Security Papers
 Share
The version of the browser you are using is no longer supported. Please upgrade to a supported browser.Dismiss

 
Comment only
 
 
ABCDEFGHIJKLMNOPQRSTUVWXY
1
NoTopic (Field1)SubFieldSourceYearTitle of PaperTool (Subtitle)Notes
2
1Anonymity/PrivacyACSAS2014MoRePriv: Mobile Os Support For Application Personalization And PrivacyMoRePriv
3
2Anonymity/PrivacyACSAS2014Exploring and Mitigating Privacy Threats of HTML5 Geolocation API
4
3Anonymity/PrivacyNetwork-basedCCS2014PrivEx: Private Collection of Traffic Statistics for Anonymous Communication NetworksPrivEx
5
4Anonymity/PrivacySocial EngineeringCCS2014Community-Enhanced De-anonymization of Online Social Networks
6
5Anonymity/PrivacyCCS2014Location Privacy Protection for Smartphone Users
7
6Anonymity/PrivacyCCS2014Structural Data De-anonymization: Quantification, Practice, and Implications
8
7Anonymity/PrivacyCCS2014Algebraic MACs and Keyed-Verification Anonymous Credentials
9
8Anonymity/PrivacyCCS2014Optimal Geo-Indistinguishable Mechanisms for Location Privacy
10
9Anonymity/PrivacyCCS2014RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal ResponseRAPPOR
11
10Anonymity/PrivacyCCS2014(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection
12
11Anonymity/PrivacyCCS2014Quantifying Web-Search Privacy
13
12Anonymity/PrivacyNetwork-basedIEEE S&P2014SoK: Security and Privacy in Implantable Medical Devices and Body Area NetworksSoK
14
13Anonymity/PrivacyIEEE S&P2014Bootstrapping Privacy Compliance in Big Data Systems
15
14Anonymity/PrivacyIEEE S&P2014Anonize: A Large-Scale Anonymous Survey SystemAnonize
16
15Anonymity/PrivacyIEEE S&P2014Cloak and Swagger: Understanding Data Sensitivity Through the Lens of User AnonymityCloak and Swagger
17
16Anonymity/PrivacyCloud/DistributedNDSS2014Privacy-Preserving Distributed Stream Monitoring
18
17Anonymity/PrivacyNetwork-basedNDSS2014The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor NetworkThe Sniper Attack
19
18Anonymity/PrivacyNDSS2014Privacy through Pseudonymity in Mobile Telephony Systems
20
19Anonymity/PrivacyNDSS2014Selling off User Privacy at Auction
21
20Anonymity/PrivacyNDSS2014Decentralized Anonymous Credentials
22
21Anonymity/PrivacyCloud/DistributedUSENIX2014Mimesis Aegis: A Mimicry Privacy Shield–A System’s Approach to Data Privacy on Public Cloud.Mimesis Aegis
23
22Anonymity/PrivacyWeb-basedUSENIX2014XRay: Enhancing the Web’s Transparency with Differential CorrelationXRay
24
23Anonymity/PrivacyUSENIX2014Privee: An Architecture for Automatically Analyzing Web Privacy Policies.Privee
25
24Anonymity/PrivacyUSENIX2014Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing
26
25Anonymity/PrivacyUSENIX2014A Bayesian Approach to Privacy Enforcement in Smartphones
27
26Anonymity/PrivacyProtocolsACSAS2013Do I know You? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications
28
27Anonymity/PrivacyACSAS2013k-subscription: Privacy-Preserving Microblogging Browsing Through Obfuscationk-subscription
29
28Anonymity/PrivacyACSAS2013MyCloud-Supporting User-Configured Privacy Protection in Cloud Computing
30
29Anonymity/PrivacyMobileCCS2013AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage DetectionAppIntent
31
30Anonymity/PrivacyNetwork-basedCCS2013PCTCP: Per-Circuit TCP-over-IPsec Transport for Anonymous Communication Overlay NetworksPCTCP
32
31Anonymity/PrivacyCCS2013Membership Privacy: A Unifying Framework For Privacy DefinitionsMembership Privacy
33
32Anonymity/PrivacyCCS2013Anonymous Credentials Light
34
33Anonymity/PrivacyCCS2013Addressing the Concerns of the Lacks Family: Quantification of Kin Genomic Privacy
35
34Anonymity/PrivacyCCS2013Geo-Indistinguishability: Differential Privacy for Location-Based Systems
36
35Anonymity/PrivacyCCS2013Privacy-Preserving Matrix Factorization
37
36Anonymity/PrivacyIEEE S&P2013Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
38
37Anonymity/PrivacyIEEE S&P2013Anon-Pass: Practical Anonymous SubscriptionsAnon-Pass
39
38Anonymity/PrivacyIEEE S&P2013Privacy-Preserving Ridge Regression on Hundreds of Millions of Records
40
39Anonymity/PrivacyIEEE S&P2013A Scanner Darkly: Protecting User Privacy From Perceptual ApplicationsA Scanner Darkly
41
40Anonymity/PrivacyIEEE S&P2013Circuit Structures for Improving Efficiency of Security and Privacy Tools
42
41Anonymity/PrivacyNetwork-basedNDSS2013Pisces: Anonymous Communication Using Social NetworksPisces
43
42Anonymity/PrivacyNetwork-basedNDSS2013Preserving Link Privacy in Social Network based Systems
44
43Anonymity/PrivacyNDSS2013Comparing Mobile Privacy Protection through Cross-Platform Applications
45
44Anonymity/PrivacyNDSS2013rBridge: User Reputation based Tor Bridge Distribution with Privacy PreservationrBridge
46
45Anonymity/PrivacyNDSS2013LIRA: Lightweight Incentivized Routing for AnonymityLIRA
47
46Anonymity/PrivacyMobileUSENIX2013Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies
48
47Anonymity/PrivacyUSENIX2013Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications
49
48Anonymity/PrivacyUSENIX2013Proactively Accountable Anonymous Messaging in Verdict
50
49Anonymity/PrivacyUSENIX2013ZQL: A Compiler for Privacy-Preserving Data ProcessingZQL
51
50Anonymity/PrivacyACSAS2012SensorSift: Balancing Sensor Data Privacy and Utility in Automated Face UnderstandingSensorSift
52
51Anonymity/PrivacyFile/StorageCCS2012Single Round Access Privacy on Outsourced Storage.
53
52Anonymity/PrivacyNetwork-basedCCS2012Deanonymizing Mobility Traces: Using Social Network as a Side-Channel.
54
53Anonymity/PrivacyCCS2012Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems.Neighborhood Watch
55
54Anonymity/PrivacyCCS2012Measuring Vote Privacy, Revisited.
56
55Anonymity/PrivacyCCS2012Protecting Location Privacy: Optimal Strategy against Localization Attacks.
57
56Anonymity/PrivacyCCS2012StegoTorus: A Camouflage Proxy for the Tor Anonymity System.StegoTorus
58
57Anonymity/PrivacyCCS2012On Significance of the Least Significant Bits For Differential Privacy.
59
58Anonymity/PrivacyIEEE S&P2012Formalizing and Enforcing Purpose Restrictions of Privacy Policies
60
59Anonymity/PrivacyIEEE S&P2012Hummingbird: Privacy at the time of TwitterHummingbird
61
60Anonymity/PrivacyIEEE S&P2012LAP: Lightweight Anonymity and PrivacyLAP
62
61Anonymity/PrivacyNetwork-basedNDSS2012ANDaNA: Anonymous Named Data Networking ApplicationANDaNA
63
62Anonymity/PrivacyNDSS2012Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud
64
63Anonymity/PrivacyNDSS2012Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds
65
64Anonymity/PrivacyNDSS2012BLACR: TTP-Free Blacklistable Anonymous Credentials with ReputationBLACR
66
65Anonymity/PrivacyNDSS2012Host Fingerprinting and Tracking on the Web: Privacy and Security Implications
67
66Anonymity/PrivacyNetwork-basedACSAS2011Detecting and Resolving Privacy Conflicts for Collaborative Data Sharing in Online Social Networks
68
67Anonymity/PrivacyCCS2011Protecting Consumer Privacy from Electric Load Monitoring
69
68Anonymity/PrivacyCCS2011Sedic: Privacy-Aware Data Intensive Computing on Hybrid CloudSedic
70
69Anonymity/PrivacyCCS2011Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting
71
70Anonymity/PrivacyCCS2011Televisions, Video Privacy, and Powerline Electromagnetic Interference
72
71Anonymity/PrivacyCCS2011Privacy and Accountability for Location-based Aggregate Statistics
73
72Anonymity/PrivacyIEEE S&P2011Formalizing Anonymous Blacklisting Systems
74
73Anonymity/PrivacyIEEE S&P2011RePriv: Re-Imagining Content Personalization and In-Browser PrivacyRePriv
75
74Anonymity/PrivacyIEEE S&P2011You Might Also Like: Privacy Risks of Collaborative FilteringYou Might Also Like
76
75Anonymity/PrivacyIEEE S&P2011Quantifying Location Privacy
77
76Anonymity/PrivacyIEEE S&P2011Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study
78
77Anonymity/PrivacyNetwork-basedNDSS2011Tracker: Security and Privacy for RFID-based Supply ChainsTracker
79
78Anonymity/PrivacyNDSS2011Location Privacy via Private Proximity Testing
80
79Anonymity/PrivacyNDSS2011Efficient Privacy-Preserving Biometric Identification
81
80Anonymity/PrivacyNDSS2011PiOS: Detecting Privacy Leaks in iOS ApplicationsPiOS
82
81Anonymity/PrivacyNDSS2011Privacy-Preserving Aggregation of Time-Series Data
83
82Anonymity/PrivacyUSENIX2011Bubble Trouble: Off-Line De-Anonymization of Bubble FormsBubble Trouble
84
83Anonymity/PrivacyUSENIX2011PIR-Tor: Scalable Anonymous Communication Using Private Information RetrievalPIR-Tor
85
84Anonymity/PrivacyUSENIX2011The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion
86
85Anonymity/PrivacyUSENIX2011Differential Privacy Under Fire
87
86Anonymity/PrivacyCCS2010An Empirical Study of Privacy-Violating Information Flows in JavaScript Web Applications
88
87Anonymity/PrivacyCCS2010
In Search of an Anonymous and Secure Lookup: Attacks on Structured Peer-to-peer Anonymous Communication Systems
89
88Anonymity/PrivacyCCS2010Dissent: Accountable Anonymous Group MessagingDissent
90
89Anonymity/PrivacyNetwork-basedIEEE S&P2010A Practical Attack to De-Anonymize Social Network Users
91
90Anonymity/PrivacyNDSS2010Adnostic: Privacy Preserving Targeted AdvertisingAdnostic
92
91Anonymity/PrivacyNDSS2010Contractual Anonymity
93
92Anonymity/PrivacyNDSS2010A3: An Extensible Platform for Application-Aware AnonymityA3
94
93Anonymity/PrivacyACSAS2009Privacy through Noise: A Design Space for Private Identification
95
94Anonymity/PrivacyNetwork-basedCCS2009RFID Privacy: Relation Between Two Notions, Minimal Condition, and Efficient ConstructionRFID Privacy
96
95Anonymity/PrivacyNetwork-basedCCS2009NISAN: Network Information Service for Anonymization NetworksNISAN
97
96Anonymity/PrivacyNetwork-basedCCS2009Certificateless Onion Routing
98
97Anonymity/PrivacyNetwork-basedCCS2009Scalable Onion Routing with Torsk
99
98Anonymity/PrivacyCCS2009Improving Privacy and Security in Multi-Authority Attribute-Based Encryption
100
99Anonymity/PrivacyCCS2009ShadowWalker: Peer-to-peer Anonymous Communication using Redundant Structured TopologiesShadowWalker
Loading...
Main menu