


default search action
14th PETS 2014: Amsterdam, The Netherlands
- Emiliano De Cristofaro, Steven J. Murdoch

:
Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings. Lecture Notes in Computer Science 8555, Springer 2014, ISBN 978-3-319-08505-0 - Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov:

CloudTransport: Using Cloud Storage for Censorship-Resistant Networking. 1-20 - Konstantinos Chatzikokolakis, Catuscia Palamidessi

, Marco Stronati:
A Predictive Differentially-Private Mechanism for Mobility Traces. 21-41 - Terence Chen, Roksana Boreli, Mohamed Ali Kâafar

, Arik Friedman:
On the Effectiveness of Obfuscation Techniques in Online Social Networks. 42-62 - Casey Devet, Ian Goldberg:

The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency. 63-82 - Jens Grossklags, Nigel J. Barradale:

Social Status and the Demand for Security and Privacy. 83-101 - Hamza Harkous, Rameez Rahman, Karl Aberer:

C3P: Context-Aware Crowdsourced Cloud Privacy. 102-122 - Wouter Lueks, Jaap-Henk Hoepman, Klaus Kursawe:

Forward-Secure Distributed Encryption. 123-142 - Brad Miller, Ling Huang, Anthony D. Joseph

, J. D. Tygar:
I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis. 143-163 - Tehila Minkus, Keith W. Ross:

I Know What You're Buying: Privacy Breaches on eBay. 164-183 - Alexandra-Mihaela Olteanu, Kévin Huguenin

, Reza Shokri, Jean-Pierre Hubaux:
Quantifying the Effect of Co-location Information on Location Privacy. 184-203 - Simon Oya, Carmela Troncoso

, Fernando Pérez-González
:
Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications. 204-223 - Vasile Claudiu Perta, Marco Valerio Barbera, Alessandro Mei

:
Exploiting Delay Patterns for User IPs Identification in Cellular Networks. 224-243 - Karen Renaud

, Melanie Volkamer, Arne Renkema-Padmos:
Why Doesn't Jane Protect Her Privacy? 244-262 - Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe:

Measuring Freenet in the Wild: Censorship-Resilience under Observation. 263-282 - Jody Sankey, Matthew K. Wright

:
Dovetail: Stronger Anonymity in Next-Generation Internet Routing. 283-303 - Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar R. Weippl:

Spoiled Onions: Exposing Malicious Tor Exit Relays. 304-331

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














