-
1
-
-
70350375841
-
PriPAYD: Privacy friendly pay-as-you-drive insurance
-
ACM
-
C. Troncoso, G. Danezis, E. Kosta, and B. Preneel, "PriPAYD: Privacy friendly pay-as-you-drive insurance," in Proc. WPES. ACM, 2007, pp. 99-107.
-
(2007)
Proc. WPES
, pp. 99-107
-
-
Troncoso, C.1
Danezis, G.2
Kosta, E.3
Preneel, B.4
-
2
-
-
77955303955
-
Measuring long-term location privacy in vehicular communication systems
-
Z. Ma, F. Kargl, and M. Weber, "Measuring long-term location privacy in vehicular communication systems," Computer Communications, vol. 33, no. 12, pp. 1414-1427, 2010.
-
(2010)
Computer Communications
, vol.33
, Issue.12
, pp. 1414-1427
-
-
Ma, Z.1
Kargl, F.2
Weber, M.3
-
3
-
-
67650699523
-
Privacy-friendly electronic traffic pricing via commits
-
Proc. FAST, ser. Springer
-
W. de Jonge and B. Jacobs, "Privacy-friendly electronic traffic pricing via commits," in Proc. FAST, ser. LNCS, vol. 5491. Springer, 2008, pp. 143-161.
-
(2008)
LNCS
, vol.5491
, pp. 143-161
-
-
De Jonge, W.1
Jacobs, B.2
-
4
-
-
84946418789
-
VPriv: Protecting privacy in location-based vehicular services
-
USENIX Association
-
R. A. Popa, H. Balakrishnan, and A. J. Blumberg, "VPriv: Protecting privacy in location-based vehicular services," in Proc. USENIX Security Symposium. USENIX Association, 2009, pp. 335-350.
-
(2009)
Proc. USENIX Security Symposium
, pp. 335-350
-
-
Popa, R.A.1
Balakrishnan, H.2
Blumberg, A.J.3
-
5
-
-
85076310471
-
PrETP: Privacy-preserving electronic toll pricing
-
USENIX Association
-
J. Balasch, A. Rial, C. Troncoso, and C. Geuens, "PrETP: Privacy-preserving electronic toll pricing," in Proc. USENIX Security Symposium. USENIX Association, 2010, pp. 63-78.
-
(2010)
Proc. USENIX Security Symposium
, pp. 63-78
-
-
Balasch, J.1
Rial, A.2
Troncoso, C.3
Geuens, C.4
-
6
-
-
84861448126
-
Cell-based roadpricing
-
Proc. EuroPKI, ser. Springer
-
F. Garcia, E. Verheul, and B. Jacobs, "Cell-based roadpricing," in Proc. EuroPKI, ser. LNCS, vol. 7163. Springer, 2011, pp. 106-122.
-
(2011)
LNCS
, vol.7163
, pp. 106-122
-
-
Garcia, F.1
Verheul, E.2
Jacobs, B.3
-
7
-
-
85076493348
-
The phantom tollbooth: Privacy-preserving electronic toll collection in the presence of driver collusion
-
USENIX Association
-
S. Meiklejohn, K. Mowery, S. Checkoway, and H. Shacham, "The phantom tollbooth: Privacy-preserving electronic toll collection in the presence of driver collusion," in Proc. USENIX Security Symposium. USENIX Association, 2011.
-
(2011)
Proc. USENIX Security Symposium
-
-
Meiklejohn, S.1
Mowery, K.2
Checkoway, S.3
Shacham, H.4
-
8
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A. C.-C. Yao, "On the security of public key protocols," IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198-207, 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-207
-
-
Dolev, D.1
Yao, A.C.-C.2
-
9
-
-
33750879264
-
Enhancing security and privacy in traffic-monitoring systems
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Enhancing security and privacy in traffic-monitoring systems," IEEE Pervasive Computing, vol. 5, no. 4, pp. 38-46, 2006.
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.4
, pp. 38-46
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
10
-
-
57349108972
-
Preserving privacy in GPS traces via uncertainty-aware path cloaking
-
ACM
-
-, "Preserving privacy in GPS traces via uncertainty-aware path cloaking," in Proc. CCS. ACM, 2007, pp. 161-171.
-
(2007)
Proc. CCS
, pp. 161-171
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
11
-
-
85177688715
-
Quantifying location privacy
-
IEEE CS
-
R. Shokri, G. Theodorakopoulos, J.-Y. L. Boudec, and J.-P. Hubaux, "Quantifying location privacy," in Proc. S&P. IEEE CS, 2011.
-
(2011)
Proc. S&P
-
-
Shokri, R.1
Theodorakopoulos, G.2
Boudec, J.-Y.L.3
Hubaux, J.-P.4
-
12
-
-
38049035427
-
Inference attacks on location tracks
-
Proc. Pervasive, ser. Springer
-
J. Krumm, "Inference attacks on location tracks," in Proc. Pervasive, ser. LNCS, vol. 4480. Springer, 2007, pp. 127-143.
-
(2007)
LNCS
, vol.4480
, pp. 127-143
-
-
Krumm, J.1
-
13
-
-
85024290278
-
Group signatures
-
Proc. EUROCRYPT, ser. Springer
-
D. Chaum and E. van Heyst, "Group signatures," in Proc. EUROCRYPT, ser. LNCS, vol. 547. Springer, 1991, pp. 257-265.
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
14
-
-
24144477851
-
Foundations of group signatures: The case of dynamic groups
-
Proc. CT-RSA, ser. Springer
-
M. Bellare, H. Shi, and C. Zhang, "Foundations of group signatures: The case of dynamic groups," in Proc. CT-RSA, ser. LNCS, vol. 3376. Springer, 2005, pp. 136-153.
-
(2005)
LNCS
, vol.3376
, pp. 136-153
-
-
Bellare, M.1
Shi, H.2
Zhang, C.3
-
15
-
-
77958078296
-
Group message authentication
-
Proc. SCN, ser. Springer
-
B. Przydatek and D. Wikström, "Group message authentication," in Proc. SCN, ser. LNCS, vol. 6280. Springer, 2010, pp. 399-417.
-
(2010)
LNCS
, vol.6280
, pp. 399-417
-
-
Przydatek, B.1
Wikström, D.2
-
16
-
-
79959315979
-
Double-trapdoor anonymous tags for traceable signatures
-
Proc. ACNS, ser. Springer
-
M. Abe, S. S. M. Chow, K. Haralambiev, and M. Ohkubo, "Double-trapdoor anonymous tags for traceable signatures," in Proc. ACNS, ser. LNCS, vol. 6715. Springer, 2011, pp. 183-200.
-
(2011)
LNCS
, vol.6715
, pp. 183-200
-
-
Abe, M.1
Chow, S.S.M.2
Haralambiev, K.3
Ohkubo, M.4
-
17
-
-
48649088209
-
A group signature based secure and privacy-preserving vehicular communication framework
-
IEEE CS
-
J. Guo, J. P. Baugh, and S. Wang, "A group signature based secure and privacy-preserving vehicular communication framework," in Proc. INFOCOM Workshops. IEEE CS, 2007, pp. 103-108.
-
(2007)
Proc. INFOCOM Workshops
, pp. 103-108
-
-
Guo, J.1
Baugh, J.P.2
Wang, S.3
-
18
-
-
0035035153
-
Mobile values, new names, and secure communication
-
ACM
-
M. Abadi and C. Fournet, "Mobile values, new names, and secure communication," in Proc. POPL. ACM, 2001, pp. 104-115.
-
(2001)
Proc. POPL
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
19
-
-
68249084846
-
Verifying privacy-type properties of electronic voting protocols
-
S. Delaune, S. Kremer, and M. D. Ryan, "Verifying privacy-type properties of electronic voting protocols," Journal of Computer Security, vol. 17, no. 4, pp. 435-487, 2009.
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 435-487
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
-
20
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
IEEE CS
-
B. Blanchet, "An efficient cryptographic protocol verifier based on prolog rules," in Proc. CSFW. IEEE CS, 2001, pp. 82-96.
-
(2001)
Proc. CSFW
, pp. 82-96
-
-
Blanchet, B.1
-
21
-
-
0030708255
-
A hierarchy of authentication specification
-
IEEE CS
-
G. Lowe, "A hierarchy of authentication specification," in Proc. CSFW. IEEE CS, 1997, pp. 31-44.
-
(1997)
Proc. CSFW
, pp. 31-44
-
-
Lowe, G.1
|