Privacy-enhancing technologies

Results: 201



#Item
1Cryptocurrencies / Alternative currencies / Bitcoin / Economy / Money / Finance / Blockchains / Digital currencies / CoinJoin / BitPay / Ethereum / RootStock

Proceedings on Privacy Enhancing Technologies ; ):179–199 Steven Goldfeder*, Harry Kalodner, Dillon Reisman, and Arvind Narayanan When the cookie meets the blockchain: Privacy risks of web payments via cryptocu

Add to Reading List

Source URL: www.petsymposium.org

Language: English - Date: 2018-08-06 10:58:07
2Biology / Genetics / Genomics / Molecular biology / Biotechnology / DNA / Bioinformatics / Whole genome sequencing / Genome-wide association study / Single-nucleotide polymorphism / Human genome / Privacy

Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective∗ Alexandros Mittos1 , Bradley Malin2 , Emiliano De Cristofaro1 arXiv:1712.02193v2 [cs.CR] 17 Aug 2018

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2018-08-19 20:26:50
3Cryptography / Public-key cryptography / Transport Layer Security / Cross-platform software / Internet protocols / Cryptographic protocols / Private information retrieval / XMPP / Forward secrecy / HTTPS / Email / WHOIS

Proceedings on Privacy Enhancing Technologies 2015; ):4–24 Nikita Borisov*, George Danezis*, and Ian Goldberg* DP5: A Private Presence Service Abstract: Users of social applications like to be notified

Add to Reading List

Source URL: www.degruyter.com

Language: English
4Internet privacy / Internet censorship / Computing / Digital rights / Information and communications technology / Internet security / Firewall software / Great Firewall / Proxy server / Deep packet inspection / Censorship / DNS hijacking

Proceedings on Privacy Enhancing Technologies ; ):37–61 Sheharbano Khattak*, Tariq Elahi*, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, and Ian Goldberg SoK: Making Sense of Censorship Resistance Syst

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:22
5Computing / Routing / Network architecture / Data transmission / Wireless networking / Internet architecture / Packet forwarding / Internet Protocol / Onion routing / Dynamic Source Routing / MORE protocol

Proceedings on Privacy Enhancing Technologies ; ):1–18 Chen Chen* and Adrian Perrig Keywords: Anonymity, path-hidden protocols DOI Editor to enter DOI

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
6Computing / World Wide Web / Software engineering / Web development / Cryptographic protocols / Secure communication / Internet protocols / Dark web / Tor / .onion / Dynamic web page / HTTPS

Proceedings on Privacy Enhancing Technologies ; ):186–203 Giovanni Cherubin*, Jamie Hayes*, and Marc Juarez* Website Fingerprinting Defenses at the Application Layer

Add to Reading List

Source URL: www.petsymposium.org

Language: English - Date: 2017-10-04 16:18:51
7

Proceedings on Privacy Enhancing Technologies 2015; ):282–298 David Gugelmann*, Markus Happe, Bernhard Ager, and Vincent Lenders An Automated Approach for Complementing Ad Blockers’ Blacklists

Add to Reading List

Source URL: www.petsymposium.org

Language: English - Date: 2015-06-23 15:36:19
    8

    Proceedings on Privacy Enhancing Technologies ; ):1–20 Cecylia Bocovich and Ian Goldberg Secure asymmetry and deployability for decoy routing systems

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2018-03-08 15:08:18
      9

      Proceedings on Privacy Enhancing Technologies ; ):184–201 Raphael R. Toledo, George Danezis, and Ian Goldberg Lower-Cost -Private Information Retrieval Abstract: Private Information Retrieval (PIR), despite be

      Add to Reading List

      Source URL: www.cypherpunks.ca

      Language: English - Date: 2016-06-28 09:30:18
        10Computing / File sharing / Concurrent computing / Information and communications technology / Distributed hash table / Peer-to-peer / Decentralization / Freenet / Internet privacy / Darknet / Bitcoin / BitTorrent

        Proceedings on Privacy Enhancing Technologies ; ):307–329 Carmela Troncoso, Marios Isaakidis, George Danezis, and Harry Halpin Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and

        Add to Reading List

        Source URL: petsymposium.org

        Language: English - Date: 2017-10-04 16:18:51
        UPDATE