-
1
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.L. (1981) 'Untraceable electronic mail, return addresses, and digital pseudonyms', Communications of the ACM, Vol. 24, No. 2, pp.84-90.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
2
-
-
34547490882
-
Structuring anonymity metrics
-
DOI 10.1145/1179529.1179539, Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
Claub, S. and Schiffner, S. (2006) 'Structuring anonymity metrics', Proceedings of 2nd ACM Workshop on Digital Identity Management, Alexandria, VA, USA, pp.55-62. (Pubitemid 47165645)
-
(2006)
Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 55-62
-
-
Clauss, S.1
Schiffner, S.2
-
3
-
-
84957800033
-
Towards measuring anonymity
-
Privacy Enhancing Technologies
-
Diaz, C., Seys, S., Claessens, J. and Preneel, B. (2002) 'Towards measuring anonymity', Proceedings of 2nd International Symposium on Privacy Enhancing Technologies (PETS), San Francisco, CA, USA, pp.54-68. (Pubitemid 36309879)
-
(2003)
Lecture Notes in Computer Science
, Issue.2482
, pp. 54-68
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
4
-
-
50249117750
-
On the impact of social network profiling on anonymity
-
Leuven, Belgium
-
Diaz, C., Troncoso, C. and Serjantov, A. (2008) 'On the impact of social network profiling on anonymity', Proceedings of 8th International Symposium on Privacy Enhancing Technologies (PETS), Leuven, Belgium, pp.44-62.
-
(2008)
Proceedings of 8th International Symposium on Privacy Enhancing Technologies (PETS)
, pp. 44-62
-
-
Diaz, C.1
Troncoso, C.2
Serjantov, A.3
-
5
-
-
85084161366
-
Tor: The second-generation onion router
-
San Diego, CA, USA
-
Dingledine, R., Mathewson, N. and Syverson, P. (2004) 'Tor: the second-generation onion router', Proceedings of 13th USENIX Security Symposium, San Diego, CA, USA, pp.303-320.
-
(2004)
Proceedings of 13th USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
6
-
-
34748911762
-
A combinatorial approach to measuring anonymity
-
New Brunswick, NJ, USA
-
Edman, M., Sivrikaya, F. and Yener, B. (2007) 'A combinatorial approach to measuring anonymity', Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI 2007), New Brunswick, NJ, USA, pp.356-363.
-
(2007)
Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI 2007)
, pp. 356-363
-
-
Edman, M.1
Sivrikaya, F.2
Yener, B.3
-
7
-
-
50249115176
-
Probabilistic analysis of onion routing in a black-box model
-
Alexandria, VA, USA
-
Feigenbaum, J., Johnson, A. and Syverson, P. (2007) 'Probabilistic analysis of onion routing in a black-box model', Proceedings of ACM Workshop on Privacy in Electronic Society, Alexandria, VA, USA, pp.1-10.
-
(2007)
Proceedings of ACM Workshop on Privacy in Electronic Society
, pp. 1-10
-
-
Feigenbaum, J.1
Johnson, A.2
Syverson, P.3
-
8
-
-
0042456767
-
-
2nd ed., O'Reilly Media, Sebastopol, CA, USA
-
Garfinkel, S. and Spafford, G. (2001) Web Security, Privacy & Commerce, 2nd ed., O'Reilly Media, Sebastopol, CA, USA.
-
(2001)
Web Security, Privacy & Commerce
-
-
Garfinkel, S.1
Spafford, G.2
-
9
-
-
85018107502
-
Vanish: Increasing data privacy with self-destructing data
-
Montreal, Canada
-
Geambasu, R., Kohno, T., Levy, A. and Levy, H.M. (2009) 'Vanish: increasing data privacy with self-destructing data', Proceedings of 18th USENIX Security Symposium, Montreal, Canada, pp.299-315.
-
(2009)
Proceedings of 18th USENIX Security Symposium
, pp. 299-315
-
-
Geambasu, R.1
Kohno, T.2
Levy, A.3
Levy, H.M.4
-
10
-
-
70349233805
-
Revisiting a combinatorial approach toward measuring anonymity
-
Alexandria, VA, USA
-
Gierlichs, B., Troncoso, C., Diaz, C., Preneel, B. and Verbauwhede, I. (2008) 'Revisiting a combinatorial approach toward measuring anonymity', Proceedings of 7th ACM Workshop on Privacy in the Electronic Society, Alexandria, VA, USA, pp.111-116.
-
(2008)
Proceedings of 7th ACM Workshop on Privacy in the Electronic Society
, pp. 111-116
-
-
Gierlichs, B.1
Troncoso, C.2
Diaz, C.3
Preneel, B.4
Verbauwhede, I.5
-
11
-
-
4243121902
-
A framework for using insurance for cyber-risk management
-
Gordon, L.A., Loeb, M.P. and Sohail, T. (2003) 'A framework for using insurance for cyber-risk management', Communications of the ACM, Vol. 46, No. 3, pp.81-85.
-
(2003)
Communications of the ACM
, vol.46
, Issue.3
, pp. 81-85
-
-
Gordon, L.A.1
Loeb, M.P.2
Sohail, T.3
-
12
-
-
70349282299
-
On peirce's criterion for the rejection of doubtful observations, with tables for facilitating its application
-
Gould, B.A. (1855) 'On Peirce's criterion for the rejection of doubtful observations, with tables for facilitating its application', Astronomical Journal, Vol. IV, No. 83, pp.81-87.
-
(1855)
Astronomical Journal
, vol.4
, Issue.83
, pp. 81-87
-
-
Gould, B.A.1
-
13
-
-
33749016498
-
Information revelation and privacy in online social networks
-
WPES'05: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society
-
Gross, R. and Acquisti, A. (2005) 'Information revelation and privacy in online social networks', Proceedings of ACM Workshop on Privacy in the Electronic Society, Alexandria, VA, USA, pp.71-80. (Pubitemid 44447420)
-
(2005)
WPES'05: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society
, pp. 71-80
-
-
Gross, R.1
Acquisti, A.2
Heinz III, H.J.3
-
14
-
-
84857169815
-
A three-dimensional approach towards measuring sender anonymity
-
April, Shanghai, China
-
Jaggi, N., Marappa Reddy, U. and Bagai, R. (2011) 'A three-dimensional approach towards measuring sender anonymity', Proceedings of First IEEE International Workshop on Security in Computers, Networking and Communications (SCNC), in Conjunction with IEEE INFOCOM 2011, April, Shanghai, China, pp.1011-1016.
-
(2011)
Proceedings of First IEEE International Workshop on Security in Computers, Networking and Communications (SCNC), in Conjunction with IEEE INFOCOM 2011
, pp. 1011-1016
-
-
Jaggi, N.1
Reddy, M.2
Bagai, U.R.3
-
15
-
-
34347244961
-
An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks
-
DOI 10.1109/TMC.2007.1021
-
Kong, J., Hong, X. and Gerla, M. (2007) 'An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks', IEEE Transactions on Mobile Computing, Vol. 6, No. 8, pp.888-902. (Pubitemid 46993988)
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.8
, pp. 888-902
-
-
Kong, J.1
Hong, X.2
Gerla, M.3
-
16
-
-
78650709933
-
On the leakage of personally identifiable information via online social networks
-
Krishnamurthy, B. and Wills, C.E. (2010) 'On the leakage of personally identifiable information via online social networks', ACM SIGCOMM Computer Communication Review, Vol. 40, No. 1, pp.112-117.
-
(2010)
ACM SIGCOMM Computer Communication Review
, vol.40
, Issue.1
, pp. 112-117
-
-
Krishnamurthy, B.1
Wills, C.E.2
-
17
-
-
70449632682
-
De-anonymizing social networks
-
Oakland, CA, USA
-
Narayanan, A. and Shmatikov, V. (2009) 'De-anonymizing social networks', Proceedings of 30th IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp.173-187.
-
(2009)
Proceedings of 30th IEEE Symposium on Security and Privacy
, pp. 173-187
-
-
Narayanan, A.1
Shmatikov, V.2
-
18
-
-
4243568039
-
Criterion for the rejection of doubtful observations
-
Peirce, B. (1852) 'Criterion for the rejection of doubtful observations', Astronomical Journal, Vol. II, No. 45, pp.161-163.
-
(1852)
Astronomical Journal
, vol.2
, Issue.45
, pp. 161-163
-
-
Peirce, B.1
-
20
-
-
0032074579
-
Anonymous connections and onion routing
-
Reed, M.G., Syverson, P.F. and Goldschlag, D.M. (1998) 'Anonymous connections and onion routing', IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp.482-494.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
21
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
Reiter, M.K. and Rubin, A.D. (1998) 'Crowds: anonymity for web transactions', ACM Transactions on Information and System Security, Vol. 1, No. 1, pp.66-92.
-
(1998)
ACM Transactions on Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
22
-
-
41349112195
-
Peirces' criterion for the elimination of suspect experimental data
-
Ross, S. (2003) 'Peirces' criterion for the elimination of suspect experimental data', Journal of Engineering Technology, Vol. 20, No. 2, pp.1-12.
-
(2003)
Journal of Engineering Technology
, vol.20
, Issue.2
, pp. 1-12
-
-
Ross, S.1
-
23
-
-
0003681739
-
-
John Wiley & Sons, Inc., New York, NY, USA
-
Rousseeuw, P.J. and Leroy, A.M. (1987) Robust Regression and Outlier Detection, John Wiley & Sons, Inc., New York, NY, USA.
-
(1987)
Robust Regression and Outlier Detection
-
-
Rousseeuw, P.J.1
Leroy, A.M.2
-
24
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
San Francisco, CA, USA
-
Serjantov, A. and Danezis, G. (2002) 'Towards an information theoretic metric for anonymity', Proceedings of 2nd International Symposium on Privacy Enhancing Technologies (PETS), San Francisco, CA, USA, pp.41-53.
-
(2002)
Proceedings of 2nd International Symposium on Privacy Enhancing Technologies (PETS)
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
25
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
Phoenix, AZ, USA
-
Shao, M., Yang, Y., Zhu, S. and Cao, G. (2008) 'Towards statistically strong source anonymity for sensor networks', Proceedings of 27th IEEE Conference on Computer Communications (INFOCOM), Phoenix, AZ, USA, pp.51-55.
-
(2008)
Proceedings of 27th IEEE Conference on Computer Communications (INFOCOM)
, pp. 51-55
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
26
-
-
33845537887
-
Measuring anonymity revisited
-
Espoo, Finland
-
Tóth, G., Hornák, Z. and Vajda, F. (2004) 'Measuring anonymity revisited', Proceedings of 9th Nordic Workshop on Secure IT Systems, Espoo, Finland, pp.85-90.
-
(2004)
Proceedings of 9th Nordic Workshop on Secure IT Systems
, pp. 85-90
-
-
Tóth, G.1
Hornák, Z.2
Vajda, F.3
|