default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 23 matches
- 2005
- David M. Martin Jr., Andrei Serjantov:
Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3424, Springer 2005, ISBN 3-540-26203-2 [contents] - 2004
- Mikhail J. Atallah, Jiangtao Li:
Secure Outsourcing of Sequence Comparisons. Privacy Enhancing Technologies 2004: 63-78 - Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini:
Privacy-Preserving Trust Negotiations. Privacy Enhancing Technologies 2004: 283-301 - Rainer Böhme, George Danezis, Claudia Díaz, Stefan Köpsell, Andreas Pfitzmann:
On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?". Privacy Enhancing Technologies 2004: 243-255 - Simon D. Byers, Lorrie Faith Cranor, David P. Kormann, Patrick D. McDaniel:
Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine. Privacy Enhancing Technologies 2004: 314-328 - George Danezis:
The Traffic Analysis of Continuous-Time Mixes. Privacy Enhancing Technologies 2004: 35-50 - Claudia Díaz, George Danezis, Christian Grothoff, Andreas Pfitzmann, Paul F. Syverson:
Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior? Privacy Enhancing Technologies 2004: 242-242 - Roger Dingledine, Vitaly Shmatikov, Paul F. Syverson:
Synchronous Batching: From Cascades to Free Routes. Privacy Enhancing Technologies 2004: 186-206 - Yitao Duan, John F. Canny:
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments. Privacy Enhancing Technologies 2004: 167-185 - Peter Fairbrother:
An Improved Construction for Universal Re-encryption. Privacy Enhancing Technologies 2004: 79-87 - Philippe Golle:
Reputable Mix Networks. Privacy Enhancing Technologies 2004: 51-62 - Carl A. Gunter, Michael J. May, Stuart G. Stubblebine:
A Formal Privacy System and Its Application to Location Based Services. Privacy Enhancing Technologies 2004: 256-282 - Katia Hayati, Martín Abadi:
Language-Based Enforcement of Privacy Policies. Privacy Enhancing Technologies 2004: 302-313 - Alfred Kobsa, Maximilian Teltzrow:
Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users' Data Sharing and Purchase Behavior. Privacy Enhancing Technologies 2004: 329-343 - Dennis Kügler:
On the Anonymity of Banknotes. Privacy Enhancing Technologies 2004: 108-120 - Markus G. Kuhn:
Electromagnetic Eavesdropping Risks of Flat-Panel Displays. Privacy Enhancing Technologies 2004: 88-107 - Nick Mathewson, Roger Dingledine:
Practical Traffic Analysis: Extending and Resisting Statistical Disclosure. Privacy Enhancing Technologies 2004: 17-34 - Richard E. Newman, Vipan R. Nalla, Ira S. Moskowitz:
Anonymity and Covert Channels in Simple Timed Mix-Firewalls. Privacy Enhancing Technologies 2004: 1-16 - Richard Owens, Ross Fraser, William O'Brien, Michael Gurski:
Panel Discussion - Conforming Technology to Policy: The Problems of Electronic Health Records. Privacy Enhancing Technologies 2004: 344-344 - Gergely Tóth, Zoltán Hornák:
Measuring Anonymity in a Non-adaptive, Real-Time System. Privacy Enhancing Technologies 2004: 226-241 - Jonathan T. Trostle, Hosei Matsuoka, Muhammad Mukarram Bin Tariq, James Kempf, Toshiro Kawahara, Ravi Jain:
Cryptographically Protected Prefixes for Location Privacy in IPv6. Privacy Enhancing Technologies 2004: 142-166 - Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao:
On Flow Correlation Attacks and Countermeasures in Mix Networks. Privacy Enhancing Technologies 2004: 207-225 - Alf Zugenmaier:
FLASCHE - A Mechanism Providing Anonymity for Mobile Users. Privacy Enhancing Technologies 2004: 121-141
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-28 10:52 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint