callback( { "result":{ "query":":facetid:toc:\"db/conf/pet/pets2014.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"65.82" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"17", "@dc":"17", "@oc":"17", "@id":"43419047", "text":":facetid:toc:db/conf/pet/pets2014.bht" } }, "hits":{ "@total":"17", "@computed":"17", "@sent":"17", "@first":"0", "hit":[{ "@score":"1", "@id":"3929905", "info":{"authors":{"author":[{"@pid":"131/5091","text":"Chad Brubaker"},{"@pid":"22/1797","text":"Amir Houmansadr"},{"@pid":"46/6275","text":"Vitaly Shmatikov"}]},"title":"CloudTransport: Using Cloud Storage for Censorship-Resistant Networking.","venue":"Privacy Enhancing Technologies","pages":"1-20","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pet/BrubakerHS14","doi":"10.1007/978-3-319-08506-7_1","ee":"https://doi.org/10.1007/978-3-319-08506-7_1","url":"https://dblp.org/rec/conf/pet/BrubakerHS14"}, "url":"URL#3929905" }, { "@score":"1", "@id":"3929906", "info":{"authors":{"author":[{"@pid":"32/858","text":"Konstantinos Chatzikokolakis 0001"},{"@pid":"p/CPalamidessi","text":"Catuscia Palamidessi"},{"@pid":"117/3772","text":"Marco Stronati"}]},"title":"A Predictive Differentially-Private Mechanism for Mobility Traces.","venue":"Privacy Enhancing Technologies","pages":"21-41","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pet/ChatzikokolakisPS14","doi":"10.1007/978-3-319-08506-7_2","ee":"https://doi.org/10.1007/978-3-319-08506-7_2","url":"https://dblp.org/rec/conf/pet/ChatzikokolakisPS14"}, "url":"URL#3929906" }, { "@score":"1", "@id":"3929907", "info":{"authors":{"author":[{"@pid":"39/7207","text":"Terence Chen"},{"@pid":"62/3483","text":"Roksana Boreli"},{"@pid":"71/5612","text":"Mohamed Ali Kâafar"},{"@pid":"41/5132","text":"Arik Friedman"}]},"title":"On the Effectiveness of Obfuscation Techniques in Online Social Networks.","venue":"Privacy Enhancing Technologies","pages":"42-62","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pet/ChenBKF14","doi":"10.1007/978-3-319-08506-7_3","ee":"https://doi.org/10.1007/978-3-319-08506-7_3","url":"https://dblp.org/rec/conf/pet/ChenBKF14"}, "url":"URL#3929907" }, { "@score":"1", "@id":"3929908", "info":{"authors":{"author":[{"@pid":"36/11043","text":"Casey Devet"},{"@pid":"04/6434","text":"Ian Goldberg"}]},"title":"The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency.","venue":"Privacy Enhancing Technologies","pages":"63-82","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pet/DevetG14","doi":"10.1007/978-3-319-08506-7_4","ee":"https://doi.org/10.1007/978-3-319-08506-7_4","url":"https://dblp.org/rec/conf/pet/DevetG14"}, "url":"URL#3929908" }, { "@score":"1", "@id":"3929909", "info":{"authors":{"author":[{"@pid":"28/3855","text":"Jens Grossklags"},{"@pid":"147/1566","text":"Nigel J. Barradale"}]},"title":"Social Status and the Demand for Security and Privacy.","venue":"Privacy Enhancing Technologies","pages":"83-101","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pet/GrossklagsB14","doi":"10.1007/978-3-319-08506-7_5","ee":"https://doi.org/10.1007/978-3-319-08506-7_5","url":"https://dblp.org/rec/conf/pet/GrossklagsB14"}, "url":"URL#3929909" }, { "@score":"1", "@id":"3929910", "info":{"authors":{"author":[{"@pid":"17/9886","text":"Hamza Harkous"},{"@pid":"00/7160","text":"Rameez Rahman"},{"@pid":"a/KarlAberer","text":"Karl Aberer"}]},"title":"C3P: Context-Aware Crowdsourced Cloud Privacy.","venue":"Privacy Enhancing Technologies","pages":"102-122","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pet/HarkousRA14","doi":"10.1007/978-3-319-08506-7_6","ee":"https://doi.org/10.1007/978-3-319-08506-7_6","url":"https://dblp.org/rec/conf/pet/HarkousRA14"}, "url":"URL#3929910" }, { "@score":"1", "@id":"3929911", "info":{"authors":{"author":[{"@pid":"35/9846","text":"Wouter Lueks"},{"@pid":"h/JaapHenkHoepman","text":"Jaap-Henk Hoepman"},{"@pid":"28/3604","text":"Klaus Kursawe"}]},"title":"Forward-Secure Distributed Encryption.","venue":"Privacy Enhancing Technologies","pages":"123-142","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pet/LueksHK14","doi":"10.1007/978-3-319-08506-7_7","ee":"https://doi.org/10.1007/978-3-319-08506-7_7","url":"https://dblp.org/rec/conf/pet/LueksHK14"}, "url":"URL#3929911" }, { "@score":"1", "@id":"3929912", "info":{"authors":{"author":[{"@pid":"40/9795","text":"Brad Miller"},{"@pid":"90/3799","text":"Ling Huang"},{"@pid":"30/2317","text":"Anthony D. Joseph"},{"@pid":"t/JDTygar","text":"J. D. Tygar"}]},"title":"I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis.","venue":"Privacy Enhancing Technologies","pages":"143-163","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pet/MillerHJT14","doi":"10.1007/978-3-319-08506-7_8","ee":"https://doi.org/10.1007/978-3-319-08506-7_8","url":"https://dblp.org/rec/conf/pet/MillerHJT14"}, "url":"URL#3929912" }, { "@score":"1", "@id":"3929913", "info":{"authors":{"author":[{"@pid":"147/1523","text":"Tehila Minkus"},{"@pid":"r/KWRoss","text":"Keith W. Ross"}]},"title":"I Know What You're Buying: Privacy Breaches on eBay.","venue":"Privacy Enhancing Technologies","pages":"164-183","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pet/MinkusR14","doi":"10.1007/978-3-319-08506-7_9","ee":"https://doi.org/10.1007/978-3-319-08506-7_9","url":"https://dblp.org/rec/conf/pet/MinkusR14"}, "url":"URL#3929913" }, { "@score":"1", "@id":"3929914", "info":{"authors":{"author":[{"@pid":"147/1554","text":"Alexandra-Mihaela Olteanu"},{"@pid":"10/3024","text":"Kévin Huguenin"},{"@pid":"20/3101","text":"Reza Shokri"},{"@pid":"h/JPHubaux","text":"Jean-Pierre Hubaux"}]},"title":"Quantifying the Effect of Co-location Information on Location Privacy.","venue":"Privacy Enhancing Technologies","pages":"184-203","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pet/OlteanuHSH14","doi":"10.1007/978-3-319-08506-7_10","ee":"https://doi.org/10.1007/978-3-319-08506-7_10","url":"https://dblp.org/rec/conf/pet/OlteanuHSH14"}, "url":"URL#3929914" }, { "@score":"1", "@id":"3929915", "info":{"authors":{"author":[{"@pid":"147/1534","text":"Simon Oya"},{"@pid":"01/4825","text":"Carmela Troncoso"},{"@pid":"91/3114","text":"Fernando Pérez-González"}]},"title":"Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications.","venue":"Privacy Enhancing Technologies","pages":"204-223","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pet/OyaTP14","doi":"10.1007/978-3-319-08506-7_11","ee":"https://doi.org/10.1007/978-3-319-08506-7_11","url":"https://dblp.org/rec/conf/pet/OyaTP14"}, "url":"URL#3929915" }, { "@score":"1", "@id":"3929916", "info":{"authors":{"author":[{"@pid":"142/5294","text":"Vasile Claudiu Perta"},{"@pid":"25/9673","text":"Marco Valerio Barbera"},{"@pid":"m/AlessandroMai","text":"Alessandro Mei"}]},"title":"Exploiting Delay Patterns for User IPs Identification in Cellular Networks.","venue":"Privacy Enhancing Technologies","pages":"224-243","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pet/PertaBM14","doi":"10.1007/978-3-319-08506-7_12","ee":"https://doi.org/10.1007/978-3-319-08506-7_12","url":"https://dblp.org/rec/conf/pet/PertaBM14"}, "url":"URL#3929916" }, { "@score":"1", "@id":"3929917", "info":{"authors":{"author":[{"@pid":"r/KarenRenaud","text":"Karen Renaud"},{"@pid":"v/MelanieVolkamer","text":"Melanie Volkamer"},{"@pid":"144/5544","text":"Arne Renkema-Padmos"}]},"title":"Why Doesn't Jane Protect Her Privacy?","venue":"Privacy Enhancing Technologies","pages":"244-262","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pet/RenaudVR14","doi":"10.1007/978-3-319-08506-7_13","ee":"https://doi.org/10.1007/978-3-319-08506-7_13","url":"https://dblp.org/rec/conf/pet/RenaudVR14"}, "url":"URL#3929917" }, { "@score":"1", "@id":"3929918", "info":{"authors":{"author":[{"@pid":"57/8781","text":"Stefanie Roos"},{"@pid":"55/8733","text":"Benjamin Schiller"},{"@pid":"147/1595","text":"Stefan Hacker"},{"@pid":"69/2809","text":"Thorsten Strufe"}]},"title":"Measuring Freenet in the Wild: Censorship-Resilience under Observation.","venue":"Privacy Enhancing Technologies","pages":"263-282","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pet/RoosSHS14","doi":"10.1007/978-3-319-08506-7_14","ee":"https://doi.org/10.1007/978-3-319-08506-7_14","url":"https://dblp.org/rec/conf/pet/RoosSHS14"}, "url":"URL#3929918" }, { "@score":"1", "@id":"3929919", "info":{"authors":{"author":[{"@pid":"146/0493","text":"Jody Sankey"},{"@pid":"41/4822","text":"Matthew K. Wright"}]},"title":"Dovetail: Stronger Anonymity in Next-Generation Internet Routing.","venue":"Privacy Enhancing Technologies","pages":"283-303","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pet/SankeyW14","doi":"10.1007/978-3-319-08506-7_15","ee":"https://doi.org/10.1007/978-3-319-08506-7_15","url":"https://dblp.org/rec/conf/pet/SankeyW14"}, "url":"URL#3929919" }, { "@score":"1", "@id":"3929920", "info":{"authors":{"author":[{"@pid":"79/10265","text":"Philipp Winter"},{"@pid":"147/1590","text":"Richard Köwer"},{"@pid":"38/8102","text":"Martin Mulazzani"},{"@pid":"84/4673-1","text":"Markus Huber 0001"},{"@pid":"09/8857","text":"Sebastian Schrittwieser"},{"@pid":"60/5061","text":"Stefan Lindskog"},{"@pid":"w/EdgarRWeippl","text":"Edgar R. Weippl"}]},"title":"Spoiled Onions: Exposing Malicious Tor Exit Relays.","venue":"Privacy Enhancing Technologies","pages":"304-331","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pet/WinterKMHSLW14","doi":"10.1007/978-3-319-08506-7_16","ee":"https://doi.org/10.1007/978-3-319-08506-7_16","url":"https://dblp.org/rec/conf/pet/WinterKMHSLW14"}, "url":"URL#3929920" }, { "@score":"1", "@id":"3965012", "info":{"authors":{"author":[{"@pid":"36/6225","text":"Emiliano De Cristofaro"},{"@pid":"m/SJMurdoch","text":"Steven J. Murdoch"}]},"title":"Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings","venue":["Privacy Enhancing Technologies","Lecture Notes in Computer Science"],"volume":"8555","publisher":"Springer","year":"2014","type":"Editorship","key":"conf/pet/2014","doi":"10.1007/978-3-319-08506-7","ee":"https://doi.org/10.1007/978-3-319-08506-7","url":"https://dblp.org/rec/conf/pet/2014"}, "url":"URL#3965012" } ] } } } )