Journal of Computer Security - Special issue on security in the World Wide Web
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Proceedings of the First International Workshop on Information Hiding
On secure and pseudonymous client-relationships with multiple servers
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
Unlinkable serial transactions: protocols and applications
ACM Transactions on Information and System Security (TISSEC)
On secure and pseudonymous client-relationships with multiple servers
ACM Transactions on Information and System Security (TISSEC)
Principles for privacy protection software
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Proceedings of the 7th ACM conference on Computer and communications security
Freenet: a distributed anonymous information storage and retrieval system
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Towards an analysis of onion routing security
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world
ACM Transactions on Internet Technology (TOIT)
ACM SIGCAS Computers and Society
Preserving privacy in web services
Proceedings of the 4th international workshop on Web information and data management
Design and implementation of the idemix anonymous credential system
Proceedings of the 9th ACM conference on Computer and communications security
The Evolving Field of Distributed Storage
IEEE Internet Computing
A new privacy model for hiding group interests while accessing the Web
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Anonymous Communications for Mobile Agents
MATA '02 Proceedings of the 4th International Workshop on Mobile Agents for Telecommunication Applications
An Equitably Fair On-line Auction Scheme
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
Anonymizing Censorship Resistant Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
A New Privacy Model for Web Surfing
NGITS '02 Proceedings of the 5th International Workshop on Next Generation Information Technologies and Systems
An Identity Escrow Scheme with Appointed Verifiers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Multilateral Security: Enabling Technologies and Their Evaluation
Informatics - 10 Years Back. 10 Years Ahead.
Authentic Attributes with Fine-Grained Anonymity Protection
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Real World Patterns of Failure in Anonymity Systems
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Methods for Protecting a Mobile Agent's Route
ISW '99 Proceedings of the Second International Workshop on Information Security
Data Mining, the Internet, and Privacy
WEBKDD '99 Revised Papers from the International Workshop on Web Usage Analysis and User Profiling
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Database privacy: balancing confidentiality, integrity and availability
ACM SIGKDD Explorations Newsletter
A flexible payment scheme and its permission-role assignment
ACSC '03 Proceedings of the 26th Australasian computer science conference - Volume 16
ADC '03 Proceedings of the 14th Australasian database conference - Volume 17
Wearable Computing Meets Ubiquitous Computing: Reaping the Best of Both Worlds
ISWC '99 Proceedings of the 3rd IEEE International Symposium on Wearable Computers
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Receiver anonymity via incomparable public keys
Proceedings of the 10th ACM conference on Computer and communications security
privacy perspective from utilitarianism and metaphysical theories
Current security management & Ethical issues of information technology
Using organisational safeguards to make justifiable privacy decisions when processing personal data
SAICSIT '03 Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Secure data storing in a pool of vulnerable servers
Artificial intelligence and security in computing systems
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications
ANSS '04 Proceedings of the 37th annual symposium on Simulation
New covert channels in HTTP: adding unwitting Web browsers to anonymity sets
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Reusable anonymous return channels
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Preserving privacy when preference searching in e-commerce
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
PocketLens: Toward a personal recommender system
ACM Transactions on Information Systems (TOIS)
A Multi-Agent System's Approach to Communication Security in the Web
WI '04 Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence
Flocks: distributed proxies for browsing privacy
SAICSIT '04 Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
A survey of peer-to-peer content distribution technologies
ACM Computing Surveys (CSUR)
A Flexible Payment Scheme and Its Role-Based Access Control
IEEE Transactions on Knowledge and Data Engineering
A Mutual Anonymous Peer-to-Peer Protocol Design
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
Chinese wall security for decentralized workflow management systems
Journal of Computer Security - Special issue on ACM conference on computer and communications security, 2001
Balancing auditability and privacy in vehicular networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Applications of secure electronic voting to automated privacy-preserving troubleshooting
Proceedings of the 12th ACM conference on Computer and communications security
Tracking anonymous peer-to-peer VoIP calls on the internet
Proceedings of the 12th ACM conference on Computer and communications security
AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Privacy and identity management for everyone
Proceedings of the 2005 workshop on Digital identity management
Preserving Traffic Privacy in Wireless Mesh Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
VAST: versatile anonymous system for web users
Enhanced methods in computer security, biometric and artificial intelligence systems
P5: a protocol for scalable anonymous communication
Journal of Computer Security
Privacy-preserving demographic filtering
Proceedings of the 2006 ACM symposium on Applied computing
Distributed proxies for browsing privacy: a simulation of flocks
SAICSIT '05 Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Ubiquitous computing environments and its usage access control
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Anonymity and software agents: an interdisciplinary challenge
Artificial Intelligence and Law
Efficient secure aggregation in VANETs
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
WebMedia '06 Proceedings of the 12th Brazilian Symposium on Multimedia and the web
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Anonymous communications in the Internet
Cluster Computing
Journal of Computer Security
Can pseudonymity really guarantee privacy?
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Privacy and e-commerce: a consumer-centric perspective
Electronic Commerce Research
A high collusion-resistant approach to distributed privacy-preserving data mining
PDCN'07 Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: parallel and distributed computing and networks
Making p2p accountable without losing privacy
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Adaptive trust-based anonymous network
International Journal of Security and Networks
Net-χ: unified data-centric internet services
NETB'07 Proceedings of the 3rd USENIX international workshop on Networking meets databases
SRUTI'07 Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet
Securing Ad Hoc Storage through Probabilistic Cooperation Assessment
Electronic Notes in Theoretical Computer Science (ENTCS)
Virtual trip lines for distributed privacy-preserving traffic monitoring
Proceedings of the 6th international conference on Mobile systems, applications, and services
Access control management for ubiquitous computing
Future Generation Computer Systems
Protocols for purpose-restricted anonymous communications in IP-based wireless networks
Computer Communications
Privacy patterns for online interactions
Proceedings of the 2006 conference on Pattern languages of programs
Protecting Agent from Attack in Grid ComputingIII
SOFSEM '07 Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science
Session Key Reuse Scheme to Improve Routing Efficiency in AnonDSR
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
Securely Deliver Data by Multi-path Routing Scheme in Wireless Mesh Networks
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
Trusted Computing Serving an Anonymity Service
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
Breaking and Provably Fixing Minx
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Proceedings of the 4th ACM international workshop on Storage security and survivability
Anonymous return route information for onion based mix-nets
Proceedings of the workshop on Applications of private and anonymous communications
An improved clock-skew measurement technique for revealing hidden services
SS'08 Proceedings of the 17th conference on Security symposium
A scalable anonymous protocol for heterogeneous wireless ad hoc networks
Journal of Embedded Computing - Selected papers of EUC 2005
Online pairing of VoIP conversations
The VLDB Journal — The International Journal on Very Large Data Bases
Link analysis for private weighted graphs
Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval
Compromising anonymous communication systems using blind source separation
ACM Transactions on Information and System Security (TISSEC)
Agent-oriented privacy-based information brokering architecture for healthcare environments
International Journal of Telemedicine and Applications - Special issue on electronic health
Short Survey: Privacy-enhancing technologies for the world wide web
Computer Communications
Proceedings of the 16th ACM conference on Computer and communications security
Towards secure dataflow processing in open distributed systems
Proceedings of the 2009 ACM workshop on Scalable trusted computing
Anonymous communication protocol for sensor networks
International Journal of Wireless and Mobile Computing
Privacy-preserving similarity-based text retrieval
ACM Transactions on Internet Technology (TOIT)
FM '09 Proceedings of the 2nd World Congress on Formal Methods
Anonymity and Censorship Resistance in Unstructured Overlay Networks
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
P2P commercial digital content exchange
Electronic Commerce Research and Applications
Survey on anonymous communications in computer networks
Computer Communications
Private location-based information retrieval through user collaboration
Computer Communications
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Pervasive and Mobile Computing
A taxonomy of single sign-on systems
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Privacy protection in PKIs: a separation-of-authority approach
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Privacy-enhancing technologies for the internet, II: five years later
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Rerandomizable RCCA encryption
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Using SCTP to implement multihomed web servers
DNIS'07 Proceedings of the 5th international conference on Databases in networked information systems
One-time receiver address in IPv6 for protecting unlinkability
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
A simplified anonymous dynamic source routing protocol for ad-hoc networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
An anonymous communication mechanism without key infrastructure based on multi-paths network coding
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A security framework for a workflow-based grid development platform
Computer Standards & Interfaces
A survey on the design, applications, and enhancements of application-layer overlay networks
ACM Computing Surveys (CSUR)
VPriv: protecting privacy in location-based vehicular services
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Recruiting new tor relays with BRAIDS
Proceedings of the 17th ACM conference on Computer and communications security
Dissent: accountable anonymous group messaging
Proceedings of the 17th ACM conference on Computer and communications security
Anonymity and monitoring: how to monitor the infrastructure of an anonymity system
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Anonymous authentication with TLS and DAA
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Security of sequential multiple encryption
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
Secure personal data servers: a vision paper
Proceedings of the VLDB Endowment
An analysis of anonymity technology usage
TMA'11 Proceedings of the Third international conference on Traffic monitoring and analysis
CrowdLogging: distributed, private, and anonymous search logging
Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval
A soft computing approach for privacy requirements engineering: The PriS framework
Applied Soft Computing
On preserving privacy in content-oriented networks
Proceedings of the ACM SIGCOMM workshop on Information-centric networking
Fully non-interactive onion routing with forward-secrecy
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Privacy preserving semi-supervised learning for labeled graphs
ECML PKDD'11 Proceedings of the 2011 European conference on Machine learning and knowledge discovery in databases - Volume Part I
Privacy-preserving DNS: analysis of broadcast, range queries and mix-based protection methods
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Pythia: a privacy aware, peer-to-peer network for social search
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
A privacy preserving system for friend locator applications
Proceedings of the 9th ACM international symposium on Mobility management and wireless access
Privacy-enhanced social-network routing
Computer Communications
"Super nodes" in Tor: existence and security implication
Proceedings of the 27th Annual Computer Security Applications Conference
WAR: wireless anonymous routing
Proceedings of the 11th international conference on Security Protocols
Towards secure XML document with usage control
APWeb'05 Proceedings of the 7th Asia-Pacific web conference on Web Technologies Research and Development
Using group overlapping to protect server from attack in grid computing
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Multilateral security: enabling technologies and their evaluation
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
A hierarchical anonymous communication protocol for sensor networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Protecting agent from attack in grid computing
CDVE'06 Proceedings of the Third international conference on Cooperative Design, Visualization, and Engineering
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Chosen-ciphertext security of multiple encryption
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Censorship resistance revisited
IH'05 Proceedings of the 7th international conference on Information Hiding
A formal treatment of onion routing
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Friends troubleshooting network: towards privacy-preserving, automatic troubleshooting
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Interval-based flow watermarking for tracing interactive traffic
Computer Networks: The International Journal of Computer and Telecommunications Networking
What can be implemented anonymously?
DISC'05 Proceedings of the 19th international conference on Distributed Computing
How to leak a secret: theory and applications of ring signatures
Theoretical Computer Science
Protecting disseminative information in E-Learning
ICWL'07 Proceedings of the 6th international conference on Advances in web based learning
Shadow: a middleware in pervasive computing environment for user controllable privacy protection
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
Klein bottle routing: an alternative to onion routing and mix network
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Privacy preserving web-based email
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Protecting agent from attack in grid computingII
IDEAL'06 Proceedings of the 7th international conference on Intelligent Data Engineering and Automated Learning
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Recent advances in declarative networking
PADL'12 Proceedings of the 14th international conference on Practical Aspects of Declarative Languages
ARDEN: Anonymous networking in delay tolerant networks
Ad Hoc Networks
A historical probability based noise generation strategy for privacy protection in cloud computing
Journal of Computer and System Sciences
A trust-based noise injection strategy for privacy protection in cloud
Software—Practice & Experience
Virtual network stacks: from theory to practice
Security and Communication Networks
A Time-Series Pattern Based Noise Generation Strategy for Privacy Protection in Cloud Computing
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
Anonymous overlay network supporting authenticated routing
Information Sciences: an International Journal
Privacy-preserving distributed monitoring of visit quantities
Proceedings of the 20th International Conference on Advances in Geographic Information Systems
Privacy-aware geolocation interfaces for volunteered geography: a case study
Proceedings of the 1st ACM SIGSPATIAL International Workshop on Crowdsourced and Volunteered Geographic Information
International Journal of Security and Networks
A proactive routing protocol for wireless ad hoc networks assuring some privacy
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
Detecting multiple aliases in social media
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Review: An overview of anonymity technology usage
Computer Communications
Open Social Networking for Online Collaboration
International Journal of e-Collaboration
Incorporating Privacy into the Undergraduate Curriculum
Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference
Open Social Networking for Online Collaboration
International Journal of e-Collaboration
SGor: Trust graph based onion routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Enhanced security in internet voting protocol using blind signature and dynamic ballots
Electronic Commerce Research
Hi-index | 48.22 |