-
1
-
-
84884955109
-
The path less travelled: Overcoming Tor's bottlenecks with traffic splitting
-
Springer, July
-
M. Alsabah, K. Bauer, T. Elahi, and I. Goldberg. The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting. In Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS ), pages 143-163. Springer, July 2013.
-
(2013)
Proceedings of the 13th Privacy Enhancing Technologies Symposium (PETS)
, pp. 143-163
-
-
Alsabah, M.1
Bauer, K.2
Elahi, T.3
Goldberg, I.4
-
2
-
-
84937844200
-
-
Retrieved May 2014
-
Anonymizer Inc. Anonymizer. https://www.anonymizer.com/index.html, 2013. Retrieved May 2014.
-
(2013)
Anonymizer
-
-
Anonymizer Inc.1
-
3
-
-
84884999092
-
Verified computational differential privacy with applications to smart metering
-
G. Barthe, G. Danezis, B. Grégoire, C. Kunz, and S. Zanella-Béguelin. Verified computational differential privacy with applications to smart metering. In 26th IEEE Computer Security Foundations Symposium (CSF), pages 287-301, 2013.
-
(2013)
26th IEEE Computer Security Foundations Symposium (CSF)
, pp. 287-301
-
-
Barthe, G.1
Danezis, G.2
Grégoire, B.3
Kunz, C.4
Zanella-Béguelin, S.5
-
4
-
-
51849137365
-
Distributed private data analysis: Simultaneously solving how and what
-
Springer
-
A. Beimel, K. Nissim, and E. Omri. Distributed private data analysis: Simultaneously solving how and what. In Advances in Cryptology-CRYPTO 2008, pages 451-468. Springer, 2008.
-
(2008)
Advances in Cryptology-CRYPTO 2008
, pp. 451-468
-
-
Beimel, A.1
Nissim, K.2
Omri, E.3
-
7
-
-
35048882121
-
Comparison between two practical mix designs
-
Springer
-
C. Diaz, L. Sassaman, and E. Dewitte. Comparison between two practical mix designs. In ESORICS 2004, pages 141-159. Springer, 2004.
-
(2004)
ESORICS 2004
, pp. 141-159
-
-
Diaz, C.1
Sassaman, L.2
Dewitte, E.3
-
10
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
Springer
-
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor. Our data, ourselves: Privacy via distributed noise generation. In Advances in Cryptology-EUROCRYPT 2006, pages 486-503. Springer, 2006.
-
(2006)
Advances in Cryptology-EUROCRYPT 2006
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
12
-
-
84910608284
-
PrivEx: Private collection of traffic statistics for anonymous communication networks
-
T. Elahi, G. Danezis, and I. Goldberg. PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks. Technical Report 2014-08, CACR, 2014. http://cacr.uwaterloo.ca/techreports/2014/cacr2014-08.pdf.
-
(2014)
Technical Report 2014-08, CACR
-
-
Elahi, T.1
Danezis, G.2
Goldberg, I.3
-
13
-
-
84884467207
-
Accuracy-privacy tradeoffs for two-party differentially private protocols
-
Springer
-
V. Goyal, I. Mironov, O. Pandey, and A. Sahai. Accuracy-privacy tradeoffs for two-party differentially private protocols. In Advances in Cryptology-CRYPTO 2013, pages 298-315. Springer, 2013.
-
(2013)
Advances in Cryptology-CRYPTO 2013
, pp. 298-315
-
-
Goyal, V.1
Mironov, I.2
Pandey, O.3
Sahai, A.4
-
16
-
-
84937915180
-
-
Retrieved May 2014
-
JonDo Inc. JonDonym. http://anonymous-proxy-servers.net/, 2013. Retrieved May 2014.
-
(2013)
JonDonym
-
-
JonDo Inc.1
-
18
-
-
84873947082
-
Analyzing graphs with node differential privacy
-
Springer
-
S. P. Kasiviswanathan, K. Nissim, S. Raskhodnikova, and A. Smith. Analyzing graphs with node differential privacy. In Theory of Cryptography, pages 457-476. Springer, 2013.
-
(2013)
Theory of Cryptography
, pp. 457-476
-
-
Kasiviswanathan, S.P.1
Nissim, K.2
Raskhodnikova, S.3
Smith, A.4
-
19
-
-
20444495394
-
How to achieve blocking resistance for existing systems enabling anonymous web surfing
-
Washington, DC, USA, October
-
S. Köpsell and U. Hillig. How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing. In Workshop on Privacy in the Electronic Society (WPES), Washington, DC, USA, October 2004.
-
(2004)
Workshop on Privacy in the Electronic Society (WPES)
-
-
Köpsell, S.1
Hillig, U.2
-
21
-
-
74049083962
-
-
Retrieved August 2014
-
K. Loesing. Measuring the Tor Network. https://research.torproject.org/techreports/directory-requests-2009-06-25.pdf, 2009. Retrieved August 2014.
-
(2009)
Measuring the Tor Network
-
-
Loesing, K.1
-
22
-
-
50249133191
-
Shining light in dark places: Understanding the Tor network
-
Springer
-
D. McCoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker. Shining light in dark places: Understanding the Tor network. In 8th Privacy Enhancing Technologies Symposium (PETS), pages 63-76. Springer, 2008.
-
(2008)
8th Privacy Enhancing Technologies Symposium (PETS)
, pp. 63-76
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
23
-
-
78751557330
-
The limits of two-party differential privacy
-
IEEE
-
A. McGregor, I. Mironov, T. Pitassi, O. Reingold, K. Talwar, and S. Vadhan. The limits of two-party differential privacy. In 51st IEEE Symposium on Foundations of Computer Science (FOCS), pages 81-90. IEEE, 2010.
-
(2010)
51st IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 81-90
-
-
McGregor, A.1
Mironov, I.2
Pitassi, T.3
Reingold, O.4
Talwar, K.5
Vadhan, S.6
-
25
-
-
70350338483
-
Computational differential privacy
-
Springer
-
I. Mironov, O. Pandey, O. Reingold, and S. Vadhan. Computational differential privacy. In Advances in Cryptology-CRYPTO 2009, pages 126-142. Springer, 2009.
-
(2009)
Advances in Cryptology-CRYPTO 2009
, pp. 126-142
-
-
Mironov, I.1
Pandey, O.2
Reingold, O.3
Vadhan, S.4
-
28
-
-
84966238549
-
Monte carlo methods for index computation (mod p)
-
J. M. Pollard. Monte carlo methods for index computation (mod p). Mathematics of computation, 32(143):918-924, 1978.
-
(1978)
Mathematics of Computation
, vol.32
, Issue.143
, pp. 918-924
-
-
Pollard, J.M.1
-
30
-
-
0000211152
-
Class number, a theory of factorization, and genera
-
D. Shanks. Class number, a theory of factorization, and genera. In Proc. Symp. Pure Math, volume 20, pages 415-440, 1971.
-
(1971)
Proc. Symp. Pure Math
, vol.20
, pp. 415-440
-
-
Shanks, D.1
-
31
-
-
84865546831
-
Privacy-preserving aggregation of time-series data
-
E. Shi, T.-H. H. Chan, E. G. Rieffel, R. Chow, and D. Song. Privacy-preserving aggregation of time-series data. In Network and Distributed System Security Symposium (NDSS), 2011.
-
(2011)
Network and Distributed System Security Symposium (NDSS)
-
-
Shi, E.1
Chan, T.-H.H.2
Rieffel, E.G.3
Chow, R.4
Song, D.5
-
33
-
-
84861428495
-
Enforced community standards for research on users of the tor anonymity network
-
C. Soghoian. Enforced Community Standards for Research on Users of the Tor Anonymity Network. In 2nd Workshop on Ethics in Computer Security Research (WECSR), pages 146-153, 2011.
-
(2011)
2nd Workshop on Ethics in Computer Security Research (WECSR)
, pp. 146-153
-
-
Soghoian, C.1
|