Privacy-enhancing technologies

Results: 201



#Item
11

Proceedings on Privacy Enhancing Technologies ; ):83–101 Tariq Elahi*, John A. Doucette, Hadi Hosseini, Steven J. Murdoch, and Ian Goldberg A Framework for the Game-theoretic Analysis of Censorship Resistance

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2016-06-28 09:37:07
    12

    Proceedings on Privacy Enhancing Technologies ; ):87–106 Linda Lee*, David Fifield, Nathan Malkin, Ganesh Iyer, Serge Egelman, and David Wagner A Usability Evaluation of Tor Launcher Abstract: Although Tor has

    Add to Reading List

    Source URL: petsymposium.org

    Language: English - Date: 2017-10-04 16:18:51
      13

      Proceedings on Privacy Enhancing Technologies 2015; ):25–40 Gorka Irazoqui, Mehmet Sinan İncİ, Thomas Eisenbarth, and Berk Sunar Know Thy Neighbor: Crypto Library Detection in Cloud

      Add to Reading List

      Source URL: www.petsymposium.org

      Language: English - Date: 2015-06-23 15:36:19
        14

        Proceedings on Privacy Enhancing Technologies 2015; ):77–91 Vasile C. Perta*, Marco V. Barbera, Gareth Tyson, Hamed Haddadi1 , and Alessandro Mei2 A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hi

        Add to Reading List

        Source URL: www.petsymposium.org

        Language: English - Date: 2015-06-23 15:36:19
          15

          Privacy Enhancing Technologies: Privacy by Design From ID Cards, Cell Phones to the Internet Dr. Jan Camenisch IBM Research

          Add to Reading List

          Source URL: primelife.ercim.eu

          Language: English - Date: 2009-05-25 12:24:06
            16

            Proceedings on Privacy Enhancing Technologies ; ):33–52 Zachary Weinberg*, Mahmood Sharif, Janos Szurdi, and Nicolas Christin Topics of Controversy: An Empirical Analysis of Web Censorship Lists

            Add to Reading List

            Source URL: research.owlfolio.org

            Language: English - Date: 2016-09-20 10:44:30
              17

              Concepts of User-Centric Identity Management for Privacy-Enhancing Security Technologies

              Add to Reading List

              Source URL: www.prise.oeaw.ac.at

              Language: English - Date: 2008-06-18 11:52:26
                18

                Proceedings on Privacy Enhancing Technologies ; ):307–329 Carmela Troncoso, Marios Isaakidis, George Danezis, and Harry Halpin Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and

                Add to Reading List

                Source URL: carmelatroncoso.com

                Language: English - Date: 2017-06-27 14:47:56
                  19

                  ECE598NB Privacy Enhancing Technologies Spring 2006

                  Add to Reading List

                  Source URL: hatswitch.org

                  Language: English - Date: 2017-10-15 12:28:35
                    20

                    Proceedings on Privacy Enhancing Technologies ; ):107–126 Pedro Moreno-Sanchez*, Tim Ruffing, and Aniket Kate PathShuffle: Credit Mixing and Anonymous Payments for Ripple

                    Add to Reading List

                    Source URL: petsymposium.org

                    Language: English - Date: 2017-10-04 16:18:51
                      UPDATE