default search action
13th PETS 2013: Bloomington, IN, USA
- Emiliano De Cristofaro, Matthew K. Wright:
Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings. Lecture Notes in Computer Science 7981, Springer 2013, ISBN 978-3-642-39076-0 - Craig Gentry, Kenny A. Goldman, Shai Halevi, Charanjit S. Jutla, Mariana Raykova, Daniel Wichs:
Optimizing ORAM and Using It Efficiently for Secure Computation. 1-18 - Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
Anonymity-Preserving Public-Key Encryption: A Constructive Approach. 19-39 - Gesine Hinterwälder, Christian T. Zenger, Foteini Baldimtsi, Anna Lysyanskaya, Christof Paar, Wayne P. Burleson:
Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems. 40-59 - Qinghua Li, Guohong Cao:
Efficient Privacy-Preserving Stream Aggregation in Mobile Sensing with Low Aggregation Error. 60-81 - Konstantinos Chatzikokolakis, Miguel E. Andrés, Nicolás Emilio Bordenabe, Catuscia Palamidessi:
Broadening the Scope of Differential Privacy Using Metrics. 82-102 - Hamed Soroush, Keen Sung, Erik G. Learned-Miller, Brian Neil Levine, Marc Liberatore:
Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet. 103-122 - Nevena Vratonjic, Kévin Huguenin, Vincent Bindschaedler, Jean-Pierre Hubaux:
How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots. 123-142 - Mashael AlSabah, Kevin S. Bauer, Tariq Elahi, Ian Goldberg:
The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting. 143-163 - John Geddes, Rob Jansen, Nicholas Hopper:
How Low Can You Go: Balancing Performance with Anonymity in Tor. 164-184 - David Fifield, Gabi Nakibly, Dan Boneh:
OSS: Using Online Scanning Services for Censorship Circumvention. 185-204 - Amir Houmansadr, Nikita Borisov:
The Need for Flow Fingerprints to Link Correlated Network Flows. 205-224 - Terence Chen, Chaabane Abdelberi, Pierre-Ugo Tournoux, Mohamed Ali Kâafar, Roksana Boreli:
How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness. 225-244 - Marian Harbach, Sascha Fahl, Matthias Rieger, Matthew Smith:
On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards. 245-264
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.