Communications of the ACM
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
How to Make Personalized Web Browising Simple, Secure, and Anonymous
FC '97 Proceedings of the First International Conference on Financial Cryptography
Curbing Junk E-Mail via Secure Classification
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
On secure and pseudonymous client-relationships with multiple servers
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
On secure and pseudonymous client-relationships with multiple servers
ACM Transactions on Information and System Security (TISSEC)
Principles for privacy protection software
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
The architecture of robust publishing systems
ACM Transactions on Internet Technology (TOIT)
Preserving privacy in web services
Proceedings of the 4th international workshop on Web information and data management
Privacy in browser-based attribute exchange
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Anonymity and accountability in self-organizing electronic communities
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Authentic Attributes with Fine-Grained Anonymity Protection
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Database privacy: balancing confidentiality, integrity and availability
ACM SIGKDD Explorations Newsletter
Mutual Anonymity Protocols for Hybrid Peer-to-Peer Systems
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Ontology Based Personalized Search
ICTAI '99 Proceedings of the 11th IEEE International Conference on Tools with Artificial Intelligence
privacy perspective from utilitarianism and metaphysical theories
Current security management & Ethical issues of information technology
Using organisational safeguards to make justifiable privacy decisions when processing personal data
SAICSIT '03 Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
An Efficient Anonymity Protocol for Grid Computing
GRID '04 Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing
Flocks: distributed proxies for browsing privacy
SAICSIT '04 Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Distributed proxies for browsing privacy: a simulation of flocks
SAICSIT '05 Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Towards a framework for connection anonymity
SAICSIT '05 Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids
Multiagent and Grid Systems
Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots
Journal of Network and Computer Applications
Mutual anonymous overlay multicast
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
Journal of Computer Security
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Can pseudonymity really guarantee privacy?
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
A framework for detection and measurement of phishing attacks
Proceedings of the 2007 ACM workshop on Recurring malcode
MuON: Epidemic based mutual anonymity in unstructured P2P networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A holistic anonymity framework for web services
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
Privacy-conscious P2P data sharing scheme with bogus profile distribution
Web Intelligence and Agent Systems
Privacy now and in the age of ambient intelligence
International Journal of Electronic Security and Digital Forensics
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Anonymous quantum communication
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
VoIP malware: attack tool & attack scenarios
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Secure passwords through enhanced hashing
LISA'09 Proceedings of the 23rd conference on Large installation system administration
A design of overlay anonymous multicast protocol
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
NGITS'06 Proceedings of the 6th international conference on Next Generation Information Technologies and Systems
Review: A survey on solutions and main free tools for privacy enhancing Web communications
Journal of Network and Computer Applications
Using private information retrieval protocol for an e-commerce application
Proceedings of the CUBE International Information Technology Conference
Hi-index | 48.22 |