-
3
-
-
77955447524
-
Private Information Disclosure from Web Searches
-
Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. Springer, Heidelberg
-
Castelluccia, C., De Cristofaro, E., Perito, D.: Private Information Disclosure from Web Searches. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 38-55. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6205
, pp. 38-55
-
-
Castelluccia, C.1
De Cristofaro, E.2
Perito, D.3
-
4
-
-
85084161366
-
Tor: The second-generation onion router
-
USENIX Association, Berkeley
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th conference on USENIX Security Symposium, SSYM 2004, vol. 13, p. 21. USENIX Association, Berkeley (2004)
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium, SSYM 2004
, vol.13
, pp. 21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
5
-
-
84861439484
-
-
Have we Crossed the Line? The Growing Ethical Debate in Modern Computer Security Research. (Poster at)
-
Dittrich, D., Bailey, M., Dietrich, S.: Have we Crossed the Line? The Growing Ethical Debate in Modern Computer Security Research. In: (Poster at) Proceedings of the 16th ACM Conference on Computer and Communication Security (CCS 2009), Chicago, Illinois, USA (November 2009)
-
Proceedings of the 16th ACM Conference on Computer and Communication Security (CCS 2009), Chicago, Illinois, USA (November 2009)
-
-
Dittrich, D.1
Bailey, M.2
Dietrich, S.3
-
6
-
-
77956146035
-
-
Technical Report 2009-01, Stevens Institute of Technology, Hoboken, NJ, USA April
-
Dittrich, D., Bailey, M., Dietrich, S.: Towards community standards for ethical behavior in computer security research. Technical Report 2009-01, Stevens Institute of Technology, Hoboken, NJ, USA (April 2009)
-
(2009)
Towards Community Standards for Ethical Behavior in Computer Security Research
-
-
Dittrich, D.1
Bailey, M.2
Dietrich, S.3
-
7
-
-
84864582498
-
Irbs and security research: Myths, facts and mission creep
-
USENIX Association, Berkeley
-
Garfinkel, S.L.: Irbs and security research: myths, facts and mission creep. In: Proceedings of the 1st Conference on Usability, Psychology, and Security, pp. 13:1-13:5. USENIX Association, Berkeley (2008)
-
(2008)
Proceedings of the 1st Conference on Usability, Psychology, and Security
-
-
Garfinkel, S.L.1
-
9
-
-
77956153263
-
A Case Study on Measuring Statistical Data in the Tor Anonymity Network
-
Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb'e, F. (eds.) RLCPS, WECSR, and WLC 2010. Springer, Heidelberg
-
Loesing, K., Murdoch, S.J., Dingledine, R.: A Case Study on Measuring Statistical Data in the Tor Anonymity Network. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb'e, F. (eds.) RLCPS, WECSR, and WLC 2010. LNCS, vol. 6054, pp. 203-215. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6054
, pp. 203-215
-
-
Loesing, K.1
Murdoch, S.J.2
Dingledine, R.3
-
10
-
-
84861447506
-
-
July 25
-
McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.: Response to tor study (July 25, 2008), http://www.verisign.com/static/039933.pdf
-
(2008)
Response to Tor Study
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
11
-
-
50249133191
-
Shining Light in Dark Places: Understanding the Tor Network
-
Borisov, N., Goldberg, I. (eds.) PETS 2008. Springer, Heidelberg
-
McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.C.: Shining Light in Dark Places: Understanding the Tor Network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 63-76. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5134
, pp. 63-76
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.C.5
-
12
-
-
42249109834
-
Legal issues surrounding monitoring during network research
-
ACM, New York
-
Sicker, D.C., Ohm, P., Grunwald, D.: Legal issues surrounding monitoring during network research. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, IMC 2007, pp. 141-148. ACM, New York (2007)
-
(2007)
Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, IMC 2007
, pp. 141-148
-
-
Sicker, D.C.1
Ohm, P.2
Grunwald, D.3
-
14
-
-
84861432036
-
Researchers could face legal risks for network snooping
-
July 24, news.cnet.com/8301-13739-3-9997273-46.html
-
Soghoian, C.: Researchers could face legal risks for network snooping. Surveilance State (July 24, 2008), news.cnet.com/8301-13739-3-9997273-46.html
-
(2008)
Surveilance State
-
-
Soghoian, C.1
|