Privacy Enhancing Technologies A

14 papers

YearTitle / Authors
2013Anonymity-Preserving Public-Key Encryption: A Constructive Approach.
Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi
2013Broadening the Scope of Differential Privacy Using Metrics.
Konstantinos Chatzikokolakis, Miguel E. Andrés, Nicolás Emilio Bordenabe, Catuscia Palamidessi
2013Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems.
Gesine Hinterwälder, Christian T. Zenger, Foteini Baldimtsi, Anna Lysyanskaya, Christof Paar, Wayne P. Burleson
2013Efficient Privacy-Preserving Stream Aggregation in Mobile Sensing with Low Aggregation Error.
Qinghua Li, Guohong Cao
2013How Low Can You Go: Balancing Performance with Anonymity in Tor.
John Geddes, Rob Jansen, Nicholas Hopper
2013How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness.
Terence Chen, Chaabane Abdelberi, Pierre-Ugo Tournoux, Mohamed Ali Kâafar, Roksana Boreli
2013How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots.
Nevena Vratonjic, Kévin Huguenin, Vincent Bindschaedler, Jean-Pierre Hubaux
2013OSS: Using Online Scanning Services for Censorship Circumvention.
David Fifield, Gabi Nakibly, Dan Boneh
2013On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards.
Marian Harbach, Sascha Fahl, Matthias Rieger, Matthew Smith
2013Optimizing ORAM and Using It Efficiently for Secure Computation.
Craig Gentry, Kenny A. Goldman, Shai Halevi, Charanjit S. Jutla, Mariana Raykova, Daniel Wichs
2013Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings
Emiliano De Cristofaro, Matthew K. Wright
2013The Need for Flow Fingerprints to Link Correlated Network Flows.
Amir Houmansadr, Nikita Borisov
2013The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting.
Mashael AlSabah, Kevin S. Bauer, Tariq Elahi, Ian Goldberg
2013Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet.
Hamed Soroush, Keen Sung, Erik G. Learned-Miller, Brian Neil Levine, Marc Liberatore