-
1
-
-
75349103395
-
Trustable relays for anonymous communication
-
C. Aguilar-Melchor and Y. Deswarte, "Trustable Relays for Anonymous Communication," Trans. Data Privacy, vol. 2, no. 2, pp. 101-130, 2009.
-
(2009)
Trans. Data Privacy
, vol.2
, Issue.2
, pp. 101-130
-
-
Aguilar-Melchor, C.1
Deswarte, Y.2
-
2
-
-
84864746630
-
-
AOL Search Data Scandal, Aug.
-
AOL Search Data Scandal, http://en.wikipedia.org/wiki/AOL-search-data- scandal, Aug. 2006.
-
(2006)
-
-
-
3
-
-
33644989680
-
Specification of a framework for the anonymous use of privileges
-
Aug.
-
V. Benjumea, J. López, and J.M.T. Linero, "Specification of a Framework for the Anonymous Use of Privileges," Telematics and Informatics, vol. 23, no. 3, pp. 179-195, Aug. 2006.
-
(2006)
Telematics and Informatics
, vol.23
, Issue.3
, pp. 179-195
-
-
Benjumea, V.1
López, J.2
Linero, J.M.T.3
-
4
-
-
56349111434
-
The sparta pseudonym and authorization system
-
G. Bianchi, M. Bonola, V. Falletta, F.S. Proto, and S. Teofili, "The SPARTA Pseudonym and Authorization System," Science of Computer Programming, vol. 74, nos. 1/2, pp. 23-33, 2008.
-
(2008)
Science of Computer Programming
, vol.74
, Issue.1-2
, pp. 23-33
-
-
Bianchi, G.1
Bonola, M.2
Falletta, V.3
Proto, F.S.4
Teofili, S.5
-
6
-
-
67650617685
-
Preserving user's privacy in web search engines
-
J. Castellà-Roca, A. Viejo, and J. Herrera-Joancomartí, "Preserving User's Privacy in Web Search Engines," Computer Comm., vol. 32, nos. 13/14, pp. 1541-1551, 2009.
-
(2009)
Computer Comm.
, vol.32
, Issue.13-14
, pp. 1541-1551
-
-
Castellà-Roca, J.1
Viejo, A.2
Herrera-Joancomartí, J.3
-
7
-
-
38149096884
-
A scalable and adaptive clustering scheme for manets
-
Dec.
-
N. Chatterjee, A. Potluri, and A. Negi, "A Scalable and Adaptive Clustering Scheme for MANETs," Proc. Fourth Int'l Conf. Distributed Computing Internet Technology (ICDCIT '07), pp. 73-78, Dec. 2007.
-
(2007)
Proc. Fourth Int'l Conf. Distributed Computing Internet Technology (ICDCIT '07)
, pp. 73-78
-
-
Chatterjee, N.1
Potluri, A.2
Negi, A.3
-
8
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
DOI 10.1145/358549.358563
-
D. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms," Comm. ACM, vol. 24, no. 2, pp. 84-88, 1981. (Pubitemid 11480996)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum David, L.1
-
9
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
DOI 10.1145/4372.4373
-
D. Chaum, "Security without Identification: Transaction Systems to Make Big Brother Obsolete," Comm. ACM, vol. 28, no. 10, pp. 1030-1044, Oct. 1985. (Pubitemid 15587967)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum David1
-
10
-
-
0029541045
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, "Private Information Retrieval," Proc. 36th Ann. Symp. Foundations of Computer Science (FOCS '95), pp. 41-50, 1995.
-
(1995)
Proc. 36th Ann. Symp. Foundations of Computer Science (FOCS '95)
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
11
-
-
0032201622
-
Private information retrieval
-
B. Chor,O. Goldreich,E. Kushilevitz,M. Sudan, Private Information Retrieval," J. ACM, vol. 45, no. 6, pp. 965-981, 1998.
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
13
-
-
12744262677
-
Demand-driven clustering in MANETs
-
Proceedings of the International Conference on Wireless networks, ICWN'04
-
C. Cramer, O. Stanze, K. Weniger, and M. Zitterbart, "Demand-Driven Clustering in MANETs," Proc. Int'l Conf. Wireless Networking (ICWN), vol. 1, pp. 81-87, June 2004. (Pubitemid 40157220)
-
(2004)
Proceedings of the International Conference on Wireless Networks, ICWN'04
, vol.1
, pp. 81-87
-
-
Cramer, C.1
Stanze, O.2
Weniger, K.3
Zitterbart, M.4
-
14
-
-
0037810717
-
Mixminion: Design of a type iii anonymous remailer protocol
-
May
-
G. Danezis, R. Dingledine, and N. Mathewson, "Mixminion: Design of a Type III Anonymous Remailer Protocol," Proc. Symp. Security Privacy (SP), pp. 2-15, May 2003.
-
(2003)
Proc. Symp. Security Privacy (SP)
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
18
-
-
80055001448
-
Coprivacy: An introduction to the theory and applications of co-operative privacy
-
J. Domingo-Ferrer, "Coprivacy: An Introduction to the Theory and Applications of Co-Operative Privacy," Special Issue: Privacy in Statistical Databases, vol. 35, pp. 25-40, 2011.
-
(2011)
Special Issue: Privacy in Statistical Databases
, vol.35
, pp. 25-40
-
-
Domingo-Ferrer, J.1
-
19
-
-
71749095915
-
User-private information retrieval based on a peer-to-peer community
-
J. Domingo-Ferrer, M. Bras-Amoró s, Q. Wu, and J. Manjón, "User-Private Information Retrieval Based on a Peer-to-Peer Community," Data Knowledge Eng., vol. 68, no. 11, pp. 1237-1252, 2009.
-
(2009)
Data Knowledge Eng.
, vol.68
, Issue.11
, pp. 1237-1252
-
-
Domingo-Ferrer, J.1
Manjón, J.2
-
20
-
-
80755139576
-
Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search
-
J. Domingo-Ferrer and U. González-Nicolá s, "Rational Behavior in Peer-to-Peer Profile Obfuscation for Anonymous Keyword Search," Information Science: An Int'l J., vol. 185, no. 1, pp. 191-204, 2012.
-
(2012)
Information Science: An Int'l J.
, vol.185
, Issue.1
, pp. 191-204
-
-
Domingo-Ferrer, J.1
González-Nicolás, U.2
-
21
-
-
70249087299
-
Hok+-private information retrieval from privacy-uncooperative queryable databases
-
J. Domingo-Ferrer, A. Solanas, and J. Castellà-Roca, "hok+-Private Information Retrieval from Privacy-uncooperative Queryable Databases," Online Information Rev., vol. 33, no. 4, pp. 720-744, 2009.
-
(2009)
Online Information Rev.
, vol.33
, Issue.4
, pp. 720-744
-
-
Domingo-Ferrer, J.1
Solanas, A.2
Castellà-Roca, J.3
-
22
-
-
0035060531
-
A formal approach to imperfection in geographic information
-
DOI 10.1016/S0198-9715(00)00040-5, PII S0198971500000405, GISRUK 2000
-
M. Duckham, K. Mason, J. Stell, and M. Worboys, "A Formal Approach to Imperfection in Geographic Information," Computers Environment and Urban Systems, vol. 25, no. 1, pp. 89-103, 2001. (Pubitemid 32337731)
-
(2001)
Computers, Environment and Urban Systems
, vol.25
, Issue.1
, pp. 89-103
-
-
Duckham, M.1
Mason, K.2
Stell, J.3
Worboys, M.4
-
23
-
-
24944589228
-
Enhancing customer privacy while searching for products and services on the world wide web
-
DOI 10.1108/10662240510615164
-
Y. Elovici, C. Glezer, and B. Shapira, "Enhancing Customer Privacy while Searching for Products and Services on the World Wide Web," Internet Research: Electronic Networking Applications and Policy, vol. 15, no. 4, pp. 378-399, 2005. (Pubitemid 41314574)
-
(2005)
Internet Research
, vol.15
, Issue.4
, pp. 378-399
-
-
Elovici, Y.1
Glezer, C.2
Shapira, B.3
-
24
-
-
0038041166
-
A new privacy model for hiding group interests while accessing the web
-
Y. Elovici, B. Shapira, and A. Maschiach, "A New Privacy Model for Hiding Group Interests while Accessing the Web," Proc. Workshop Privacy in the Electronic Soc. (WPES '02), pp. 63-70, 2002.
-
(2002)
Proc. Workshop Privacy in the Electronic Soc. (WPES '02)
, pp. 63-70
-
-
Elovici, Y.1
Shapira, B.2
Maschiach, A.3
-
25
-
-
74049097109
-
On non-cooperative location privacy: A game-theoretic analysis
-
Nov.
-
J. Freudiger, M.H. Manshaei, J.-P. Hubaux, and D.C. Parkes, "On Non-Cooperative Location Privacy: A Game-theoretic Analysis," Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09), Nov. 2009.
-
(2009)
Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09)
-
-
Freudiger, J.1
Manshaei, M.H.2
Hubaux, J.-P.3
Parkes, D.C.4
-
26
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
June
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, "Private Queries in Location Based Services: Anonymizers Are Not Necessary," Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD '08), pp. 121-132, June 2008.
-
(2008)
Proc.ACM SIGMOD Int'l Conf. Management of Data (SIGMOD '08)
, pp. 121-132
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
27
-
-
84864745222
-
-
GoogleSharing
-
GoogleSharing, www.googlesharing.net, 2012.
-
(2012)
-
-
-
29
-
-
84864745221
-
-
I2P Anonymous Network
-
I2P Anonymous Network,www.i2p2.de, 2012.
-
(2012)
-
-
-
30
-
-
11944275853
-
Information theory and statistical mechanics ii
-
E.T. Jaynes, "Information Theory and Statistical Mechanics II," Physical Rev., vol. 108, no. 2, pp. 171-190, 1957.
-
(1957)
Physical Rev.
, vol.108
, Issue.2
, pp. 171-190
-
-
Jaynes, E.T.1
-
31
-
-
0020187981
-
On the rationale of maximum-entropy methods
-
Sept.
-
E.T. Jaynes, "On the Rationale of Maximum-Entropy Methods," Proc. IEEE, vol. 70, no. 9, pp. 939-952, Sept. 1982.
-
(1982)
Proc.IEEE
, vol.70
, Issue.9
, pp. 939-952
-
-
Jaynes, E.T.1
-
32
-
-
33947121654
-
Protection of location privacy using dummies for location-based services
-
Oct.
-
H. Kido, Y. Yanagisawa, and T. Satoh, "Protection of Location Privacy Using Dummies for Location-Based Services," Proc. IEEE Int'l Conf. Data Eng. (ICDE), p. 1248, Oct. 2005.
-
(2005)
Proc.IEEE Int'l Conf. Data Eng. (ICDE)
, pp. 1248
-
-
Kido, H.1
Yanagisawa, Y.2
Satoh, T.3
-
33
-
-
8344276595
-
Privacy preservation improvement by learning optimal profile generation rate
-
T. Kuflik, B. Shapira, Y. Elovici, and A. Maschiach, "Privacy Preservation Improvement by Learning Optimal Profile Generation Rate," Proc. Ninth Int'l Conf. User Modeling (UM '03), pp. 168-177, 2003. (Pubitemid 36768562)
-
(2003)
Lecture notes in computer science
, Issue.2702
, pp. 168-177
-
-
Kuflik, T.1
Shapira, B.2
Elovici, Y.3
Maschiach, A.4
-
34
-
-
58449094834
-
A review for trust modelling in ad hoc networks
-
M. Mejía, N. Pena, J.L. Munoz, and O. Esparza, "A Review for Trust Modelling in Ad Hoc Networks," Internet Research, vol. 19, no. 1, pp. 88-104, 2009.
-
(2009)
Internet Research
, vol.19
, Issue.1
, pp. 88-104
-
-
Mejía, M.1
Pena, N.2
Munoz, J.L.3
Esparza, O.4
-
35
-
-
84858708657
-
-
Internet Eng. Task Force, Internet Draft,July
-
U. Möller, L. Cottrell, P. Palfrader, and L. Sassaman, "Mixmaster Protocol-Version 2," Internet Eng. Task Force, Internet Draft, http://www.freehaven.net/anonbib/cache/mixmaster-spec.txt, July 2003.
-
(2003)
Mixmaster Protocol-Version 2
-
-
Möller, U.1
Cottrell, L.2
Palfrader, P.3
Sassaman, L.4
-
37
-
-
0001730497
-
Non-cooperative games
-
J. Nash, "Non-Cooperative Games," Annals Math., vol. 54, pp. 289-295, 1951.
-
(1951)
Annals Math.
, vol.54
, pp. 289-295
-
-
Nash, J.1
-
38
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
Apr.
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil Attack in Sensor Networks: Analysis and Defenses," Proc. Third Int'l Symp. Information Processing in Sensor Networks (IPSN '04), pp. 259-268, Apr. 2004.
-
(2004)
Proc. Third Int'l Symp. Information Processing in Sensor Networks (IPSN '04)
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
42
-
-
84864765294
-
A privacy-preserving architecture for the semantic web based on tag suppression
-
Aug.
-
J. Parra-Arnau, D. Rebollo-Monedero, and J. Forné, "A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression," Proc. Seventh Int'l Conf. Trust, Privacy and Security in Digital Business (TrustBus '10), Aug. 2010.
-
(2010)
Proc. Seventh Int'l Conf. Trust, Privacy and Security in Digital Business (TrustBus '10)
-
-
Parra-Arnau, J.1
Rebollo-Monedero, D.2
Forné, J.3
-
43
-
-
58449085741
-
Collaborative attack on internet users anonymity
-
R. Puzis, D. Yagil, Y. Elovici, and D. Braha, "Collaborative Attack on Internet Users Anonymity," Internet Research, vol. 19, no. 1, pp. 60-77, 2009.
-
(2009)
Internet Research
, vol.19
, Issue.1
, pp. 60-77
-
-
Puzis, R.1
Yagil, D.2
Elovici, Y.3
Braha, D.4
-
44
-
-
77955802941
-
Optimal query forgery for private information retrieval
-
Sept.
-
D. Rebollo-Monedero and J. Forné, "Optimal Query Forgery for Private Information Retrieval," IEEE Trans. Information Theory, vol. 56, no. 9, pp. 4631-4642, Sept. 2010.
-
(2010)
IEEE Trans. Information Theory
, vol.56
, Issue.9
, pp. 4631-4642
-
-
Rebollo-Monedero, D.1
Forné, J.2
-
45
-
-
76049114679
-
Private location-based information retrieval through user collaboration
-
D. Rebollo-Monedero, J. Forné, A. Solanas, and T. Martínez-Ballesté, "Private Location-Based Information Retrieval through User Collaboration," Computer Comm., vol. 33, no. 6, pp. 762-774, http://dx.doi.org/10.1016/j.comcom.2009.11.024, 2010.
-
(2010)
Computer Comm.
, vol.33
, Issue.6
, pp. 762-774
-
-
Rebollo-Monedero, D.1
Forné, J.2
Solanas, A.3
Martínez- Ballesté, T.4
-
46
-
-
76049123459
-
A collaborative protocol for private retrieval of location-based information
-
Feb.
-
D. Rebollo-Monedero, J. Forné, L. Subirats, A. Solanas, and A. Martínez-Ballesté, "A Collaborative Protocol for Private Retrieval of Location-Based Information," Proc. IADIS Int'l Conf. e-Soc., Feb. 2009.
-
(2009)
Proc. IADIS Int'l Conf. e-Soc.
-
-
Rebollo-Monedero, D.1
Forné, J.2
Subirats, L.3
Solanas, A.4
Martínez-Ballesté, A.5
-
47
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
M.K. Reiter and A.D. Rubin, "Crowds: Anonymity for Web Transactions," ACM Trans. Information System Security, vol. 1, no. 1, pp. 66-92, 1998.
-
(1998)
ACM Trans. Information System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
48
-
-
84890522850
-
Communication theory of secrecy systems
-
C.E. Shannon, "Communication Theory of Secrecy Systems," Bell System Technical J., vol. 28, pp. 656-715, 1949.
-
(1949)
Bell System Technical J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
49
-
-
12344288684
-
Praw-The model for private web
-
B. Shapira, Y. Elovici, A. Meshiach, and T. Kuflik, "PRAW-The Model for PRivAte Web," J. Am. Assoc. Information Soc. Information Science and Technology, vol. 56, no. 2, pp. 159-172, 2005.
-
(2005)
J. Am. Assoc. Information Soc. Information Science and Technology
, vol.56
, Issue.2
, pp. 159-172
-
-
Shapira, B.1
Elovici, Y.2
Meshiach, A.3
Kuflik, T.4
-
51
-
-
77952524927
-
Reputation and trust-based systems for ad hoc and sensor networks
-
John Wiley & Sons
-
A. Srinivasan, J. Teitelbaumy, H. Liangz, J. Wuyand, and M. Cardei, "Reputation and Trust-Based Systems for Ad Hoc and Sensor Networks," Algorithms and Protocols for Wireless Ad Hoc and Sensor Networks, John Wiley & Sons, 2007.
-
(2007)
Algorithms and Protocols for Wireless Ad Hoc and Sensor Networks
-
-
Srinivasan, A.1
Teitelbaumy, J.2
Liangz, H.3
Wuyand, J.4
Cardei, M.5
-
52
-
-
84864745218
-
-
The Tor Project, Tor: Overview
-
The Tor Project, Tor: Overview, http://torproject.org/overview.html.en, 2011
-
(2011)
-
-
-
53
-
-
84864757520
-
-
Torbutton 1.2.5
-
Torbutton 1.2.5, https://addons.mozilla.org/ca/firefox/addon/2275, 2010.
-
(2010)
-
-
-
55
-
-
77955660918
-
Using social networks to distort users' profiles generated by web search engines
-
A. Viejo and J. Castellà-Roca, "Using Social Networks to Distort Users' Profiles Generated by Web Search Engines," Computer Networks, vol. 54, no. 9, pp. 1343-1357, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.9
, pp. 1343-1357
-
-
Viejo, A.1
Castellà-Roca, J.2
|