{"title":"Forward-Secure Distributed Encryption","authors":"W. Lueks, J. Hoepman, K. Kursawe","doi":"10.1007/978-3-319-08506-7_7","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_7","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131956678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Chatzikokolakis, C. Palamidessi, Marco Stronati
{"title":"A Predictive Differentially-Private Mechanism for Mobility Traces","authors":"K. Chatzikokolakis, C. Palamidessi, Marco Stronati","doi":"10.1007/978-3-319-08506-7_2","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_2","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133576257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Markulf Kohlweiss, U. Maurer, Cristina Onete, Björn Tackmann, D. Venturi
{"title":"Anonymity-Preserving Public-Key Encryption: A Constructive Approach","authors":"Markulf Kohlweiss, U. Maurer, Cristina Onete, Björn Tackmann, D. Venturi","doi":"10.1007/978-3-642-39077-7_2","DOIUrl":"https://doi.org/10.1007/978-3-642-39077-7_2","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124491325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards","authors":"M. Harbach, S. Fahl, M. Rieger, Matthew Smith","doi":"10.1007/978-3-642-39077-7_13","DOIUrl":"https://doi.org/10.1007/978-3-642-39077-7_13","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127767664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OSS: Using Online Scanning Services for Censorship Circumvention","authors":"D. Fifield, Gabi Nakibly, D. Boneh","doi":"10.1007/978-3-642-39077-7_10","DOIUrl":"https://doi.org/10.1007/978-3-642-39077-7_10","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125804764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Chatzikokolakis, M. Andrés, N. E. Bordenabe, C. Palamidessi
{"title":"Broadening the Scope of Differential Privacy Using Metrics","authors":"K. Chatzikokolakis, M. Andrés, N. E. Bordenabe, C. Palamidessi","doi":"10.1007/978-3-642-39077-7_5","DOIUrl":"https://doi.org/10.1007/978-3-642-39077-7_5","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131812636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Soroush, Keen Sung, E. Learned-Miller, B. Levine, M. Liberatore
{"title":"Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet","authors":"H. Soroush, Keen Sung, E. Learned-Miller, B. Levine, M. Liberatore","doi":"10.1007/978-3-642-39077-7_6","DOIUrl":"https://doi.org/10.1007/978-3-642-39077-7_6","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114393328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Low Can You Go: Balancing Performance with Anonymity in Tor","authors":"John Geddes, Rob Jansen, Nicholas Hopper","doi":"10.1007/978-3-642-39077-7_9","DOIUrl":"https://doi.org/10.1007/978-3-642-39077-7_9","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"251 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116057215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}