-
3
-
-
84895061686
-
-
Technical report, Registratiekammer, The Netherlands and Inofrmation and Privacy Commissioner, Ontario, Canada
-
van Rossum H, Gardeniers H, Borking J, Cavioukian A, Brans J, Muttupulle N, Magistrale N,. Privacy enhancing technologies-The path to anonymity. Technical report, Registratiekammer, The Netherlands and Inofrmation and Privacy Commissioner, Ontario, Canada, 1995.
-
(1995)
Privacy Enhancing Technologies - The Path to Anonymity
-
-
Van Rossum, H.1
Gardeniers, H.2
Borking, J.3
Cavioukian, A.4
Brans, J.5
Muttupulle, N.6
Magistrale, N.7
-
7
-
-
67449101466
-
Privacy patterns for online interactions
-
Portland, OR
-
Romanosky S, Acquisti A, Hong J, Cranor LF, Friedman B,. Privacy patterns for online interactions. Proceedings of the 2006 Conference on Pattern Languages of Programs, PLoP '06, Portland, OR, 2006.
-
(2006)
Proceedings of the 2006 Conference on Pattern Languages of Programs, PLoP '06
-
-
Romanosky, S.1
Acquisti, A.2
Hong, J.3
Cranor, L.F.4
Friedman, B.5
-
8
-
-
84868984414
-
Privacy aware network-client pattern
-
Monticello, IL
-
Sadicoff M, Larrando-Petrie MM, Fernandez EB,. Privacy aware network-client pattern. In Proceedings of the 12th Conference on Patterns Language of Programming (PLoP'05), Monticello, IL, 2005.
-
(2005)
Proceedings of the 12th Conference on Patterns Language of Programming (PLoP'05)
-
-
Sadicoff, M.1
Larrando-Petrie, M.M.2
Fernandez, E.B.3
-
9
-
-
84878709821
-
Privacy & human rights, An international survey of privacy laws and developments
-
EPIC
-
EPIC. Privacy & human rights, An international survey of privacy laws and developments. Electronic Privacy and Information Centre and Privacy International, 2002.
-
(2002)
Electronic Privacy and Information Centre and Privacy International
-
-
-
10
-
-
0013243382
-
-
W3C, April. [Accessed: August, 2011]
-
Cranor L, Langheinrich M, Marchiori M, Presler-Marshall M, Reagle J,. The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, W3C, April 2002. [Accessed: August, 2011].
-
(2002)
The Platform for Privacy Preferences 1.0 (P3P1.0) Specification
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
Presler-Marshall, M.4
Reagle, J.5
-
11
-
-
85084161366
-
Tor: The second-generation onion router
-
In, San Diego, CA. USENIX Association: Berkeley, CA
-
Dingledine R, Mathewson N, Syverson PF,. Tor: The second-generation onion router. In Proceedings of the 13th Conference on Usenix Security Symposium, San Diego, CA. USENIX Association: Berkeley, CA, 2004; 303-320.
-
(2004)
Proceedings of the 13th Conference on Usenix Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.F.3
-
12
-
-
17744389340
-
A requirements taxonomy for reducing web site privacy vulnerabilities
-
August
-
Antõn I, Earp B,. A requirements taxonomy for reducing web site privacy vulnerabilities. Required Engineering August 2004 9: 169-185.
-
(2004)
Required Engineering
, vol.9
, pp. 169-185
-
-
Antõn, I.1
Earp, B.2
-
13
-
-
0030644696
-
Privacy-enhancing technologies for the Internet
-
In. IEEE Computer Society Press: Los Alamitos, CA, Feb
-
Goldberg I, Wagner D, Brewer E,. Privacy-enhancing technologies for the Internet. In Proceedings of 42nd IEEE Spring COMPCON. IEEE Computer Society Press: Los Alamitos, CA, Feb. 1997.
-
(1997)
Proceedings of 42nd IEEE Spring COMPCON
-
-
Goldberg, I.1
Wagner, D.2
Brewer, E.3
-
14
-
-
0346530128
-
Privacy-enhancing technologies for the Internet, II: Five years later
-
In, LNCS. Springer: New York, NY
-
Goldberg I,. 2002. Privacy-enhancing technologies for the Internet, II: five years later. In International Workshop on Privacy Enhancing Technologies (PET), San Francisco, CA, Vol. 2, LNCS. Springer: New York, NY.
-
(2002)
International Workshop on Privacy Enhancing Technologies (PET), San Francisco, CA
, vol.2
-
-
Goldberg, I.1
-
15
-
-
84878711618
-
-
Evans J. Holfelder W. Kawamoto M. (eds). ACM: New York, NY
-
Evans J, Holfelder W, Kawamoto M, (eds). Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, VANET 2004, Philadelphia, PA, USA, October 1, 2004. ACM: New York, NY, 2004.
-
(2004)
Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, VANET 2004, Philadelphia, PA, USA, October 1, 2004
-
-
-
16
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
Clarke I, Sandberg O, Wiley B, Hong TW,. Freenet: A distributed anonymous information storage and retrieval system. Lecture Notes in Computer Science 2001; 2009: 46-66.
-
(2001)
Lecture Notes in Computer Science
, vol.2009
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
18
-
-
84937555451
-
Networks without user observability - Design options
-
In, Pichler F. (ed.), LNCS. Springer: Linz, Austria, Apr
-
Pfitzmann A, Waidner M,. Networks without user observability-Design options. In Advances in cryptology: Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT '85), Vol. 219, Pichler F, (ed.), LNCS. Springer: Linz, Austria, Apr. 1985; 245-253.
-
(1985)
Advances in Cryptology: Proceedings of A Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT '85)
, vol.219
, pp. 245-253
-
-
Pfitzmann, A.1
Waidner, M.2
-
21
-
-
0003250582
-
An introduction to software stability
-
Fayad ME, Altman A,. An introduction to software stability. Communications of the ACM 2001; 44 (9): 95-98.
-
(2001)
Communications of the ACM
, vol.44
, Issue.9
, pp. 95-98
-
-
Fayad, M.E.1
Altman, A.2
-
22
-
-
0041882022
-
Thinking objectively: Merging multiple conventional models in one stable model
-
Fayad M, Wu S,. Thinking objectively: Merging multiple conventional models in one stable model. Communications of the ACM 2002; 45 (9): 102-106.
-
(2002)
Communications of the ACM
, vol.45
, Issue.9
, pp. 102-106
-
-
Fayad, M.1
Wu, S.2
-
23
-
-
84878734944
-
-
Anonymizer.com. Online privacy services
-
Anonymizer.com. Online privacy services.
-
-
-
-
24
-
-
84878685654
-
-
iProxy.net. iProxy anonymizer service
-
iProxy.net. iProxy anonymizer service. Available from: http://iproxy.net/.
-
-
-
-
27
-
-
74949136373
-
-
Freudiger J, Raya M, Félegyházi M, Papadimitratos P, Hubaux J-P,. Mix-zones for location privacy in vehicular networks, 2007.
-
(2007)
Mix-zones for Location Privacy in Vehicular Networks
-
-
Freudiger, J.1
Raya, M.2
Félegyházi, M.3
Papadimitratos, P.4
Hubaux, J.-P.5
-
28
-
-
35349016950
-
AMOEBA: Robust location privacy scheme for VANET
-
Sampigethaya K, Li M, Huang L, Poovendran R,. AMOEBA: Robust location privacy scheme for VANET. IEEE Journal on Selected Areas in Communications 2007; 25 (8): 1569-1589.
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.8
, pp. 1569-1589
-
-
Sampigethaya, K.1
Li, M.2
Huang, L.3
Poovendran, R.4
-
29
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
In, MobiSys '03. ACM: New York, NY, USA
-
Gruteser M, Grunwald D,. 2003. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, MobiSys '03. ACM: New York, NY, USA; 31-42.
-
(2003)
Proceedings of the 1st International Conference on Mobile Systems, Applications and Services
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
30
-
-
34548163875
-
-
International Patent, WO 03/034294 A2
-
Thielscher C, Gottfried M, Umbreit S, Boegner F, Haack J, Schroeders N,. Patent: Data processing system for patient data, International Patent, WO 03/034294 A2, 2005.
-
(2005)
Patent: Data Processing System for Patient Data
-
-
Thielscher, C.1
Gottfried, M.2
Umbreit, S.3
Boegner, F.4
Haack, J.5
Schroeders, N.6
-
31
-
-
51449090174
-
Pseudonymization for improving the privacy in e-health applications
-
In, HICSS '08. IEEE Computer Society: Washington, DC, USA
-
Riedl B, Grascher V, Fenz S, Neubauer T,. Pseudonymization for improving the privacy in e-health applications. In Proceedings of the proceedings of the 41st Annual Hawaii International Conference on System Sciences, HICSS '08. IEEE Computer Society: Washington, DC, USA, 2008; 255.
-
(2008)
Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences
, pp. 255
-
-
Riedl, B.1
Grascher, V.2
Fenz, S.3
Neubauer, T.4
-
32
-
-
84885574219
-
-
release 1.1.10, Aug
-
Minshall G,. Tcpdpriv, release 1.1.10, Aug. 1997.
-
(1997)
Tcpdpriv
-
-
Minshall, G.1
-
33
-
-
4444266989
-
Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
-
Oct
-
Fan J, Xu J, Ammar MH, Moon SB,. Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. Computer Networks (Amsterdam, Netherlands: 1999) Oct. 2004; 46 (2): 253-272.
-
(2004)
Computer Networks (Amsterdam, Netherlands: 1999)
, vol.46
, Issue.2
, pp. 253-272
-
-
Fan, J.1
Xu, J.2
Ammar, M.H.3
Moon, S.B.4
-
34
-
-
23944476196
-
Minimalist cryptography for low-cost RFID tags (extended abstract)
-
In, Lecture Notes in Computer Science. Springer: Berlin / Heidelberg
-
Juels A,. Minimalist cryptography for low-cost RFID tags (extended abstract). In Security in Communication Networks, Vol. 3352, Lecture Notes in Computer Science. Springer: Berlin / Heidelberg, 2005; 149-164.
-
(2005)
Security in Communication Networks
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
35
-
-
26444435642
-
RFID Guardian: A battery-powered mobile device for RFID privacy management
-
In, Boyd C. Nieto J.M.G. (eds), Lecture Notes in Computer Science. Springer: New York, NY
-
Rieback MR, Crispo B, Tanenbaum AS,. RFID Guardian: A battery-powered mobile device for RFID privacy management. In ACISP, Vol. 3574, Boyd C, Nieto JMG, (eds), Lecture Notes in Computer Science. Springer: New York, NY, 2005; 184-194.
-
(2005)
ACISP
, vol.3574
, pp. 184-194
-
-
Rieback, M.R.1
Crispo, B.2
Tanenbaum, A.S.3
-
36
-
-
33746092119
-
High-power proxies for enhancing RFID privacy and utility
-
In, Lecture Notes in Computer Science. Springer: New York, NY
-
Juels A, Syverson PF, Bailey DV,. High-power proxies for enhancing RFID privacy and utility. In Privacy Enhancing Technologies, Vol. 3856, Lecture Notes in Computer Science. Springer: New York, NY, 2005; 210-226.
-
(2005)
Privacy Enhancing Technologies
, vol.3856
, pp. 210-226
-
-
Juels, A.1
Syverson, P.F.2
Bailey, D.V.3
-
40
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum D,. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 1981; 24 (2): 84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
42
-
-
33746097415
-
Privacy issues in vehicular ad hoc networks
-
In, Danezis G. Martin D. (eds), Lecture Notes in Computer Science. Springer: New York, NY
-
Dötzer F,. Privacy issues in vehicular ad hoc networks. In Privacy Enhancing Technologies, Vol. 3856, Danezis G, Martin D, (eds), Lecture Notes in Computer Science. Springer: New York, NY, 2005; 197-209.
-
(2005)
Privacy Enhancing Technologies
, vol.3856
, pp. 197-209
-
-
Dötzer, F.1
-
43
-
-
2342617507
-
E-voting: Secret-ballot receipts: True voter-verifiable elections
-
Jan. Feb
-
Chaum D,. E-voting: secret-ballot receipts: True voter-verifiable elections. IEEE Security and Privacy Jan. Feb. 2004 2 (1): 38-47.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.1
, pp. 38-47
-
-
Chaum, D.1
-
46
-
-
2942590116
-
RFID systems and security and privacy implications
-
In, Lecture Notes in Computer Science. Springer: Berlin / Heidelberg
-
Sarma S, Weis S, Engels D,. RFID systems and security and privacy implications. In Cryptographic Hardware and Embedded Systems-CHES 2002, Vol. 2523, Lecture Notes in Computer Science. Springer: Berlin / Heidelberg, 2003; 1-19.
-
(2003)
Cryptographic Hardware and Embedded Systems - CHES 2002
, vol.2523
, pp. 1-19
-
-
Sarma, S.1
Weis, S.2
Engels, D.3
-
48
-
-
0038041177
-
Introducing MorphMix: Peer-to-peer based anonymous Internet usage with collusion detection
-
In. ACM Press: New York, NY, USA
-
Rennhard M, Plattner B,. Introducing MorphMix: Peer-to-peer based anonymous Internet usage with collusion detection. In WPES '02: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society. ACM Press: New York, NY, USA, 2002; 91-102.
-
(2002)
WPES '02: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society
, pp. 91-102
-
-
Rennhard, M.1
Plattner, B.2
-
50
-
-
84954409133
-
Mixminion: Design of a type III anonymous remailer protocol
-
In. IEEE Computer Society: Los Alamitos, CA
-
Danezis G, Dingledine R, Mathewson N,. Mixminion: Design of a type III anonymous remailer protocol. In Proceedings of the 2003 Symposium on Security and Privacy. IEEE Computer Society: Los Alamitos, CA, 2003; 2-15.
-
(2003)
Proceedings of the 2003 Symposium on Security and Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
51
-
-
0030676973
-
Anonymous connections and onion routing
-
Oakland, California, 4-7 May
-
Syverson PF, Goldschlag DM, Reed MG,. Anonymous connections and onion routing. In IEEE Symposium on Security and Privacy, Oakland, California, 4-7 May 1997; 44-54.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
53
-
-
35248832722
-
Squealing Euros: Privacy protection in rfid-enabled banknotes
-
In, Lecture Notes in Computer Science. Springer: Berlin / Heidelberg
-
Juels A, Pappu R,. Squealing Euros: Privacy protection in rfid-enabled banknotes. In Financial cryptography, Vol. 2742, Lecture Notes in Computer Science. Springer: Berlin / Heidelberg, 2003; 103-121.
-
(2003)
Financial Cryptography
, vol.2742
, pp. 103-121
-
-
Juels, A.1
Pappu, R.2
-
54
-
-
84890010554
-
Stop-and-go-mixes providing probabilistic anonymity in an open system
-
In, Lecture Notes in Computer Science. Springer: New York, NY
-
Kesdogan D, Egner J, Bschkes R,. Stop-and-go-mixes providing probabilistic anonymity in an open system. In Information Hiding, Vol. 1525, Lecture Notes in Computer Science. Springer: New York, NY, 1998; 83-98.
-
(1998)
Information Hiding
, vol.1525
, pp. 83-98
-
-
Kesdogan, D.1
Egner, J.2
Bschkes, R.3
-
55
-
-
33947121654
-
Protection of location privacy using dummies for location-based services
-
In. IEEE Computer Society: Los Alamitos, CA
-
Kido H, Yanagisawa Y, Satoh T,. Protection of location privacy using dummies for location-based services. In ICDE Workshops, Tokyo, Japan. IEEE Computer Society: Los Alamitos, CA, 2005; 1248.
-
(2005)
ICDE Workshops, Tokyo, Japan
, pp. 1248
-
-
Kido, H.1
Yanagisawa, Y.2
Satoh, T.3
-
57
-
-
0021389555
-
Practical data-swapping: The first steps
-
March
-
Reiss SP,. Practical data-swapping: The first steps. ACM Transactions on Database Systems March 1984 9: 20-37.
-
(1984)
ACM Transactions on Database Systems
, vol.9
, pp. 20-37
-
-
Reiss, S.P.1
-
58
-
-
0041783510
-
Privacy-preserving data mining
-
In. ACM: New York, NY, USA
-
Agrawal R, Srikant R,. Privacy-preserving data mining. In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, SIGMOD '00. ACM: New York, NY, USA, 2000; 439-450.
-
(2000)
Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, SIGMOD '00
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
60
-
-
0010275933
-
-
Usenet post, August
-
Dai W,. Pipenet 1.1. Usenet post, August 1996.
-
(1996)
Pipenet 1.1
-
-
Dai, W.1
-
61
-
-
0037629738
-
On effectiveness of link padding for statistical traffic analysis attacks
-
IEEE Computer Society: Providence, RI, May
-
Fu X, Graham B, Bettati R, Zhao W,. On effectiveness of link padding for statistical traffic analysis attacks. In 23th International Conference on Distributed Computing Systems (23th ICDCS '03). IEEE Computer Society: Providence, RI, May 2003; 340-.
-
(2003)
23th International Conference on Distributed Computing Systems (23th ICDCS '03)
, pp. 340
-
-
Fu, X.1
Graham, B.2
Bettati, R.3
Zhao, W.4
-
62
-
-
69749095702
-
Dependent link padding algorithms for low latency anonymity systems
-
In, CCS '08. ACM: New York, NY, USA
-
Wang W, Motani M, Srinivasan V,. Dependent link padding algorithms for low latency anonymity systems. In Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS '08. ACM: New York, NY, USA, 2008; 323-332.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 323-332
-
-
Wang, W.1
Motani, M.2
Srinivasan, V.3
-
63
-
-
0020312165
-
Protocols for secure computations
-
In, Chicago, IL
-
Yao AC,. Protocols for secure computations. In Foundations of Computer Science, 1982. SFCS '08. 23rd Annual Symposium on, Chicago, IL, 1982; 160-164.
-
(1982)
Foundations of Computer Science, 1982. SFCS '08. 23rd Annual Symposium on
, pp. 160-164
-
-
Yao, A.C.1
-
64
-
-
77955434225
-
Privacy-preserving queries over relational databases
-
In, Atallah M. Hopper N. (eds), Lecture Notes in Computer Science. Springer: New York, NY
-
Olumofin F, Goldberg I,. Privacy-preserving queries over relational databases. In Privacy enhancing technologies, vol. 6205, Atallah M, Hopper N, (eds), Lecture Notes in Computer Science. Springer: New York, NY, 2010.
-
(2010)
Privacy Enhancing Technologies
, vol.6205
-
-
Olumofin, F.1
Goldberg, I.2
-
65
-
-
35048820609
-
Efficient private matching and set intersection
-
In, Lecture Notes in Computer Science. Springer: New York, NY
-
Freedman MJ, Nissim K, Pinkas B,. Efficient private matching and set intersection. In Advances in Cryptology-EUROCRYPT 2004, Vol. 3027, Lecture Notes in Computer Science. Springer: New York, NY, 2004; 1-19.
-
(2004)
Advances in Cryptology-EUROCRYPT 2004
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
66
-
-
77955460498
-
-
ICANN Security and Stability Advisory Committee, SAC 024, Feb
-
ICANN Security and Stability Advisory Committee. Report on domain name front running, SAC 024, Feb. 2008.
-
(2008)
Report on Domain Name Front Running
-
-
-
67
-
-
33749033903
-
The Pynchon Gate: A secure method of pseudonymous mail retrieval
-
Alexandria, VA
-
Sassaman L, Cohen B, Mathewson N,. The Pynchon Gate: A secure method of pseudonymous mail retrieval. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES '05, Alexandria, VA, 2005.
-
(2005)
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES '05
-
-
Sassaman, L.1
Cohen, B.2
Mathewson, N.3
-
68
-
-
69949163699
-
Privacy-preserving face recognition
-
In, PETS '09. Springer-Verlag: Berlin, Heidelberg, 253
-
Erkin Z, Franz M, Guajardo J, Katzenbeisser S, Lagendijk I, Toft T,. Privacy-preserving face recognition. In Proceedings of the 9th International Symposium on Privacy Enhancing Technologies, PETS '09. Springer-Verlag: Berlin, Heidelberg, 2009; 235 -; 253.
-
(2009)
Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
, pp. 235
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
69
-
-
77955441003
-
Drac: An architecture for anonymous low-volume communications
-
In, PETS '10. Springer-Verlag: Berlin, Heidelberg
-
Danezis G, Diaz C, Troncoso C, Laurie B,. Drac: An architecture for anonymous low-volume communications. In Proceedings of the 10th International Conference on Privacy Enhancing Technologies, PETS '10. Springer-Verlag: Berlin, Heidelberg, 2010; 202-219.
-
(2010)
Proceedings of the 10th International Conference on Privacy Enhancing Technologies
, pp. 202-219
-
-
Danezis, G.1
Diaz, C.2
Troncoso, C.3
Laurie, B.4
-
70
-
-
10044278069
-
Development and evaluation of emerging design patterns for ubiquitous computing
-
In. ACM: New York, NY, USA
-
Chung ES, Hong JI, Lin J, Prabaker MK, Landay JA, Liu AL,. Development and evaluation of emerging design patterns for ubiquitous computing. In Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, DIS '04. ACM: New York, NY, USA, 2004; 233-242.
-
(2004)
Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, DIS '04
, pp. 233-242
-
-
Chung, E.S.1
Hong, J.I.2
Lin, J.3
Prabaker, M.K.4
Landay, J.A.5
Liu, A.L.6
|