-
1
-
-
17644411480
-
Mobile values, new names, and secure communication
-
ACM Press
-
M. Abadi and C. Fournet, "Mobile values, new names, and secure communication," in Proc. Symposium on Principles of Programming Languages (POPL'01). ACM Press, 2001, pp. 104-115.
-
(2001)
Proc. Symposium on Principles of Programming Languages (POPL'01)
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
2
-
-
85175133307
-
-
http://www.anonymizer.com.
-
-
-
-
4
-
-
50849114523
-
Fast Batch Verification for Modular Exponentiation and Digital Signatures
-
M. Bellare, J. A. Garay, and T. Rabin, "Fast Batch Verification for Modular Exponentiation and Digital Signatures," in Advances in Cryptology (EUROCRYPT'98), 1998, pp. 236-250.
-
Advances in Cryptology (EUROCRYPT'98), 1998
, pp. 236-250
-
-
Bellare, M.1
Garay, J.A.2
Rabin, T.3
-
5
-
-
51249085821
-
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
-
M. Bellare and C. Namprempre, "Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm," Journal of Cryptology, vol. 21, no. 4, pp. 469-491, 2008.
-
(2008)
Journal of Cryptology
, vol.21
, Issue.4
, pp. 469-491
-
-
Bellare, M.1
Namprempre, C.2
-
6
-
-
0034822279
-
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
-
IEEE Computer Society Press
-
B. Blanchet, "An Efficient Cryptographic Protocol Verifier Based on Prolog Rules." in Proc. IEEE Computer Security Foundations Workshop (CSFW'01). IEEE Computer Society Press, 2001, pp. 82-96.
-
(2001)
Proc. IEEE Computer Security Foundations Workshop (CSFW'01)
, pp. 82-96
-
-
Blanchet, B.1
-
7
-
-
84937298954
-
Anonymity, Autonomy, and Accountability: Challenges to the First Amendment in Cyberspaces
-
A. W. Branscomb, "Anonymity, Autonomy, and Accountability: Challenges to the First Amendment in Cyberspaces," The Yale Law Journal, vol. 104, no. 7, 1995.
-
(1995)
The Yale Law Journal
, vol.104
, Issue.7
-
-
Branscomb, A.W.1
-
9
-
-
0019532104
-
UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS.
-
DOI 10.1145/358549.358563
-
D. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms," Journal of the ACM, vol. 24, no. 2, pp. 84-88, 1981. (Pubitemid 11480996)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
-
11
-
-
84929273746
-
Untraceable Electronic Cash
-
D. Chaum, A. Fiat, and M. Naor, "Untraceable Electronic Cash," in Proc. Advances in Cryptology (CRYPTO'88), 1990, pp. 319-327.
-
(1990)
Proc. Advances in Cryptology (CRYPTO'88)
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
12
-
-
0029541045
-
Private information retrieval
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, "Private information retrieval," in Proc. IEEE Symposium on Foundations of Computer Science (FOCS'95), 1995, pp. 41-50.
-
Proc. IEEE Symposium on Foundations of Computer Science (FOCS'95), 1995
, pp. 41-50
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
13
-
-
33745212646
-
Performance analysis of TLS Web servers
-
C. Coarfa, P. Druschel, and D. S. Wallach, "Performance analysis of TLS Web servers," ACM Trans. Comput. Syst., vol. 24, no. 1, pp. 39-69, 2006.
-
(2006)
ACM Trans. Comput. Syst.
, vol.24
, Issue.1
, pp. 39-69
-
-
Coarfa, C.1
Druschel, P.2
Wallach, D.S.3
-
15
-
-
85175132247
-
-
http://www.aboutads.info/choices/.
-
-
-
-
16
-
-
68249084846
-
Verifying privacy-type properties of electronic voting protocols
-
S. Delaune, S. Kremer, and M. Ryan, "Verifying privacy-type properties of electronic voting protocols," JCS, vol. 17, pp. 435-487, 2009.
-
(2009)
JCS
, vol.17
, pp. 435-487
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.3
-
17
-
-
77955088991
-
A new hardware-assisted PIR with O(n) shuffle cost
-
X. Ding, Y. Yang, R. H. Deng, and S. Wang, "A new hardware-assisted PIR with O(n) shuffle cost," Inter. Journal of Information Security, vol. 9, no. 4, pp. 237-252, 2010.
-
(2010)
Inter. Journal of Information Security
, vol.9
, Issue.4
, pp. 237-252
-
-
Ding, X.1
Yang, Y.2
Deng, R.H.3
Wang, S.4
-
18
-
-
75749128611
-
The Online Advertising Industry: Economics, Evolution, and Privacy
-
D. S. Evans, "The Online Advertising Industry: Economics, Evolution, and Privacy," Journal of Economic Perspectives, vol. 23, no. 3, pp. 37-60, 2009.
-
(2009)
Journal of Economic Perspectives
, vol.23
, Issue.3
, pp. 37-60
-
-
Evans, D.S.1
-
19
-
-
57349131789
-
Implementing Sponsored Search in Web Search Engines: Computational Evaluation of Alternative Mechanisms
-
January
-
J. Feng, H. K. Bhargava, and D. M. Pennock, "Implementing Sponsored Search in Web Search Engines: Computational Evaluation of Alternative Mechanisms," INFORMS J. on Computing, vol. 19, pp. 137-148, January 2007.
-
(2007)
INFORMS J. on Computing
, vol.19
, pp. 137-148
-
-
Feng, J.1
Bhargava, H.K.2
Pennock, D.M.3
-
23
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
O. Goldreich and R. Ostrovsky, "Software Protection and Simulation on Oblivious RAMs," Journal of the ACM, vol. 43, pp. 431-473, May 1996. (Pubitemid 126607640)
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
24
-
-
80955131283
-
Oblivious RAM Simulation with Efficient Worst-Case Access Overhead
-
M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia, "Oblivious RAM Simulation with Efficient Worst-Case Access Overhead," in Proc. ACM Workshop on Cloud Computing Security (CCSW'11), 2011, pp. 95-100.
-
Proc. ACM Workshop on Cloud Computing Security (CCSW'11), 2011
, pp. 95-100
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
26
-
-
78650854161
-
Serving Ads from localhost for Performance, Privacy, and Profit
-
S. Guha, A. Reznichenko, K. Tang, H. Haddadi, and P. Francis, "Serving Ads from localhost for Performance, Privacy, and Profit," in Proc. Workshop on Hot Topics in Networks (HotNets), 2009.
-
Proc. Workshop on Hot Topics in Networks (HotNets), 2009
-
-
Guha, S.1
Reznichenko, A.2
Tang, K.3
Haddadi, H.4
Francis, P.5
-
27
-
-
85175132175
-
-
http://www-03.ibm.com/security/cryptocards/.
-
-
-
-
28
-
-
84937572541
-
Targeted Advertising... and Privacy Too
-
A. Juels, "Targeted Advertising ... And Privacy Too," in CT-RSA'01, 2001, pp. 408-424.
-
CT-RSA'01, 2001
, pp. 408-424
-
-
Juels, A.1
-
29
-
-
33947208010
-
AdROSA-Adaptive personalization of web advertising
-
DOI 10.1016/j.ins.2007.01.002, PII S0020025507000229
-
P. Kazienko and M. Adamski, "AdROSA - Adaptive personalization of web advertising," Inf. Sci., vol. 177, no. 11, pp. 2269-2295, 2007. (Pubitemid 46435500)
-
(2007)
Information Sciences
, vol.177
, Issue.11
, pp. 2269-2295
-
-
Kazienko, P.1
Adamski, M.2
-
30
-
-
79953727579
-
Why privacy discussions about pervasive online customer profiling should focus on the expanding roles of third-parties
-
N. J. King, "Why privacy discussions about pervasive online customer profiling should focus on the expanding roles of third-parties," International Journal of Private Law, vol. 4, no. 2, pp. 193-229, 2011.
-
(2011)
International Journal of Private Law
, vol.4
, Issue.2
, pp. 193-229
-
-
King, N.J.1
-
31
-
-
84862081600
-
-
Carnegie Mellon University, Tech. Rep. CMU-CyLab-11-005, October
-
S. Komanduri, R. Shay, B. U. Greg Norcie, and L. F. Cranor, "AdChoices? Compliance with Online Behavioral Advertising Notice and Choice Requirements," Carnegie Mellon University, Tech. Rep. CMU-CyLab-11-005, October 2011.
-
(2011)
AdChoices? Compliance with Online Behavioral Advertising Notice and Choice Requirements
-
-
Komanduri, S.1
Shay, R.2
Greg Norcie, B.U.3
Cranor, L.F.4
-
36
-
-
77952132371
-
Flicker: An execution infrastructure for tcb minimization
-
ACM Press
-
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and H. Isozaki, "Flicker: an execution infrastructure for tcb minimization," in Proc. European Professional Society on Computer Systems (EUROSYS'08). ACM Press, 2008, pp. 315-328.
-
(2008)
Proc. European Professional Society on Computer Systems (EUROSYS'08)
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
37
-
-
74049096125
-
Scalable onion routing with torsk
-
J. McLachlan, A. Tran, N. Hopper, and Y. Kim, "Scalable onion routing with torsk," in Proc. ACM Conference on Computer and Communications Security (CCS'09), 2009, pp. 590-599.
-
Proc. ACM Conference on Computer and Communications Security (CCS'09), 2009
, pp. 590-599
-
-
McLachlan, J.1
Tran, A.2
Hopper, N.3
Kim, Y.4
-
39
-
-
58149136308
-
SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware
-
A. Perrig, S. W. Smith, D. X. Song, and J. D. Tygar, "SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware," in Proc. International Parallel & Distributed Processing Symposium (IPDPS'01), 2001, p. 170, http://sparrow.ece.cmu.edu/~adrian/projects/SAM/.
-
Proc. International Parallel & Distributed Processing Symposium (IPDPS'01), 2001
, pp. 170
-
-
Perrig, A.1
Smith, S.W.2
Song, D.X.3
Tygar, J.D.4
-
40
-
-
85175129450
-
-
http://www.privacychoice.org/privacymark.
-
-
-
-
41
-
-
80755143986
-
Auctions in Do-Not-Track Compliant Internet Advertising
-
A. Reznichenko, S. Guha, and P. Francis, "Auctions in Do-Not-Track Compliant Internet Advertising," in Proc. ACM Conference on Computer and Communications Security (CCS'11), 2011, pp. 667-676.
-
Proc. ACM Conference on Computer and Communications Security (CCS'11), 2011
, pp. 667-676
-
-
Reznichenko, A.1
Guha, S.2
Francis, P.3
-
43
-
-
82955173838
-
Oblivious RAM with O ((logN) 3) Worst-Case Cost
-
E. Shi, T.-H. H. Chan, E. Stefanov, and M. Li, "Oblivious RAM with O ((logN) 3) Worst-Case Cost," in Advances in Cryptology (ASIACRYPT'11), 2011, pp. 197-214.
-
Advances in Cryptology (ASIACRYPT'11), 2011
, pp. 197-214
-
-
Shi, E.1
Chan, T.-H.H.2
Stefanov, E.3
Li, M.4
-
45
-
-
82655182920
-
Logical attestation: An authorization architecture for trustworthy computing
-
E. G. Sirer, W. de Bruijn, P. Reynolds, A. Shieh, K. Walsh, D. Williams, and F. B. Schneider, "Logical attestation: an authorization architecture for trustworthy computing," in Proc. Symposium on Operating Principles (SOSP'11), 2011, pp. 249-264, http://www.cs.cornell.edu/people/egs/nexus/.
-
Proc. Symposium on Operating Principles (SOSP'11), 2011
, pp. 249-264
-
-
Sirer, E.G.1
De Bruijn, W.2
Reynolds, P.3
Shieh, A.4
Walsh, K.5
Williams, D.6
Schneider, F.B.7
-
46
-
-
33646075344
-
Outbound Authentication for Programmable Secure Coprocessors
-
S. W. Smith, "Outbound Authentication for Programmable Secure Coprocessors," Inter. Journal of Information Security, vol. 3, no. 1, pp. 28-41, 2004.
-
(2004)
Inter. Journal of Information Security
, vol.3
, Issue.1
, pp. 28-41
-
-
Smith, S.W.1
-
47
-
-
0033293553
-
Building a high-performance, programmable secure coprocessor
-
S. W. Smith and S. Weingart, "Building a high-performance, programmable secure coprocessor," Computer Networks, vol. 31, no. 8, pp. 831-860, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 831-860
-
-
Smith, S.W.1
Weingart, S.2
-
48
-
-
84866896914
-
-
accessed October 2011
-
"The Tor Project," https://www.torproject.org/, 2003, accessed October 2011.
-
(2003)
The Tor Project
-
-
-
49
-
-
85180529696
-
Adnostic: Privacy Preserving Targeted Advertising
-
V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum, and S. Barocas, "Adnostic: Privacy Preserving Targeted Advertising," in Proc. Network and Distributed System Security Symposium (NDSS'10), 2010.
-
Proc. Network and Distributed System Security Symposium (NDSS'10), 2010
-
-
Toubiana, V.1
Narayanan, A.2
Boneh, D.3
Nissenbaum, H.4
Barocas, S.5
-
50
-
-
33750268079
-
Private Information Retrieval Using Trusted Hardware
-
S. Wang, X. Ding, R. H. Deng, and F. Bao, "Private Information Retrieval Using Trusted Hardware," in Proc. European Symposium on Research in Computer Security (ESORICS'06), 2006, pp. 49-64.
-
Proc. European Symposium on Research in Computer Security (ESORICS'06), 2006
, pp. 49-64
-
-
Wang, S.1
Ding, X.2
Deng, R.H.3
Bao, F.4
|