Privacy Enhancing Technologies A

15 papers

YearTitle / Authors
2008An Indistinguishability-Based Characterization of Anonymous Channels.
Alejandro Hevia, Daniele Micciancio
2008Analyzing PETs for Enterprise Operations.
Stuart Shapiro, Aaron Powell
2008Breaking and Provably Fixing Minx.
Erik Shimshock, Matt Staats, Nicholas Hopper
2008Bridging and Fingerprinting: Epistemic Attacks on Route Selection.
George Danezis, Paul F. Syverson
2008Chattering Laptops.
Tuomas Aura, Janne Lindqvist, Michael Roe, Anish Mohammed
2008Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem-Prover.
Aaron Richard Coble
2008How to Bypass Two Anonymity Revocation Schemes.
George Danezis, Len Sassaman
2008Metrics for Security and Performance in Low-Latency Anonymity Systems.
Steven J. Murdoch, Robert N. M. Watson
2008On the Impact of Social Network Profiling on Anonymity.
Claudia Díaz, Carmela Troncoso, Andrei Serjantov
2008PAR: Payment for Anonymous Routing.
Elli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, Steven M. Bellovin
2008Perfect Matching Disclosure Attacks.
Carmela Troncoso, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede
2008Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings
Nikita Borisov, Ian Goldberg
2008Reputation Systems for Anonymous Networks.
Elli Androulaki, Seung Geol Choi, Steven M. Bellovin, Tal Malkin
2008Shining Light in Dark Places: Understanding the Tor Network.
Damon McCoy, Kevin S. Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas C. Sicker
2008Studying Timing Analysis on the Internet with SubRosa.
Hatim Daginawala, Matthew K. Wright