von Ahn, Andrew Bortz, Nicholas J. Hopper, Kevin O'Neill
    Selectively Traceable Anonymity. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:208-222 [Conf]
  13. Lasse Øverlier, Paul Syverson
    Valet Services: Improving Hidden Servers with a Personal Touch. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:223-244 [Conf]
  14. Roger Dingledine, Andrei Serjantov, Paul F. Syverson
    Blending Different Latency Traffic with Alpha-mixing. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:245-257 [Conf]
  15. Joseph A. Calandrino, Alfred C. Weaver
    Private Resource Pairing. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:258-276 [Conf]
  16. Susan Hohenberger, Stephen A. Weis
    Honest-Verifier Private Disjointness Testing Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:277-294 [Conf]
  17. Gene Tsudik, Shouhuai Xu
    A Flexible Framework for Secret Handshakes. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:295-315 [Conf]
  18. Ian Goldberg
    On the Security of the Tor Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:316-331 [Conf]
  19. Levente Buttyán, Tamás Holczer, István Vajda
    Optimal Key-Trees for Tree-Based Private Authentication. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:332-350 [Conf]
  20. John Solis, Gene Tsudik
    Simple and Flexible Revocation Checking with Privacy. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:351-367 [Conf]
  21. Parisa Tabriz, Nikita Borisov
    Breaking the Collusion Detection Mechanism of MorphMix. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:368-383 [Conf]
  22. Andreas Pashalidis, Bernd Meyer
    Linking Anonymous Transactions: The Consistent View Attack. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:384-392 [Conf]
  23. Reynold Cheng, Yu Zhang, Elisa Bertino, Sunil Prabhakar
    Preserving User Location Privacy in Mobile Data Management Infrastructures. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:393-412 [Conf]
  24. Bradley Malin, Edoardo Airoldi
    The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:413-429 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002