Communications of the ACM
Privacy on the line: the politics of wiretapping and encryption
Privacy on the line: the politics of wiretapping and encryption
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Web Security, Privacy and Commerce
Web Security, Privacy and Commerce
How to Make Personalized Web Browising Simple, Secure, and Anonymous
FC '97 Proceedings of the First International Conference on Financial Cryptography
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Detecting hit shaving in click-through payment schemes
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Principles for privacy protection software
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Traffic analysis: protocols, attacks, design issues, and open problems
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Freenet: a distributed anonymous information storage and retrieval system
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
IntelliShopper: a proactive, personal, private shopping assistant
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 3
ACM SIGCAS Computers and Society
Preserving privacy in web services
Proceedings of the 4th international workshop on Web information and data management
Shock: Aggregating Information While Preserving Privacy
Information Systems Frontiers
Protecting Free Expression Online with Freenet
IEEE Internet Computing
A new privacy model for hiding group interests while accessing the Web
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Targeted Advertising ... And Privacy Too
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
A New Privacy Model for Web Surfing
NGITS '02 Proceedings of the 5th International Workshop on Next Generation Information Technologies and Systems
Multilateral Security: Enabling Technologies and Their Evaluation
Informatics - 10 Years Back. 10 Years Ahead.
Real World Patterns of Failure in Anonymity Systems
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Data Mining, the Internet, and Privacy
WEBKDD '99 Revised Papers from the International Workshop on Web Usage Analysis and User Profiling
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Database privacy: balancing confidentiality, integrity and availability
ACM SIGKDD Explorations Newsletter
Wearable Computing Meets Ubiquitous Computing: Reaping the Best of Both Worlds
ISWC '99 Proceedings of the 3rd IEEE International Symposium on Wearable Computers
privacy perspective from utilitarianism and metaphysical theories
Current security management & Ethical issues of information technology
Using organisational safeguards to make justifiable privacy decisions when processing personal data
SAICSIT '03 Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Proceedings of the 13th international conference on World Wide Web
The cost of becoming anonymous: on the participant payload in crowds
Information Processing Letters
Flocks: distributed proxies for browsing privacy
SAICSIT '04 Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Towards a Hippocratic log file architecture
SAICSIT '04 Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
A survey of peer-to-peer content distribution technologies
ACM Computing Surveys (CSUR)
Strong pseudonymous communication for peer-to-peer reputation systems
Proceedings of the 2005 ACM symposium on Applied computing
An ethics and security course for students in computer science and information technology
Proceedings of the 37th SIGCSE technical symposium on Computer science education
AP3: cooperative, decentralized anonymous communication
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Defending against eclipse attacks on overlay networks
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Distributed proxies for browsing privacy: a simulation of flocks
SAICSIT '05 Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Anonymity and software agents: an interdisciplinary challenge
Artificial Intelligence and Law
Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
An E-Mail-Based Information Sharing System for Intra-Corporate Coordination
Information-Knowledge-Systems Management
Anonymous communications in the Internet
Cluster Computing
COMBINE: leveraging the power of wireless peers through collaborative downloading
Proceedings of the 5th international conference on Mobile systems, applications and services
Can pseudonymity really guarantee privacy?
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future
IEEE Transactions on Dependable and Secure Computing
Privacy and e-commerce: a consumer-centric perspective
Electronic Commerce Research
Opening the source repository with anonymous CVS
ATEC '99 Proceedings of the annual conference on USENIX Annual Technical Conference
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Achieving simultaneous distribution control and privacy protection for Internet media delivery
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
SRUTI'07 Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet
RaWMS - Random Walk Based Lightweight Membership Service for Wireless Ad Hoc Networks
ACM Transactions on Computer Systems (TOCS)
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
Protecting Agent from Attack in Grid ComputingIII
SOFSEM '07 Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science
How to Bypass Two Anonymity Revocation Schemes
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Personalization and choice behavior: the role of personality traits
ACM SIGMIS Database
A survey of state-of-the-art in anonymity metrics
Proceedings of the 1st ACM workshop on Network data anonymization
A scalable anonymous protocol for heterogeneous wireless ad hoc networks
Journal of Embedded Computing - Selected papers of EUC 2005
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Minimizing detection probability routing in ad hoc networks using directional antennas
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Short Survey: Privacy-enhancing technologies for the world wide web
Computer Communications
Anonymous communication protocol for sensor networks
International Journal of Wireless and Mobile Computing
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Privacy preservation improvement by learning optimal profile generation rate
UM'03 Proceedings of the 9th international conference on User modeling
Privacy-enhancing technologies for the internet, II: five years later
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
A survey of peer-to-peer security issues
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
An efficient and reliable anonymous solution for a self-organized P2P network
IPOM'07 Proceedings of the 7th IEEE international conference on IP operations and management
A potential HTTP-based application-level attack against Tor
Future Generation Computer Systems
Online anonymity protection in computer-mediated communication
IEEE Transactions on Information Forensics and Security
Dissent: accountable anonymous group messaging
Proceedings of the 17th ACM conference on Computer and communications security
Drac: an architecture for anonymous low-volume communications
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Theory of privacy and anonymity
Algorithms and theory of computation handbook
An analysis of anonymity technology usage
TMA'11 Proceedings of the Third international conference on Traffic monitoring and analysis
Exploiting social networks to provide privacy in personalized web search
Journal of Systems and Software
A soft computing approach for privacy requirements engineering: The PriS framework
Applied Soft Computing
Anonymous Communication Over Invisible Mix Rings
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
Breaking four mix-related schemes based on universal re-encryption
ISC'06 Proceedings of the 9th international conference on Information Security
Using group overlapping to protect server from attack in grid computing
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Multilateral security: enabling technologies and their evaluation
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Trust, privacy and security in e-business: requirements and solutions
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
Privacy enhancement in mobile data broadcasting environments
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Protecting agent from attack in grid computing
CDVE'06 Proceedings of the Third international conference on Cooperative Design, Visualization, and Engineering
Client and server anonymity preserving in p2p networks
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
Protecting agent from attack in grid computingII
IDEAL'06 Proceedings of the 7th international conference on Intelligent Data Engineering and Automated Learning
A protocol for anonymous and accurate e-polling
TCGOV'05 Proceedings of the 2005 international conference on E-Government: towards Electronic Democracy
Artificial Intelligence in Medicine
The shy mayor: private badges in geosocial networks
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Privacy management in global organisations
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Verification of partial-information probabilistic systems using counterexample-guided refinements
ATVA'12 Proceedings of the 10th international conference on Automated Technology for Verification and Analysis
Detecting multiple aliases in social media
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Review: An overview of anonymity technology usage
Computer Communications
Proactively accountable anonymous messaging in verdict
SEC'13 Proceedings of the 22nd USENIX conference on Security
Towards Privacy Protection in Smart Grid
Wireless Personal Communications: An International Journal
Spread Identity: A new dynamic address remapping mechanism for anonymity and DDoS defense
Journal of Computer Security
Hi-index | 48.22 |