-
1
-
-
84883690601
-
What is privacy worth?
-
Acquisti, A., John, L. K., and Loewenstein, G. What is privacy worth? Journal of Legal Studies 42, 2 (2013), 249-274.
-
(2013)
Journal of Legal Studies
, vol.42
, Issue.2
, pp. 249-274
-
-
Acquisti, A.1
John, L.K.2
Loewenstein, G.3
-
2
-
-
33845516751
-
Security against compelled disclosure
-
Brown, I., and Laurie, B. Security against compelled disclosure. In Proc. IEEE ACSAC (Dec 2000), 2-10.
-
(2000)
Proc IEEE ACSAC (Dec
, pp. 2-10
-
-
Brown, I.1
Laurie, B.2
-
3
-
-
85015052495
-
Human data interaction: Historical lessons from social studies and CSCW
-
Sept. 19-23
-
Crabtree, A., and Mortier, R. Human data interaction: Historical lessons from social studies and CSCW. In Proc. ECSCW (Oslo, Norway, Sept. 19-23 2015).
-
(2015)
Proc. ECSCW (Oslo, Norway
-
-
Crabtree, A.1
Mortier, R.2
-
4
-
-
84904099862
-
Openpds: Protecting the privacy of metadata through safeanswers
-
de Montjoye, Y.-A., Shmueli, E., Wang, S. S., and Pentland, A. S. openpds: Protecting the privacy of metadata through safeanswers. PLoS ONE 9, 7 (07 2014), e98790.
-
(2014)
PLoS ONE 9
, vol.7
, Issue.7
-
-
De Montjoye, Y.-A.1
Shmueli, E.2
Wang, S.S.3
Pentland, A.S.4
-
5
-
-
33845422335
-
What we talk about when we talk about context
-
Feb
-
Dourish, P. What we talk about when we talk about context. PUC 8, 1 (Feb. 2004), 19-30.
-
(2004)
PUC
, vol.8
, Issue.1
, pp. 19-30
-
-
Dourish, P.1
-
6
-
-
33746335051
-
Differential privacy
-
Springer
-
Dwork, C. Differential privacy. In Automata, Languages and Programming, M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, Eds., vol. 4052 of LNCS. Springer, 2006, 1-12.
-
(2006)
Automata, Languages and Programming, M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, Eds 4052 of LNCS
, pp. 1-12
-
-
Dwork, C.1
-
7
-
-
85013117051
-
Anatomy of the third-party web tracking ecosystem
-
Falahrastegar, M., Haddadi, H., Uhlig, S., and Mortier, R. Anatomy of the third-party web tracking ecosystem. CoRR abs/1409.1066 (2014).
-
(2014)
CoRR abs/1409.1066
-
-
Falahrastegar, M.1
Haddadi, H.2
Uhlig, S.3
Mortier, R.4
-
8
-
-
85009802027
-
Irmin: A branch-consistent distributed library database
-
Sept
-
Gazagnaire, T., Chaudhry, A., Crowcroft, J., Madhavapeddy, A., Mortier, R., Scott, D., Sheets, D., and Tsipenyuk, G. Irmin: A branch-consistent distributed library database. In Proc. ICFP OCaml User and Developer Workshop (Sept. 2014).
-
(2014)
Proc. ICFP OCaml User and Developer Workshop
-
-
Gazagnaire, T.1
Chaudhry, A.2
Crowcroft, J.3
Madhavapeddy, A.4
Mortier, R.5
Scott, D.6
Sheets, D.7
Tsipenyuk, G.8
-
9
-
-
78650854161
-
Serving ads from localhost for performance, privacy, and profit. in
-
Guha, S., Reznichenko, A., Tang, K., Haddadi, H., and Francis, P. Serving ads from localhost for performance, privacy, and profit. In ACM Workshop on Hot Topics in Networks (2009).
-
(2009)
ACM Workshop on Hot Topics in Networks
-
-
Guha, S.1
Reznichenko, A.2
Tang, K.3
Haddadi, H.4
Francis, P.5
-
10
-
-
84905233920
-
Can you engineer privacy?
-
Aug
-
Gurses, S. Can you engineer privacy? Commun. ACM 57, 8 (Aug. 2014), 20-23.
-
(2014)
Commun ACM
, vol.57
, Issue.8
, pp. 20-23
-
-
Gurses, S.1
-
12
-
-
84860289389
-
Dont kill my ads! balancing privacy in an ad-supported mobile application market
-
Leontiadis, I., Efstratiou, C., Picone, M., and Mascolo, C. Dont kill my ads! balancing privacy in an ad-supported mobile application market. Proc. ACM HotMobile (2012).
-
(2012)
Proc ACM HotMobile
-
-
Leontiadis, I.1
Efstratiou, C.2
Picone, M.3
Mascolo, C.4
-
13
-
-
84885227348
-
An informed view on consent for UbiComp
-
Luger, E., and Rodden, T. An informed view on consent for UbiComp. In Proc. ACM UBICOMP (2013), 529-538.
-
(2013)
Proc ACM UBICOMP
, pp. 529-538
-
-
Luger, E.1
Rodden, T.2
-
14
-
-
84875658681
-
Unikernels: Library operating systems for the cloud
-
Madhavapeddy, A., Mortier, R., Rotsos, C., Scott, D., Singh, B., Gazagnaire, T., Smith, S., Hand, S., and Crowcroft, J. Unikernels: Library operating systems for the cloud. In Proc. ACM ASPLOS (Mar. 16-20 2013).
-
(2013)
Proc ACM ASPLOS (Mar. 16-20
-
-
Madhavapeddy, A.1
Mortier, R.2
Rotsos, C.3
Scott, D.4
Singh, B.5
Gazagnaire, T.6
Smith, S.7
Hand, S.8
Crowcroft, J.9
-
17
-
-
84874762005
-
The personal container, or your life in bits
-
Mortier, R., Greenhalgh, C., McAuley, D., Spence, A., Madhavapeddy, A., Crowcroft, J., and Hand, S. The personal container, or your life in bits. Proc. Digital Futures (2010).
-
(2010)
Proc. Digital Futures
-
-
Mortier, R.1
Greenhalgh, C.2
McAuley, D.3
Spence, A.4
Madhavapeddy, A.5
Crowcroft, J.6
Hand, S.7
-
18
-
-
84966344728
-
Human-data interaction: The human face of the data-driven society
-
Oct. 1
-
Mortier, R., Haddadi, H., Henderson, T., McAuley, D., and Crowcroft, J. Human-data interaction: The human face of the data-driven society. SSRN (Oct. 1 2014). http://dx.doi.org/10.2139/ssrn.2508051.
-
(2014)
SSRN
-
-
Mortier, R.1
Haddadi, H.2
Henderson, T.3
McAuley, D.4
Crowcroft, J.5
-
19
-
-
84869030778
-
Homework: Putting interaction into the infrastructure
-
Mortier, R., Rodden, T., Tolmie, P., Lodge, T., Spencer, R., Crabtree, A., Sventek, J., and Koliousis, A. Homework: Putting interaction into the infrastructure. In Proc. ACM UIST (2012), 197-206.
-
(2012)
Proc ACM UIST
, pp. 197-206
-
-
Mortier, R.1
Rodden, T.2
Tolmie, P.3
Lodge, T.4
Spencer, R.5
Crabtree, A.6
Sventek, J.7
Koliousis, A.8
-
20
-
-
85014530583
-
Personal data vaults: A locus of control for personal data streams
-
Mun, M., Hao, S., Mishra, N., Shilton, K., Burke, J., Estrin, D., Hansen, M., and Govindan, R. Personal data vaults: A locus of control for personal data streams. In Proc. ACM CoNEXT (2010), 1-12.
-
(2010)
Proc ACM CoNEXT
, pp. 1-12
-
-
Mun, M.1
Hao, S.2
Mishra, N.3
Shilton, K.4
Burke, J.5
Estrin, D.6
Hansen, M.7
Govindan, R.8
-
21
-
-
80955157888
-
Can homomorphic encryption be practical? in Proc
-
Naehrig, M., Lauter, K., and Vaikuntanathan, V. Can homomorphic encryption be practical? In Proc. ACM Cloud Computing Security Workshop (2011), 113-124.
-
(2011)
ACM Cloud Computing Security Workshop
, pp. 113-124
-
-
Naehrig, M.1
Lauter, K.2
Vaikuntanathan, V.3
-
22
-
-
85009203425
-
Engineering a Market for Personal Data: The Hub-of-All-Things (HAT), A Briefing Paper
-
Ng, I. C. Engineering a Market for Personal Data: The Hub-of-All-Things (HAT), A Briefing Paper. WMG Service Systems Working Paper Series (2014).
-
(2014)
WMG Service Systems Working Paper Series
-
-
Ng, I.C.1
-
23
-
-
85084164688
-
Lost in the edge: Finding your way with Signposts
-
Aug. 13
-
Rotsos, C., Howard, H., Sheets, D., Mortier, R., Madhavapeddy, A., Chaudhry, A., and Crowcroft, J. Lost in the edge: Finding your way with Signposts. In Proc. USENIX FOCI (Aug. 13 2013).
-
(2013)
Proc. USENIX FOCI
-
-
Rotsos, C.1
Howard, H.2
Sheets, D.3
Mortier, R.4
Madhavapeddy, A.5
Chaudhry, A.6
Crowcroft, J.7
-
24
-
-
85018038169
-
Perceived risks of personal data sharing
-
Nov
-
Skatova, A., Johal, J., Houghton, R., Mortier, R., Bhandari, N., Lodge, T., Wagner, C., Goulding, J., Crowcroft, J., and Madhavapeddy, A. Perceived risks of personal data sharing. In Proc. Digital Economy: Open Digital (Nov. 2013).
-
(2013)
Proc. Digital Economy: Open Digital
-
-
Skatova, A.1
Johal, J.2
Houghton, R.3
Mortier, R.4
Bhandari, N.5
Lodge, T.6
Wagner, C.7
Goulding, J.8
Crowcroft, J.9
Madhavapeddy, A.10
-
25
-
-
84970881005
-
Commercial break: Characterizing mobile advertising
-
Vallina-Rodriguez, N., Shah, J., Finamore, A., Grunenberger, Y., Papagiannaki, K., Haddadi, H., and Crowcroft, J. Commercial break: Characterizing mobile advertising. In Proc. ACM IMC (2012).
-
(2012)
Proc ACM IMC
-
-
Vallina-Rodriguez, N.1
Shah, J.2
Finamore, A.3
Grunenberger, Y.4
Papagiannaki, K.5
Haddadi, H.6
Crowcroft, J.7
|