In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social ...
User profiles can be used to identify persons inside a community with similar interests. Folksonomy systems allow users to individually tag the objects of a common set (e.g., web p...
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
This paper presents a security analysis of Onion Routing, an application independent infrastructure for tra c-analysis-resistant and anonymous Internet connections. It also includ...
Paul F. Syverson, Gene Tsudik, Michael G. Reed, Ca...