Sciweavers

PET
2009
Springer
14 years 3 months ago
Regulating Privacy in Wireless Advertising Messaging: FIPP Compliance by Policy vs. by Design
This research analyzes consumer privacy issues pertaining to the newly developing wireless marketing context, specifically, wireless advertising messaging (WAM). We develop a conce...
Heng Xu, John W. Bagby, Terence Ryan Melonas
PET
2009
Springer
14 years 5 months ago
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
: © Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao HP Labor...
Brian Thompson, Stuart Haber, William G. Horne, To...
PET
2009
Springer
14 years 5 months ago
Privacy-Preserving Policy-Based Information Transfer
As the global society becomes more interconnected and more privacy-conscious, communication protocols must balance access control with protecting participants’ privacy. A common ...
Emiliano De Cristofaro, Stanislaw Jarecki, Jihye K...
PET
2009
Springer
14 years 5 months ago
APOD: Anonymous Physical Object Delivery
Delivery of products bought online can violate consumers’ privacy, although not in a straightforward way. In particular, delivery companies that have contracted with a website kn...
Elli Androulaki, Steven M. Bellovin
PET
2009
Springer
14 years 5 months ago
On the Optimal Placement of Mix Zones
Abstract. In mobile wireless networks, third parties can track the location of mobile nodes by monitoring the pseudonyms used for identification. A frequently proposed solution to...
Julien Freudiger, Reza Shokri, Jean-Pierre Hubaux
PET
2009
Springer
14 years 5 months ago
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications
We present the Vida family of abstractions of anonymous communication systems, model them probabilistically and apply Bayesian inference to extract patterns of communications and u...
George Danezis, Carmela Troncoso
PET
2009
Springer
14 years 5 months ago
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default
Today’s Internet architecture makes no deliberate attempt to provide identity privacy—IP addresses are, for example, often static and the consistent use of a single IP address ...
Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren,...
PET
2009
Springer
14 years 5 months ago
Physical Layer Attacks on Unlinkability in Wireless LANs
Abstract. Recent work has focused on hiding explicit network identifiers such as hardware addresses from the link layer to enable anonymous communications in wireless LANs. These ...
Kevin S. Bauer, Damon McCoy, Ben Greenstein, Dirk ...
PET
2009
Springer
14 years 5 months ago
Scalable Link-Based Relay Selection for Anonymous Routing
The performance of an anonymous path can be described using many network metrics – e.g., bandwidth, latency, jitter, loss, etc. However, existing relay selection algorithms have ...
Micah Sherr, Matt Blaze, Boon Thau Loo
PET
2009
Springer
14 years 5 months ago
Using Linkability Information to Attack Mix-Based Anonymity Services
There exist well established models for anonymity focusing on traffic analysis, i. e., analysing properties of single messages as, e. g., timing. However there is only little work ...
Stefan Schiffner, Sebastian Clauß