Privacy-enhancing technologies

Results: 201



#Item
61

3rd Hot Topics in Privacy Enhancing Technologies HotPETs 2010 Berlin, Germany July 23, 2010

Add to Reading List

Source URL: www.petsymposium.org

Language: English - Date: 2010-07-19 09:06:17
    62

    Proceedings on Privacy Enhancing Technologies 2015; ):171–187 Joshua Juen*, Aaron Johnson, Anupam Das, Nikita Borisov, and Matthew Caesar Defending Tor from Network Adversaries: A Case Study of Network Path Pre

    Add to Reading List

    Source URL: web.engr.illinois.edu

    Language: English - Date: 2015-06-30 14:26:57
      63

      Proceedings on Privacy Enhancing Technologies 2015; ):61–76 Roya Ensafi*, Philipp Winter, Abdullah Mueen, and Jedidiah R. Crandall Keywords: Tor, GFW, censorship analysis, network measurement, idle scan

      Add to Reading List

      Source URL: nymity.ch

      Language: English - Date: 2015-12-05 00:04:55
        64

        Proceedings on Privacy Enhancing Technologies ; ):20–33 Oleksii Starov, Phillipa Gill, and Nick Nikiforakis Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms

        Add to Reading List

        Source URL: www.securitee.org

        Language: English - Date: 2015-09-01 15:50:16
          65Identity management / Privacy / Policy / Privacy policy / Information privacy / Internet privacy / In re Gateway Learning Corp. / Privacy-enhancing technologies

          Context Setting Framework Objective of VCC Foster consumer trust Establishing a common set of practices around data privacy to stimulate the market for energy related products and services. Provide a voluntary mechanism

          Add to Reading List

          Source URL: www.smartgrid.gov

          Language: English - Date: 2015-02-12 06:56:48
          66

          The 14th Privacy Enhancing Technologies Symposium PETS 2014 http://petsymposium.org/2014 July 16–18, 2014, Amsterdam, Netherlands

          Add to Reading List

          Source URL: petsymposium.org

          Language: English - Date: 2013-11-26 05:30:01
            67Design of experiments / Hypothesis testing / Statistical inference / Internet advertising / Advertising / Targeted advertising / Online advertising / Internet privacy / Null hypothesis / Statistical power / Behavioral targeting / Experiment

            Proceedings on Privacy Enhancing Technologies 2015; ):92–112 Amit Datta*, Michael Carl Tschantz, and Anupam Datta Automated Experiments on Ad Privacy Settings A Tale of Opacity, Choice, and Discrimination

            Add to Reading List

            Source URL: www.andrew.cmu.edu

            Language: English - Date: 2016-02-12 12:31:57
            68Software / Advertising / Internet advertising / Advertising-free media / Anti-spam / Computing / Firefox add-ons / Internet marketing / Adblock Plus / Blacklist / Internet privacy / HTTP cookie

            Proceedings on Privacy Enhancing Technologies 2015; ):282–298 David Gugelmann*, Markus Happe, Bernhard Ager, and Vincent Lenders An Automated Approach for Complementing Ad Blockers’ Blacklists

            Add to Reading List

            Source URL: www.lenders.ch

            Language: English - Date: 2015-08-08 10:30:59
            69Computing / Identity management / Data management / Computer security / Internet privacy / Personal /  Inc. / Privacy / Cloud computing security / Medical privacy / Database / Gmail / Privacy-enhancing technologies

            Personal Data: Thinking Inside the Box Hamed Haddadi Queen Mary University of London

            Add to Reading List

            Source URL: mor1.github.io

            Language: English - Date: 2016-01-14 10:42:37
            70

            Proceedings on Privacy Enhancing Technologies 2015; ):1–17 Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Abstract: Consider users who share their data (e.g., location) with an untrusted serv

            Add to Reading List

            Source URL: www.shokri.org

            Language: English - Date: 2015-05-28 18:48:10
              UPDATE