The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment (Englisch)
- Neue Suche nach: Malin, B.
- Neue Suche nach: Airoldi, E.
- Neue Suche nach: Malin, B.
- Neue Suche nach: Airoldi, E.
- Neue Suche nach: Danezis, George
- Neue Suche nach: Golle, Philippe
In:
Privacy enhancing technologies; PET 2006
4258
;
413-430
;
2006
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment
-
Beteiligte:
-
Kongress:International workshop; 6th, Privacy enhancing technologies; PET 2006 ; 2006 ; Cambridge
-
Erschienen in:Privacy enhancing technologies; PET 2006 , 4258 ; 413-430LECTURE NOTES IN COMPUTER SCIENCE , 4258 ; 413-430
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Berlin , [Great Britain]
-
Erscheinungsdatum:01.01.2006
-
Format / Umfang:18 pages
-
Anmerkungen:Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Privacy for Public TransportationHeydt-Benjamin, T. S. / Chae, H.-J. / Defend, B. / Fu, K. et al. | 2006
- 20
-
Ignoring the Great Firewall of ChinaClayton, R. / Murdoch, S. J. / Watson, R. N. M. et al. | 2006
- 36
-
Imagined Communities: Awareness, Information Sharing, and Privacy on the FacebookAcquisti, A. / Gross, R. et al. | 2006
- 59
-
Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services FrameworksAlsaleh, M. / Adams, C. et al. | 2006
- 78
-
Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity ManagementSquicciarini, A. / Bhargav-Spantzel, A. / Czeskis, A. / Bertino, E. et al. | 2006
- 99
-
Privacy Injector - Automated Privacy Enforcement Through AspectsBerghe, C. V. / Schunter, M. et al. | 2006
- 118
-
A Systemic Approach to Automate Privacy Policy Enforcement in EnterprisesMont, M. C. / Thyne, R. et al. | 2006
- 135
-
One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization TechniqueGarfinkel, S. L. / Malan, D. J. et al. | 2006
- 152
-
Protecting Privacy with the MPEG-21 IPMP FrameworkSheppard, N. P. / Safavi-Naini, R. et al. | 2006
- 172
-
Personal Rights Management - Taming Camera-Phones for Individual Privacy EnforcementDeng, M. / Fritsch, L. / Kursawe, K. et al. | 2006
- 190
-
Improving Sender Anonymity in a Structured Overlay with Imprecise RoutingCiaccio, G. et al. | 2006
- 208
-
Selectively Traceable Anonymityvon Ahn, L. / Bortz, A. / Hopper, N. J. / O Neill, K. et al. | 2006
- 223
-
Valet Services: Improving Hidden Servers with a Personal TouchOverlier, L. / Syverson, P. et al. | 2006
- 245
-
Blending Different Latency Traffic with Alpha-mixingDingledine, R. / Serjantov, A. / Syverson, P. et al. | 2006
- 258
-
Private Resource PairingCalandrino, J. A. / Weaver, A. C. et al. | 2006
- 277
-
Honest-Verifier Private Disjointness Testing Without Random OraclesHohenberger, S. / Weis, S. A. et al. | 2006
- 295
-
A Flexible Framework for Secret Handshakes (Multi-party Anonymous and Un-observable Authentication)Tsudik, G. / Xu, S. et al. | 2006
- 316
-
On the Security of the Tor Authentication ProtocolGoldberg, I. et al. | 2006
- 332
-
Optimal Key-Trees for Tree-Based Private AuthenticationButtyan, L. / Holczer, T. / Vajda, I. et al. | 2006
- 351
-
Simple and Flexible Revocation Checking with PrivacySolis, J. / Tsudik, G. et al. | 2006
- 368
-
Breaking the Collusion Detection Mechanism of MorphMixTabriz, P. / Borisov, N. et al. | 2006
- 384
-
Linking Anonymous Transactions: The Consistent View AttackPashalidis, A. / Meyer, B. et al. | 2006
- 393
-
Preserving User Location Privacy in Mobile Data Management InfrastructuresCheng, R. / Zhang, Y. / Bertino, E. / Prabhakar, S. et al. | 2006
- 413
-
The Effects of Location Access Behavior on Re-identification Risk in a Distributed EnvironmentMalin, B. / Airoldi, E. et al. | 2006