International Symposium on Privacy Enhancing Technologies最新文献

筛选
英文 中文
Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications 傻瓜会成功吗?匿名通信中虚拟流量保护的局限性
International Symposium on Privacy Enhancing Technologies Pub Date : 2014-07-16 DOI: 10.1007/978-3-319-08506-7_11
Simon Oya, C. Troncoso, F. Pérez-González
{"title":"Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications","authors":"Simon Oya, C. Troncoso, F. Pérez-González","doi":"10.1007/978-3-319-08506-7_11","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_11","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115444430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Measuring Freenet in the Wild: Censorship-Resilience under Observation 在野外测量自由网络:观察下的审查-弹性
International Symposium on Privacy Enhancing Technologies Pub Date : 2014-07-16 DOI: 10.1007/978-3-319-08506-7_14
Stefanie Roos, Benjamin Schiller, Stefan Hacker, T. Strufe
{"title":"Measuring Freenet in the Wild: Censorship-Resilience under Observation","authors":"Stefanie Roos, Benjamin Schiller, Stefan Hacker, T. Strufe","doi":"10.1007/978-3-319-08506-7_14","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_14","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131374108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Exploiting Delay Patterns for User IPs Identification in Cellular Networks 利用延迟模式识别蜂窝网络中的用户ip
International Symposium on Privacy Enhancing Technologies Pub Date : 2014-07-16 DOI: 10.1007/978-3-319-08506-7_12
V. Perta, M. Barbera, A. Mei
{"title":"Exploiting Delay Patterns for User IPs Identification in Cellular Networks","authors":"V. Perta, M. Barbera, A. Mei","doi":"10.1007/978-3-319-08506-7_12","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_12","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114293710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency 两全其美:结合信息论和计算PIR提高通信效率
International Symposium on Privacy Enhancing Technologies Pub Date : 2014-07-16 DOI: 10.1007/978-3-319-08506-7_4
Casey Devet, I. Goldberg
{"title":"The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency","authors":"Casey Devet, I. Goldberg","doi":"10.1007/978-3-319-08506-7_4","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_4","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122954130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
CloudTransport: Using Cloud Storage for Censorship-Resistant Networking 云传输:使用云存储进行抗审查网络
International Symposium on Privacy Enhancing Technologies Pub Date : 2014-07-16 DOI: 10.1007/978-3-319-08506-7_1
Chad Brubaker, A. Houmansadr, Vitaly Shmatikov
{"title":"CloudTransport: Using Cloud Storage for Censorship-Resistant Networking","authors":"Chad Brubaker, A. Houmansadr, Vitaly Shmatikov","doi":"10.1007/978-3-319-08506-7_1","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_1","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126976272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Quantifying the Effect of Co-location Information on Location Privacy 共址信息对位置隐私的量化影响
International Symposium on Privacy Enhancing Technologies Pub Date : 2014-07-16 DOI: 10.1007/978-3-319-08506-7_10
Alexandra Olteanu, Kévin Huguenin, R. Shokri, J. Hubaux
{"title":"Quantifying the Effect of Co-location Information on Location Privacy","authors":"Alexandra Olteanu, Kévin Huguenin, R. Shokri, J. Hubaux","doi":"10.1007/978-3-319-08506-7_10","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_10","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129652466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
On the Effectiveness of Obfuscation Techniques in Online Social Networks 在线社交网络中混淆技术的有效性研究
International Symposium on Privacy Enhancing Technologies Pub Date : 2014-07-16 DOI: 10.1007/978-3-319-08506-7_3
Terence Chen, R. Boreli, M. Kâafar, Arik Friedman
{"title":"On the Effectiveness of Obfuscation Techniques in Online Social Networks","authors":"Terence Chen, R. Boreli, M. Kâafar, Arik Friedman","doi":"10.1007/978-3-319-08506-7_3","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_3","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125041355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Why Doesn't Jane Protect Her Privacy? 为什么简不保护自己的隐私?
International Symposium on Privacy Enhancing Technologies Pub Date : 2014-07-16 DOI: 10.1007/978-3-319-08506-7_13
K. Renaud, M. Volkamer, Arne Renkema-Padmos
{"title":"Why Doesn't Jane Protect Her Privacy?","authors":"K. Renaud, M. Volkamer, Arne Renkema-Padmos","doi":"10.1007/978-3-319-08506-7_13","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_13","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116535294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 107
Social Status and the Demand for Security and Privacy 社会地位与安全隐私需求
International Symposium on Privacy Enhancing Technologies Pub Date : 2014-07-16 DOI: 10.1007/978-3-319-08506-7_5
Jens Grossklags, Nigel J. Barradale
{"title":"Social Status and the Demand for Security and Privacy","authors":"Jens Grossklags, Nigel J. Barradale","doi":"10.1007/978-3-319-08506-7_5","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_5","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132631563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
I Know What You're Buying: Privacy Breaches on eBay 我知道你在买什么:eBay上的隐私泄露
International Symposium on Privacy Enhancing Technologies Pub Date : 2014-07-16 DOI: 10.1007/978-3-319-08506-7_9
Tehila Minkus, K. Ross
{"title":"I Know What You're Buying: Privacy Breaches on eBay","authors":"Tehila Minkus, K. Ross","doi":"10.1007/978-3-319-08506-7_9","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_9","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"89 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129060662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信