Cluster-based scalable network services
Proceedings of the sixteenth ACM symposium on Operating systems principles
The design, implementation and operation of an email pseudonym server
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
On secure and pseudonymous client-relationships with multiple servers
ACM Transactions on Information and System Security (TISSEC)
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
The free haven project: distributed anonymous storage service
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Tussle in cyberspace: defining tomorrow's internet
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Disclosing users' data in an environment that preserves privacy
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Anonymity and accountability in self-organizing electronic communities
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Using organisational safeguards to make justifiable privacy decisions when processing personal data
SAICSIT '03 Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Flocks: distributed proxies for browsing privacy
SAICSIT '04 Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Tussle in cyberspace: defining tomorrow's internet
IEEE/ACM Transactions on Networking (TON)
Distributed proxies for browsing privacy: a simulation of flocks
SAICSIT '05 Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Towards a framework for connection anonymity
SAICSIT '05 Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Secure function evaluation with ordered binary decision diagrams
Proceedings of the 13th ACM conference on Computer and communications security
On secure and pseudonymous client-relationships with multiple servers
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
The motivation and proposition of a privacy-enhancing architecture for operational databases
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
A privacy controller approach for privacy protection in web services
Proceedings of the 2007 ACM workshop on Secure web services
A collection of privacy design patterns
Proceedings of the 2006 conference on Pattern languages of programs
Cooperative Visualization of Privacy Risks
CDVE '08 Proceedings of the 5th international conference on Cooperative Design, Visualization, and Engineering
A Low-Variance Random-Walk Procedure to Provide Anonymity in Overlay Networks
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
A privacy-preserving UBICOMP architecture
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Privacy-aware routing in sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Controlling and disclosing your personal information
WSEAS Transactions on Information Science and Applications
Personal information privacy protection in e-commerce
WSEAS Transactions on Information Science and Applications
Personal information and privacy in E-commerce application
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
Short Survey: Privacy-enhancing technologies for the world wide web
Computer Communications
Privacy in a Semantic Cloud: What's Trust Got to Do with It?
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Privacy-enhancing technologies for the internet, II: five years later
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Quantum anonymous transmissions
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Authorization architectures for privacy-respecting surveillance
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 0.00 |
The increased use of the Internet for everyday activities is bringing new threats to personal privacy. The paper gives an overview of existing and potential privacy enhancing technologies for the Internet, as well as motivation and challenges for future work in this field.