About 40,000 results
Open links in new tab
  1. Privacy Enhancing Technologies Symposium 2015

    PETS 2015 The 15th Privacy Enhancing Technologies Symposium June 30 – July 2, 2015 Philadelphia, PA, USA @PET_Symposium The annual Privacy Enhancing Technologies …

  2. Analyzing the Great Firewall of China Over Space and Time

    Volume: 2015 Issue: 1 Pages: 61–76 DOI: https://doi.org/10.1515/popets-2015-0005 Download PDF Abstract: A nation-scale firewall, colloquially referred to as the “Great Firewall of China,” …

  3. PoPETs Proceedings — Volume 2015

    Volume 2015 Issue 1 Editors’ Introduction Apu Kapadia (Indiana University Bloomington), Steven J. Murdoch (University College London) 20,000 In League Under the Sea: Anonymous …

  4. Privacy Enhancing Technologies Symposium 2015

    PETS seeks paper and panel submissions for its 15th event to be held in Drexel University, Philadelphia, PA, USA on June 30 – July 2, 2015. Papers should present novel practical …

  5. Proceedings on Privacy Enhancing Technologies 2015; 2015 (1):61–76 Roya Ensafi*, Philipp Winter, Abdullah Mueen, and Jedidiah R. Crandall

  6. An Automated Approach for Complementing Ad Blockers’ Blacklists

    Volume: 2015 Issue: 2 Pages: 282–298 DOI: https://doi.org/10.1515/popets-2015-0018 Download PDF Abstract: Privacy in the Web has become a major concern resulting in the popular use of …

  7. PoPETs Proceedings

    Volume 2017 Volume 2016 Volume 2015 Privacy Enhancing Technologies Symposium PETS 2014 PETS 2013 PETS 2012 PETS 2011 PETS 2010 PETS 2009 PETS 2008 PETS 2007 …

  8. Toward Mending Two Nation-Scale Brokered Identification Systems

    Volume: 2015 Issue: 2 Pages: 135–155 DOI: https://doi.org/10.1515/popets-2015-0022 Download PDF

  9. PoPETs Proceedings — DP5: A Private Presence Service

    Issue: 2 Pages: 4–24 DOI: https://doi.org/10.1515/popets-2015-0008 Download PDF Abstract: Users of social applications like to be notified when their friends are online. Typically, this is …

  10. Keywords: Data Privacy, Obfuscation, Utility, Differen-tial Privacy, Distortion Privacy, Inference Attack, Prior Knowledge, Optimization, Game Theory DOI 10.1515/popets-2015-0024 …