language:
Find link is a tool written by Edward Betts.searching for Privacy-enhancing technologies 89 found (136 total)
alternate case: privacy-enhancing technologies
Frank McSherry
(236 words)
[view diff]
no match in snippet
view article
find links to article
which they won the 2009 PET Award for Outstanding Research in Privacy Enhancing Technologies. McSherry has also made notable contributions to stream processingKobbi Nissim (221 words) [view diff] no match in snippet view article find links to article
Goh). The 2019 Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies (joint work with Aaron Bembenek, Alexandra Wood, Mark Bun, MarcoIan Goldberg (824 words) [view diff] no match in snippet view article find links to article
the University of Waterloo, and the Canada Research Chair in Privacy Enhancing Technologies. He was formerly Tor Project board of directors chairman, andEvercookie (2,792 words) [view diff] no match in snippet view article find links to article
Tracking Data in the Online Advertising Ecosystem". Proceedings on Privacy Enhancing Technologies. 2018 (4): 85–103. doi:10.1515/popets-2018-0033. ISSN 2299-0984Spy pixel (3,242 words) [view diff] exact match in snippet view article find links to article
responses, such as fabricating personal information, using privacy-enhancing technologies, and refusing to purchase. At the same time, some argue thatZero Knowledge Systems (504 words) [view diff] exact match in snippet view article find links to article
the new name Radialpoint though was no longer a developer of privacy-enhancing technologies. Most recently, it was acquired by AppDirect and rebranded asPsiphon (1,101 words) [view diff] no match in snippet view article find links to article
domain fronting". Proceedings on Privacy Enhancing Technologies. 2015 (2). Proceedings on Privacy Enhancing Technologies 2015: 46–64. doi:10.1515/popets-2015-0009Padding (cryptography) (3,307 words) [view diff] no match in snippet view article
Websites Using Traffic Analysis". Privacy Enhancing Technologies. International Workshop on Privacy Enhancing Technologies. Lecture Notes in Computer ScienceLantern (software) (1,031 words) [view diff] no match in snippet view article
domain fronting". Proceedings on Privacy Enhancing Technologies. 2015 (2). Proceedings on Privacy Enhancing Technologies 2015: 46–64. doi:10.1515/popets-2015-0009Exponential mechanism (3,031 words) [view diff] no match in snippet view article find links to article
co-winner of the 2009 PET Award for Outstanding Research in Privacy Enhancing Technologies. Most of the initial research in the field of differential privacyDegree of anonymity (1,175 words) [view diff] no match in snippet view article find links to article
Syverson (ed.). "Towards measuring anonymity". Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Springer-Verlag, LNCS 2482. Archived fromHyphanet (6,089 words) [view diff] no match in snippet view article find links to article
In: Proceedings of the International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability. New York, NY:Aleksandra Korolova (912 words) [view diff] exact match in snippet view article find links to article
was runner-up for the PET Award for outstanding research in privacy-enhancing technologies in 2015 and received the Association for Computing MachineryParisa Tabriz (1,043 words) [view diff] exact match in snippet view article find links to article
university and did research in wireless security and attacks on privacy-enhancing technologies, co-authoring papers with her advisor Nikita Borisov. She wasUnited Nations Statistics Division (408 words) [view diff] case mismatch in snippet view article find links to article
Sustainable Development Goal indicators ... UNSD leads the Privacy-Enhancing Technologies Lab (PET Lab), which in turn drives TrustworthyAI together withRobert Watson (computer scientist) (502 words) [view diff] no match in snippet view article
Watson, R. N. M. (2006). "Ignoring the Great Firewall of China". Privacy Enhancing Technologies. Lecture Notes in Computer Science. Vol. 4258. p. 20. CiteSeerX 10Internet censorship circumvention (4,278 words) [view diff] no match in snippet view article find links to article
2017). "A Usability Evaluation of Tor Launcher". Proceedings on Privacy Enhancing Technologies. 2017 (3): 90–109. doi:10.1515/popets-2017-0030. ISSN 2299-0984PURB (cryptography) (1,495 words) [view diff] no match in snippet view article
Encrypted Files and Communication with PURBs" (PDF). Proceedings on Privacy Enhancing Technologies (PoPETS). 2019 (4): 6–33. arXiv:1806.03160. doi:10.2478/popets-2019-0056Free Haven Project (928 words) [view diff] exact match in snippet view article find links to article
2014. Retrieved 3 June 2014. Oppliger, R. (October 2005). "Privacy-enhancing technologies for the world wide web". Computer Communications. 28 (16): 1791–1797UNdata (265 words) [view diff] case mismatch in snippet view article find links to article
Data Repositories re3data.org. UNSD is the lead body for the Privacy-Enhancing Technologies Lab (PET Lab). The PET Lab together with the ITU AI for GoodHal Finney (computer scientist) (1,239 words) [view diff] exact match in snippet view article
privacy and his significant contributions to the development of privacy-enhancing technologies. In 2004, Finney created the first reusable proof-of-work systemDomain fronting (2,456 words) [view diff] no match in snippet view article find links to article
communication through domain fronting" (PDF). Proceedings on Privacy Enhancing Technologies. 2015 (2): 46–64. doi:10.1515/popets-2015-0009. ISSN 2299-0984Darknet (1,483 words) [view diff] no match in snippet view article find links to article
Christian; Kügler, Dennis (2003). Dingledine, Roger (ed.). Privacy Enhancing Technologies Third International Workshop (PET 2003). Springer-Verlag (Heidelberg)TCP reset attack (1,099 words) [view diff] no match in snippet view article find links to article
Philippe (eds.). Ignoring the Great Firewall of China (PDF). Privacy Enhancing Technologies. Lecture Notes in Computer Science. Vol. 4258. Cambridge, UK:Jean-Pierre Hubaux (2,247 words) [view diff] case mismatch in snippet view article find links to article
(2021). "Revolutionizing Medical Data Sharing Using Advanced Privacy-Enhancing Technologies: Technical, Legal, and Ethical Synthesis". Journal of MedicalSimone Fischer-Hübner (329 words) [view diff] no match in snippet view article find links to article
Swedish Forum för Dataskydd, advisory board member of PETS (Privacy Enhancing Technologies Symposium) and NordSec, and coordinator of the Swedish IT SecurityDevice fingerprint (3,940 words) [view diff] no match in snippet view article find links to article
Unique Is Your Web Browser?". In Atallah MJ, Hopper NJ (eds.). Privacy Enhancing Technologies. Lecture Notes in Computer Science. Springer Berlin HeidelbergRoger Dingledine (1,306 words) [view diff] no match in snippet view article find links to article
Haven Project: Distributed anonymous storage service. Designing Privacy Enhancing Technologies. Springer Berlin/Heidelberg. pp. 67–95. CiteSeerX 10.1.1.420Caspar Bowden (2,730 words) [view diff] no match in snippet view article find links to article
prepared to wrestle with the user unfriendly inconveniences of privacy enhancing technologies, as the almost meltdown of his laptop, four minutes into hisSilverPush (946 words) [view diff] no match in snippet view article find links to article
the Ultrasound Ecosystem" (PDF). ubeacsec.org. Proceedings on Privacy Enhancing Technologies. Retrieved 26 November 2017. Cimpanu, Catalin. "234 AndroidCynthia Dwork (1,225 words) [view diff] no match in snippet view article find links to article
In 2009, she won the PET Award for Outstanding Research in Privacy Enhancing Technologies. In 2016, both the International Association for CryptologicKenny Paterson (523 words) [view diff] no match in snippet view article find links to article
AlFardan on the Lucky 13 attack Award for Outstanding Research in Privacy Enhancing Technologies for work with Mihir Bellare and Phil Rogaway on the SecurityDavid Cleevely (2,757 words) [view diff] case mismatch in snippet view article find links to article
one of the winners of the Challenge to Drive Innovation in Privacy-Enhancing Technologies that Reinforce Democratic Values, awarded by the United StatesApple Home (2,174 words) [view diff] no match in snippet view article find links to article
Bluetooth-Low-Energy Continuity Protocols". Proceedings in Privacy Enhancing Technologies. 1: 26–46 – via sciendo. Chin, Monica; Chang 2019-09-27T15:27:35ZCaldicott Report (933 words) [view diff] no match in snippet view article find links to article
used. Where particularly sensitive information is transferred, privacy enhancing technologies (e.g. encrypting identifiers or "patient identifying information")Great Firewall (7,723 words) [view diff] no match in snippet view article find links to article
"Ignoring the great firewall of china". International Workshop on Privacy Enhancing Technologies. Mozur, Paul (13 September 2015). "Baidu and CloudFlare BoostVitaly Shmatikov (453 words) [view diff] no match in snippet view article find links to article
received the Caspar Bowden PET Award for Outstanding Research in Privacy Enhancing Technologies in 2008, 2014, and 2018. He received the Test of Time awardRiffle (anonymity network) (444 words) [view diff] no match in snippet view article
Communication System With Strong Anonymity" (PDF). Proceedings on Privacy Enhancing Technologies. 2: 115–134. doi:10.1515/popets-2016-0008. hdl:1721.1/128773Norman Sadeh (2,964 words) [view diff] exact match in snippet view article find links to article
refine machine learning models. Sadeh is most known for AI-based privacy-enhancing technologies, including privacy assistants, automated privacy complianceSmart speaker (1,682 words) [view diff] no match in snippet view article find links to article
Attitudes of Smart Speaker Users" (PDF). Sciendo. Proceedings on Privacy Enhancing Technologies. "Sarah Mennicken and Elaine M. Huang. 2012. Hacking the NaturalWeb browsing history (2,186 words) [view diff] no match in snippet view article find links to article
Tracking Data in the Online Advertising Ecosystem”. Proceedings on Privacy Enhancing Technologies 2018(4): 85-103. "Visited: Securely collect browsing historyVan Eck phreaking (1,476 words) [view diff] no match in snippet view article find links to article
Eavesdropping Risks of Flat-Panel Displays" (PDF). 4th Workshop on Privacy Enhancing Technologies: 23–25. Kuhn, Markus G. (December 2003). "Compromising emanations:Encryption (3,645 words) [view diff] no match in snippet view article find links to article
Encrypted Files and Communication with PURBs" (PDF). Proceedings on Privacy Enhancing Technologies (PoPETS). 2019 (4): 6–33. arXiv:1806.03160. doi:10.2478/popets-2019-0056TCP Fast Open (935 words) [view diff] no match in snippet view article find links to article
Performance and Privacy for TLS over TCP Fast Open". Proceedings on Privacy Enhancing Technologies. 2020 (2): 271–287. arXiv:1905.03518. doi:10.2478/popets-2020-0027Peter Eckersley (computer scientist) (1,468 words) [view diff] no match in snippet view article
Eckersley, Peter (2010). "How Unique Is Your Web Browser?". Privacy Enhancing Technologies. Lecture Notes in Computer Science. Springer. CiteSeerX 10.1Email tracking (1,278 words) [view diff] no match in snippet view article find links to article
this! Privacy implications of email tracking". Proceedings on Privacy Enhancing Technologies. 2018 (1): 109–126. doi:10.1515/popets-2018-0006. Evers, JorisGNUnet (2,141 words) [view diff] no match in snippet view article find links to article
Practical Anonymous Networking". In Dingledine, Roger (ed.). Privacy Enhancing Technologies. Lecture Notes in Computer Science. Vol. 2760. Springer BerlinPrivate set intersection (706 words) [view diff] no match in snippet view article find links to article
Tiancheng (2022). "Updatable Private Set Intersection" (PDF). Privacy Enhancing Technologies'22:Proceedings. 2022 (2): 378–406. doi:10.2478/popets-2022-0051Gender differences in social network service use (3,410 words) [view diff] no match in snippet view article find links to article
Awareness, Information Sharing, and Privacy on the Facebook". Privacy Enhancing Technologies. Lecture Notes in Computer Science. Vol. 4258. pp. 36–58. CiteSeerX 10Cross-device tracking (4,463 words) [view diff] no match in snippet view article find links to article
Tracking: Measurement and Disclosures" (PDF). Proceedings on Privacy Enhancing Technologies. 2017 (2): 133–148. doi:10.1515/popets-2017-0020. "CommentsHash-based cryptography (2,329 words) [view diff] no match in snippet view article find links to article
"HashWires: Hyperefficient Credential-Based Range Proofs". Privacy Enhancing Technologies Symposium (PETS) 2021. "Submission Requirements and EvaluationUsable security (801 words) [view diff] no match in snippet view article find links to article
Steven J. (eds.), "Why Doesn't Jane Protect Her Privacy?", Privacy Enhancing Technologies, vol. 8555, Cham: Springer International Publishing, pp. 244–262Kagi (search engine) (928 words) [view diff] no match in snippet view article
Bypassing Internet Challenges Anonymously". Proceedings on Privacy Enhancing Technologies. doi:10.1515/popets-2018-0026. ISSN 2299-0984. "Using Kagi withCenter for Research on Computation and Society (852 words) [view diff] exact match in snippet view article find links to article
typically with social aspects. These include social computing, privacy-enhancing technologies, encryption and data security, misinformation, machine learningVenmo (3,519 words) [view diff] no match in snippet view article find links to article
Discovering privacy leaks in mobile social payments" (PDF). Privacy Enhancing Technologies. Retrieved March 11, 2022. McCaffrey, Peter Rudegeair and OrlaLibrary Freedom Project (1,826 words) [view diff] no match in snippet view article find links to article
privacy workshop in January 2016. The logos are those of assorted privacy enhancing technologies, institutions and advocacy groups such as the Tor project, theSearchable symmetric encryption (2,431 words) [view diff] no match in snippet view article find links to article
(2019-01-01). "Breach-Resistant Structured Encryption". Proceedings on Privacy Enhancing Technologies. 2019 (1): 245–265. doi:10.2478/popets-2019-0014. S2CID 4047057Privacy Sandbox (2,333 words) [view diff] no match in snippet view article find links to article
Beans? An Investigation Into Search Privacy". Proceedings on Privacy Enhancing Technologies. 2022 (2): 426–446. doi:10.2478/popets-2022-0053. ISSN 2299-0984DNS over HTTPS (2,938 words) [view diff] no match in snippet view article find links to article
"Oblivious DNS: Practical Privacy for DNS Queries" (PDF). Privacy Enhancing Technologies. 2019 (2): 228–244. arXiv:1806.00276. doi:10.2478/popets-2019-0028Ultrasound (6,163 words) [view diff] no match in snippet view article find links to article
Privacy and Security of the Ultrasound Ecosystem". Proceedings on Privacy Enhancing Technologies. 2017 (2): 95–112. doi:10.1515/popets-2017-0018. Part II, industrialAli Dehghantanha (1,599 words) [view diff] no match in snippet view article find links to article
Dehghantanha built a framework that models the impacts of adopting Privacy Enhancing Technologies (PETs) on the performance of SMEs in Canada. He has also createdPirate Party (4,192 words) [view diff] exact match in snippet view article find links to article
these parties strongly defend open-source, decentralized and privacy-enhancing technologies such as blockchain, cryptocurrencies as an alternative to statePrivate information retrieval (2,184 words) [view diff] no match in snippet view article find links to article
Information Retrieval from Homomorphic Encryption". Proceedings on Privacy Enhancing Technologies 2015. Vol. 2015. DE GRUYTER. pp. 222–243. doi:10.1515/popets-2015-0016Oblivious data structure (1,344 words) [view diff] no match in snippet view article find links to article
Secure Computation". 13th International Symposium, PETS 2013. Privacy Enhancing Technologies Symposium. Bloomington, IN. doi:10.1007/978-3-642-39077-7_1VPN service (3,746 words) [view diff] no match in snippet view article find links to article
and DNS Hijacking in Commercial VPN clients". Proceedings on Privacy Enhancing Technologies. 2015 (1): 77–91. doi:10.1515/popets-2015-0006. hdl:10044/1/56834Deniable encryption (2,867 words) [view diff] no match in snippet view article find links to article
plausibly-deniable file system for NAND flash". Proceedings on Privacy Enhancing Technologies. 2020 (4): 239–254. doi:10.2478/popets-2020-0071. ISSN 2299-0984Computer and network surveillance (5,098 words) [view diff] no match in snippet view article find links to article
Eavesdropping Risks of Flat-Panel Displays" (PDF). 4th Workshop on Privacy Enhancing Technologies. Toronto: 23–25. Asonov, Dmitri; Agrawal, Rakesh (2004), KeyboardDark pattern (3,715 words) [view diff] no match in snippet view article find links to article
Dark Strategies and Privacy Dark Patterns". Proceedings on Privacy Enhancing Technologies. 2016 (4): 237–254. doi:10.1515/popets-2016-0038. ISSN 2299-0984Quad9 (2,949 words) [view diff] no match in snippet view article find links to article
"Oblivious DNS: Practical Privacy for DNS Queries". Proceedings on Privacy Enhancing Technologies. 2019 (2): 228–244. arXiv:1806.00276. doi:10.2478/popets-2019-0028Golden Shield Project (3,376 words) [view diff] no match in snippet view article find links to article
PET'06: Proceedings of the 6th international conference on Privacy Enhancing Technologies, Springer-Verlag (2006), pages 20-35, ISBN 3-540-68790-4, doi:10Domain Name System (9,812 words) [view diff] no match in snippet view article find links to article
"Oblivious DNS: Practical Privacy for DNS Queries" (PDF). Privacy Enhancing Technologies. 2019 (2): 228–244. arXiv:1806.00276. doi:10.2478/popets-2019-0028Crowds (anonymity network) (2,639 words) [view diff] no match in snippet view article
Syverson (ed.). "Towards measuring anonymity". Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Springer-Verlag, LNCS 2482. Archived fromTransmission Control Protocol (12,952 words) [view diff] no match in snippet view article find links to article
Performance and Privacy for TLS over TCP Fast Open". Proceedings on Privacy Enhancing Technologies. 2020 (2): 271–287. arXiv:1905.03518. doi:10.2478/popets-2020-0027Stylometry (6,675 words) [view diff] no match in snippet view article find links to article
Automated Authorship Obfuscation using Mutant-X". Proceedings on Privacy Enhancing Technologies. 2019 (4): 54–71. doi:10.2478/popets-2019-0058. S2CID 197621394Adversarial stylometry (3,785 words) [view diff] no match in snippet view article find links to article
Automated Authorship Obfuscation using Mutant-X". Proceedings on Privacy Enhancing Technologies. 2019 (4): 54–71. doi:10.2478/popets-2019-0058. S2CID 197621394Targeted advertising (9,815 words) [view diff] no match in snippet view article find links to article
Mohamed-Ali; Tran, Minh-Dung (2012). "Betrayed by Your Ads!". Privacy Enhancing Technologies. Lecture Notes in Computer Science. Berlin, Heidelberg: SpringerSubmarine communications cable (12,763 words) [view diff] no match in snippet view article find links to article
communication, trust, MLATs, and undersea cables. Proceedings on Privacy Enhancing Technologies, 2015(1), 4–24. https://doi.org/10.1515/popets-2015-0002 JonathanFirefox (17,314 words) [view diff] no match in snippet view article find links to article
HTTP Strict Transport Security in Tor Browser". Proceedings on Privacy Enhancing Technologies: 345. doi:10.56553/popets-2024-0020. ISSN 2299-0984. ArchivedHuman bycatch (3,344 words) [view diff] no match in snippet view article find links to article
Privacy Perceptions of Civilian Drones in The US". Proceedings on Privacy Enhancing Technologies. 2016 (3): 172–190. doi:10.1515/popets-2016-0022. Yoo, Wonsang;Click tracking (3,394 words) [view diff] no match in snippet view article find links to article
this! Privacy implications of email tracking". Proceedings on Privacy Enhancing Technologies. 1: 109–126. doi:10.1515/popets-2018-0006. S2CID 41532115. BinnsIdentity replacement technology (3,954 words) [view diff] no match in snippet view article find links to article
"Olympus: Sensor Privacy through Utility Aware Obfuscation". Proceedings on Privacy Enhancing Technologies. 2019 (1): 5–25. doi:10.2478/popets-2019-0002.Alondra Nelson (5,857 words) [view diff] exact match in snippet view article find links to article
science and technology innovation, artificial intelligence, privacy-enhancing technologies, and public health measures such as indoor air quality for COVID-19Wearable technology (13,360 words) [view diff] no match in snippet view article find links to article
analysis of menstrual app privacy policies". Proceedings on Privacy Enhancing Technologies. 2020 (4): 491–510. doi:10.2478/popets-2020-0083. ISSN 2299-0984Cathode-ray tube (29,219 words) [view diff] no match in snippet view article find links to article
"Electromagnetic Eavesdropping Risks of Flat-Panel Displays". Privacy Enhancing Technologies. Lecture Notes in Computer Science. Vol. 3424. Berlin, Heidelberg:DNA encryption (4,435 words) [view diff] case mismatch in snippet view article find links to article
Retrieved 2017-11-03. Ayday E, Raisaro JL, Hubaux JP (2012). "Privacy-Enhancing Technologies for Medical Tests Using Genomic Data". {{cite journal}}: CiteNetwork Coordinate System (2,218 words) [view diff] no match in snippet view article find links to article
Anonymous Routing". In Goldberg, Ian; Atallah, Mikhail J. (eds.). Privacy Enhancing Technologies. Lecture Notes in Computer Science. Vol. 5672. Berlin, Heidelberg:Children's Online Privacy Protection Act (5,562 words) [view diff] no match in snippet view article find links to article
Examining COPPA Compliance at Scale" (PDF). Proceedings on Privacy Enhancing Technologies. 2018 (3): 63–83. doi:10.1515/popets-2018-0021. S2CID 4935390Cross-site leaks (7,518 words) [view diff] no match in snippet view article find links to article
Headers to Identify and Track Online Users". Proceedings on Privacy Enhancing Technologies. 2021 (2): 391–406. doi:10.2478/popets-2021-0033. hdl:20.500List of Cornell University alumni (natural sciences) (17,418 words) [view diff] no match in snippet view article
Dijkstra Prize (2007), the PET Award for Outstanding Research in Privacy Enhancing Technologies (2009) Lauren Elliott (attended 3 years, transferred) – video