International Symposium on Privacy Enhancing Technologies最新文献

筛选
英文 中文
Forward-Secure Distributed Encryption 前向安全分布式加密
International Symposium on Privacy Enhancing Technologies Pub Date : 2014-07-16 DOI: 10.1007/978-3-319-08506-7_7
W. Lueks, J. Hoepman, K. Kursawe
{"title":"Forward-Secure Distributed Encryption","authors":"W. Lueks, J. Hoepman, K. Kursawe","doi":"10.1007/978-3-319-08506-7_7","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_7","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131956678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
C3P: Context-Aware Crowdsourced Cloud Privacy C3P:上下文感知众包云隐私
International Symposium on Privacy Enhancing Technologies Pub Date : 2014-07-16 DOI: 10.1007/978-3-319-08506-7_6
Hamza Harkous, Rameez Rahman, K. Aberer
{"title":"C3P: Context-Aware Crowdsourced Cloud Privacy","authors":"Hamza Harkous, Rameez Rahman, K. Aberer","doi":"10.1007/978-3-319-08506-7_6","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_6","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129777707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Spoiled Onions: Exposing Malicious Tor Exit Relays 变质的洋葱:暴露恶意的出口中继
International Symposium on Privacy Enhancing Technologies Pub Date : 2014-01-20 DOI: 10.1007/978-3-319-08506-7_16
Philipp Winter, S. Lindskog
{"title":"Spoiled Onions: Exposing Malicious Tor Exit Relays","authors":"Philipp Winter, S. Lindskog","doi":"10.1007/978-3-319-08506-7_16","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_16","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115943429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 96
A Predictive Differentially-Private Mechanism for Mobility Traces 流动轨迹的预测微分私有机制
International Symposium on Privacy Enhancing Technologies Pub Date : 2013-11-15 DOI: 10.1007/978-3-319-08506-7_2
K. Chatzikokolakis, C. Palamidessi, Marco Stronati
{"title":"A Predictive Differentially-Private Mechanism for Mobility Traces","authors":"K. Chatzikokolakis, C. Palamidessi, Marco Stronati","doi":"10.1007/978-3-319-08506-7_2","DOIUrl":"https://doi.org/10.1007/978-3-319-08506-7_2","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133576257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 100
Anonymity-Preserving Public-Key Encryption: A Constructive Approach 保持匿名公钥加密:一种建设性的方法
International Symposium on Privacy Enhancing Technologies Pub Date : 2013-07-10 DOI: 10.1007/978-3-642-39077-7_2
Markulf Kohlweiss, U. Maurer, Cristina Onete, Björn Tackmann, D. Venturi
{"title":"Anonymity-Preserving Public-Key Encryption: A Constructive Approach","authors":"Markulf Kohlweiss, U. Maurer, Cristina Onete, Björn Tackmann, D. Venturi","doi":"10.1007/978-3-642-39077-7_2","DOIUrl":"https://doi.org/10.1007/978-3-642-39077-7_2","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124491325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards 论隐私保护认证技术的可接受性:以国民身份证为例
International Symposium on Privacy Enhancing Technologies Pub Date : 2013-07-10 DOI: 10.1007/978-3-642-39077-7_13
M. Harbach, S. Fahl, M. Rieger, Matthew Smith
{"title":"On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards","authors":"M. Harbach, S. Fahl, M. Rieger, Matthew Smith","doi":"10.1007/978-3-642-39077-7_13","DOIUrl":"https://doi.org/10.1007/978-3-642-39077-7_13","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127767664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
OSS: Using Online Scanning Services for Censorship Circumvention OSS:使用在线扫描服务规避审查
International Symposium on Privacy Enhancing Technologies Pub Date : 2013-07-10 DOI: 10.1007/978-3-642-39077-7_10
D. Fifield, Gabi Nakibly, D. Boneh
{"title":"OSS: Using Online Scanning Services for Censorship Circumvention","authors":"D. Fifield, Gabi Nakibly, D. Boneh","doi":"10.1007/978-3-642-39077-7_10","DOIUrl":"https://doi.org/10.1007/978-3-642-39077-7_10","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125804764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Broadening the Scope of Differential Privacy Using Metrics 用度量法扩大差异隐私的范围
International Symposium on Privacy Enhancing Technologies Pub Date : 2013-07-10 DOI: 10.1007/978-3-642-39077-7_5
K. Chatzikokolakis, M. Andrés, N. E. Bordenabe, C. Palamidessi
{"title":"Broadening the Scope of Differential Privacy Using Metrics","authors":"K. Chatzikokolakis, M. Andrés, N. E. Bordenabe, C. Palamidessi","doi":"10.1007/978-3-642-39077-7_5","DOIUrl":"https://doi.org/10.1007/978-3-642-39077-7_5","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131812636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 327
Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet 关闭GPS是不够的:手机位置在互联网上泄露
International Symposium on Privacy Enhancing Technologies Pub Date : 2013-07-10 DOI: 10.1007/978-3-642-39077-7_6
H. Soroush, Keen Sung, E. Learned-Miller, B. Levine, M. Liberatore
{"title":"Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet","authors":"H. Soroush, Keen Sung, E. Learned-Miller, B. Levine, M. Liberatore","doi":"10.1007/978-3-642-39077-7_6","DOIUrl":"https://doi.org/10.1007/978-3-642-39077-7_6","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114393328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
How Low Can You Go: Balancing Performance with Anonymity in Tor 你能走多低:在Tor中平衡性能和匿名性
International Symposium on Privacy Enhancing Technologies Pub Date : 2013-07-10 DOI: 10.1007/978-3-642-39077-7_9
John Geddes, Rob Jansen, Nicholas Hopper
{"title":"How Low Can You Go: Balancing Performance with Anonymity in Tor","authors":"John Geddes, Rob Jansen, Nicholas Hopper","doi":"10.1007/978-3-642-39077-7_9","DOIUrl":"https://doi.org/10.1007/978-3-642-39077-7_9","url":null,"abstract":"","PeriodicalId":377232,"journal":{"name":"International Symposium on Privacy Enhancing Technologies","volume":"251 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116057215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信