-
1
-
-
78650694341
-
-
Directive 95/46/EC of the European Parliament and of the Council. OJ L 281, 23.11.1995, p. 31, October 1995
-
Directive 95/46/EC of the European Parliament and of the Council. OJ L 281, 23.11.1995, p. 31, October 1995.
-
-
-
-
6
-
-
79251645890
-
Anonymization of IP traffic data: Attacks on two prefix-preserving anonymization schemes and some proposed remedies
-
T. Brekne, A. Arnes, and A. Øslebø. Anonymization of IP traffic data: Attacks on two prefix-preserving anonymization schemes and some proposed remedies. In Workshop on Privacy Enhancing Technologies, 2005.
-
(2005)
Workshop on Privacy Enhancing Technologies
-
-
Brekne, T.1
Arnes, A.2
Øslebø, A.3
-
8
-
-
84857001241
-
An uneasy relationship: Cyber security information sharing, communications privacy, and the boundaries of the firm
-
A. Burstein. An Uneasy Relationship: Cyber Security Information Sharing, Communications Privacy, and the Boundaries of the Firm. In Workshop on the Economics of Information Security (WEIS), 2007.
-
(2007)
Workshop on the Economics of Information Security (WEIS)
-
-
Burstein, A.1
-
10
-
-
84861449450
-
Taming the devil: Techniques for evaluating anonymized network data
-
S. Coull, C. Wright, A. Keromytis, F. Monrose, and M. Reiter. Taming the devil: Techniques for evaluating anonymized network data. In Network and Distributed System Security Symposium (NDSS), 2008.
-
(2008)
Network and Distributed System Security Symposium (NDSS)
-
-
Coull, S.1
Wright, C.2
Keromytis, A.3
Monrose, F.4
Reiter, M.5
-
11
-
-
77955220391
-
Playing devil's advocate: Inferring sensitive information from anonymized network traces
-
S. Coull, C. Wright, F. Monrose, M. Collins, and M.K.Reiter. Playing devil's advocate: Inferring sensitive information from anonymized network traces. In Network and Distributed System Security Symposium (NDSS), 2007.
-
(2007)
Network and Distributed System Security Symposium (NDSS)
-
-
Coull, S.1
Wright, C.2
Monrose, F.3
Collins, M.4
Reiter, M.K.5
-
13
-
-
4444266989
-
Prefix-preserving IP address anonymization
-
J. Fan, J. Xu, M. H. Ammar, and S. B. Moon. Prefix-preserving IP address anonymization. Comput. Networks, 46(2):253-272, 2004.
-
(2004)
Comput. Networks
, vol.46
, Issue.2
, pp. 253-272
-
-
Fan, J.1
Xu, J.2
Ammar, M.H.3
Moon, S.B.4
-
15
-
-
33750305627
-
A Day in the Life of the Internet: Proposed community-wide experiment
-
Oct
-
kc claffy. A Day in the Life of the Internet: Proposed community-wide experiment. ACM SICCOMM Computer Communications Review, 36(5):39-40, Oct. 2006.
-
(2006)
ACM SICCOMM Computer Communications Review
, vol.36
, Issue.5
, pp. 39-40
-
-
Claffy, K.1
-
19
-
-
70450253119
-
The rise and fall of invasive ISP surveillance
-
P. Ohm. The rise and fall of invasive ISP surveillance. University of Illinois Law Review, 2009(5).
-
(2009)
University of Illinois Law Review
, vol.5
-
-
Ohm, P.1
-
20
-
-
33847256529
-
The devil and packet trace anonymization
-
R. Pang, M. Allman, V. Paxson, and J. Lee. The devil and packet trace anonymization. ACM SICCOMM Computer Communications Review, 36(1):29-38, 2006.
-
(2006)
ACM SICCOMM Computer Communications Review
, vol.36
, Issue.1
, pp. 29-38
-
-
Pang, R.1
Allman, M.2
Paxson, V.3
Lee, J.4
-
21
-
-
14844302515
-
A high-level programming environment for packet trace anonymization and transformation
-
R. Pang and V. Paxson. A high-level programming environment for packet trace anonymization and transformation. In ACM SICCOMM, 2003.
-
(2003)
ACM SICCOMM
-
-
Pang, R.1
Paxson, V.2
|