Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Privacy-enhancing technologies 89 found (136 total)

alternate case: privacy-enhancing technologies

Frank McSherry (236 words) [view diff] no match in snippet view article find links to article

which they won the 2009 PET Award for Outstanding Research in Privacy Enhancing Technologies. McSherry has also made notable contributions to stream processing
Kobbi Nissim (221 words) [view diff] no match in snippet view article find links to article
Goh). The 2019 Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies (joint work with Aaron Bembenek, Alexandra Wood, Mark Bun, Marco
Ian Goldberg (824 words) [view diff] no match in snippet view article find links to article
the University of Waterloo, and the Canada Research Chair in Privacy Enhancing Technologies. He was formerly Tor Project board of directors chairman, and
Evercookie (2,792 words) [view diff] no match in snippet view article find links to article
Tracking Data in the Online Advertising Ecosystem". Proceedings on Privacy Enhancing Technologies. 2018 (4): 85–103. doi:10.1515/popets-2018-0033. ISSN 2299-0984
Spy pixel (3,242 words) [view diff] exact match in snippet view article find links to article
responses, such as fabricating personal information, using privacy-enhancing technologies, and refusing to purchase. At the same time, some argue that
Zero Knowledge Systems (504 words) [view diff] exact match in snippet view article find links to article
the new name Radialpoint though was no longer a developer of privacy-enhancing technologies. Most recently, it was acquired by AppDirect and rebranded as
Psiphon (1,101 words) [view diff] no match in snippet view article find links to article
domain fronting". Proceedings on Privacy Enhancing Technologies. 2015 (2). Proceedings on Privacy Enhancing Technologies 2015: 46–64. doi:10.1515/popets-2015-0009
Padding (cryptography) (3,307 words) [view diff] no match in snippet view article
Websites Using Traffic Analysis". Privacy Enhancing Technologies. International Workshop on Privacy Enhancing Technologies. Lecture Notes in Computer Science
Lantern (software) (1,031 words) [view diff] no match in snippet view article
domain fronting". Proceedings on Privacy Enhancing Technologies. 2015 (2). Proceedings on Privacy Enhancing Technologies 2015: 46–64. doi:10.1515/popets-2015-0009
Exponential mechanism (3,031 words) [view diff] no match in snippet view article find links to article
co-winner of the 2009 PET Award for Outstanding Research in Privacy Enhancing Technologies. Most of the initial research in the field of differential privacy
Degree of anonymity (1,175 words) [view diff] no match in snippet view article find links to article
Syverson (ed.). "Towards measuring anonymity". Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Springer-Verlag, LNCS 2482. Archived from
Hyphanet (6,089 words) [view diff] no match in snippet view article find links to article
In: Proceedings of the International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability. New York, NY:
Aleksandra Korolova (912 words) [view diff] exact match in snippet view article find links to article
was runner-up for the PET Award for outstanding research in privacy-enhancing technologies in 2015 and received the Association for Computing Machinery
Parisa Tabriz (1,043 words) [view diff] exact match in snippet view article find links to article
university and did research in wireless security and attacks on privacy-enhancing technologies, co-authoring papers with her advisor Nikita Borisov. She was
United Nations Statistics Division (408 words) [view diff] case mismatch in snippet view article find links to article
Sustainable Development Goal indicators ... UNSD leads the Privacy-Enhancing Technologies Lab (PET Lab), which in turn drives TrustworthyAI together with
Robert Watson (computer scientist) (502 words) [view diff] no match in snippet view article
Watson, R. N. M. (2006). "Ignoring the Great Firewall of China". Privacy Enhancing Technologies. Lecture Notes in Computer Science. Vol. 4258. p. 20. CiteSeerX 10
Internet censorship circumvention (4,278 words) [view diff] no match in snippet view article find links to article
2017). "A Usability Evaluation of Tor Launcher". Proceedings on Privacy Enhancing Technologies. 2017 (3): 90–109. doi:10.1515/popets-2017-0030. ISSN 2299-0984
PURB (cryptography) (1,495 words) [view diff] no match in snippet view article
Encrypted Files and Communication with PURBs" (PDF). Proceedings on Privacy Enhancing Technologies (PoPETS). 2019 (4): 6–33. arXiv:1806.03160. doi:10.2478/popets-2019-0056
Free Haven Project (928 words) [view diff] exact match in snippet view article find links to article
2014. Retrieved 3 June 2014. Oppliger, R. (October 2005). "Privacy-enhancing technologies for the world wide web". Computer Communications. 28 (16): 1791–1797
UNdata (265 words) [view diff] case mismatch in snippet view article find links to article
Data Repositories re3data.org. UNSD is the lead body for the Privacy-Enhancing Technologies Lab (PET Lab). The PET Lab together with the ITU AI for Good
Hal Finney (computer scientist) (1,239 words) [view diff] exact match in snippet view article
privacy and his significant contributions to the development of privacy-enhancing technologies. In 2004, Finney created the first reusable proof-of-work system
Domain fronting (2,456 words) [view diff] no match in snippet view article find links to article
communication through domain fronting" (PDF). Proceedings on Privacy Enhancing Technologies. 2015 (2): 46–64. doi:10.1515/popets-2015-0009. ISSN 2299-0984
Darknet (1,483 words) [view diff] no match in snippet view article find links to article
Christian; Kügler, Dennis (2003). Dingledine, Roger (ed.). Privacy Enhancing Technologies Third International Workshop (PET 2003). Springer-Verlag (Heidelberg)
TCP reset attack (1,099 words) [view diff] no match in snippet view article find links to article
Philippe (eds.). Ignoring the Great Firewall of China (PDF). Privacy Enhancing Technologies. Lecture Notes in Computer Science. Vol. 4258. Cambridge, UK:
Jean-Pierre Hubaux (2,247 words) [view diff] case mismatch in snippet view article find links to article
(2021). "Revolutionizing Medical Data Sharing Using Advanced Privacy-Enhancing Technologies: Technical, Legal, and Ethical Synthesis". Journal of Medical
Simone Fischer-Hübner (329 words) [view diff] no match in snippet view article find links to article
Swedish Forum för Dataskydd, advisory board member of PETS (Privacy Enhancing Technologies Symposium) and NordSec, and coordinator of the Swedish IT Security
Device fingerprint (3,940 words) [view diff] no match in snippet view article find links to article
Unique Is Your Web Browser?". In Atallah MJ, Hopper NJ (eds.). Privacy Enhancing Technologies. Lecture Notes in Computer Science. Springer Berlin Heidelberg
Roger Dingledine (1,306 words) [view diff] no match in snippet view article find links to article
Haven Project: Distributed anonymous storage service. Designing Privacy Enhancing Technologies. Springer Berlin/Heidelberg. pp. 67–95. CiteSeerX 10.1.1.420
Caspar Bowden (2,730 words) [view diff] no match in snippet view article find links to article
prepared to wrestle with the user unfriendly inconveniences of privacy enhancing technologies, as the almost meltdown of his laptop, four minutes into his
SilverPush (946 words) [view diff] no match in snippet view article find links to article
the Ultrasound Ecosystem" (PDF). ubeacsec.org. Proceedings on Privacy Enhancing Technologies. Retrieved 26 November 2017. Cimpanu, Catalin. "234 Android
Cynthia Dwork (1,225 words) [view diff] no match in snippet view article find links to article
In 2009, she won the PET Award for Outstanding Research in Privacy Enhancing Technologies. In 2016, both the International Association for Cryptologic
Kenny Paterson (523 words) [view diff] no match in snippet view article find links to article
AlFardan on the Lucky 13 attack Award for Outstanding Research in Privacy Enhancing Technologies for work with Mihir Bellare and Phil Rogaway on the Security
David Cleevely (2,757 words) [view diff] case mismatch in snippet view article find links to article
one of the winners of the Challenge to Drive Innovation in Privacy-Enhancing Technologies that Reinforce Democratic Values, awarded by the United States
Apple Home (2,174 words) [view diff] no match in snippet view article find links to article
Bluetooth-Low-Energy Continuity Protocols". Proceedings in Privacy Enhancing Technologies. 1: 26–46 – via sciendo. Chin, Monica; Chang 2019-09-27T15:27:35Z
Caldicott Report (933 words) [view diff] no match in snippet view article find links to article
used. Where particularly sensitive information is transferred, privacy enhancing technologies (e.g. encrypting identifiers or "patient identifying information")
Great Firewall (7,723 words) [view diff] no match in snippet view article find links to article
"Ignoring the great firewall of china". International Workshop on Privacy Enhancing Technologies. Mozur, Paul (13 September 2015). "Baidu and CloudFlare Boost
Vitaly Shmatikov (453 words) [view diff] no match in snippet view article find links to article
received the Caspar Bowden PET Award for Outstanding Research in Privacy Enhancing Technologies in 2008, 2014, and 2018. He received the Test of Time award
Riffle (anonymity network) (444 words) [view diff] no match in snippet view article
Communication System With Strong Anonymity" (PDF). Proceedings on Privacy Enhancing Technologies. 2: 115–134. doi:10.1515/popets-2016-0008. hdl:1721.1/128773
Norman Sadeh (2,964 words) [view diff] exact match in snippet view article find links to article
refine machine learning models. Sadeh is most known for AI-based privacy-enhancing technologies, including privacy assistants, automated privacy compliance
Smart speaker (1,682 words) [view diff] no match in snippet view article find links to article
Attitudes of Smart Speaker Users" (PDF). Sciendo. Proceedings on Privacy Enhancing Technologies. "Sarah Mennicken and Elaine M. Huang. 2012. Hacking the Natural
Web browsing history (2,186 words) [view diff] no match in snippet view article find links to article
Tracking Data in the Online Advertising Ecosystem”. Proceedings on Privacy Enhancing Technologies 2018(4): 85-103. "Visited: Securely collect browsing history
Van Eck phreaking (1,476 words) [view diff] no match in snippet view article find links to article
Eavesdropping Risks of Flat-Panel Displays" (PDF). 4th Workshop on Privacy Enhancing Technologies: 23–25. Kuhn, Markus G. (December 2003). "Compromising emanations:
Encryption (3,645 words) [view diff] no match in snippet view article find links to article
Encrypted Files and Communication with PURBs" (PDF). Proceedings on Privacy Enhancing Technologies (PoPETS). 2019 (4): 6–33. arXiv:1806.03160. doi:10.2478/popets-2019-0056
TCP Fast Open (935 words) [view diff] no match in snippet view article find links to article
Performance and Privacy for TLS over TCP Fast Open". Proceedings on Privacy Enhancing Technologies. 2020 (2): 271–287. arXiv:1905.03518. doi:10.2478/popets-2020-0027
Peter Eckersley (computer scientist) (1,468 words) [view diff] no match in snippet view article
Eckersley, Peter (2010). "How Unique Is Your Web Browser?". Privacy Enhancing Technologies. Lecture Notes in Computer Science. Springer. CiteSeerX 10.1
Email tracking (1,278 words) [view diff] no match in snippet view article find links to article
this! Privacy implications of email tracking". Proceedings on Privacy Enhancing Technologies. 2018 (1): 109–126. doi:10.1515/popets-2018-0006. Evers, Joris
GNUnet (2,141 words) [view diff] no match in snippet view article find links to article
Practical Anonymous Networking". In Dingledine, Roger (ed.). Privacy Enhancing Technologies. Lecture Notes in Computer Science. Vol. 2760. Springer Berlin
Private set intersection (706 words) [view diff] no match in snippet view article find links to article
Tiancheng (2022). "Updatable Private Set Intersection" (PDF). Privacy Enhancing Technologies'22:Proceedings. 2022 (2): 378–406. doi:10.2478/popets-2022-0051
Gender differences in social network service use (3,410 words) [view diff] no match in snippet view article find links to article
Awareness, Information Sharing, and Privacy on the Facebook". Privacy Enhancing Technologies. Lecture Notes in Computer Science. Vol. 4258. pp. 36–58. CiteSeerX 10
Cross-device tracking (4,463 words) [view diff] no match in snippet view article find links to article
Tracking: Measurement and Disclosures" (PDF). Proceedings on Privacy Enhancing Technologies. 2017 (2): 133–148. doi:10.1515/popets-2017-0020. "Comments
Hash-based cryptography (2,329 words) [view diff] no match in snippet view article find links to article
"HashWires: Hyperefficient Credential-Based Range Proofs". Privacy Enhancing Technologies Symposium (PETS) 2021. "Submission Requirements and Evaluation
Usable security (801 words) [view diff] no match in snippet view article find links to article
Steven J. (eds.), "Why Doesn't Jane Protect Her Privacy?", Privacy Enhancing Technologies, vol. 8555, Cham: Springer International Publishing, pp. 244–262
Kagi (search engine) (928 words) [view diff] no match in snippet view article
Bypassing Internet Challenges Anonymously". Proceedings on Privacy Enhancing Technologies. doi:10.1515/popets-2018-0026. ISSN 2299-0984. "Using Kagi with
Center for Research on Computation and Society (852 words) [view diff] exact match in snippet view article find links to article
typically with social aspects. These include social computing, privacy-enhancing technologies, encryption and data security, misinformation, machine learning
Venmo (3,519 words) [view diff] no match in snippet view article find links to article
Discovering privacy leaks in mobile social payments" (PDF). Privacy Enhancing Technologies. Retrieved March 11, 2022. McCaffrey, Peter Rudegeair and Orla
Library Freedom Project (1,826 words) [view diff] no match in snippet view article find links to article
privacy workshop in January 2016. The logos are those of assorted privacy enhancing technologies, institutions and advocacy groups such as the Tor project, the
Searchable symmetric encryption (2,431 words) [view diff] no match in snippet view article find links to article
(2019-01-01). "Breach-Resistant Structured Encryption". Proceedings on Privacy Enhancing Technologies. 2019 (1): 245–265. doi:10.2478/popets-2019-0014. S2CID 4047057
Privacy Sandbox (2,333 words) [view diff] no match in snippet view article find links to article
Beans? An Investigation Into Search Privacy". Proceedings on Privacy Enhancing Technologies. 2022 (2): 426–446. doi:10.2478/popets-2022-0053. ISSN 2299-0984
DNS over HTTPS (2,938 words) [view diff] no match in snippet view article find links to article
"Oblivious DNS: Practical Privacy for DNS Queries" (PDF). Privacy Enhancing Technologies. 2019 (2): 228–244. arXiv:1806.00276. doi:10.2478/popets-2019-0028
Ultrasound (6,163 words) [view diff] no match in snippet view article find links to article
Privacy and Security of the Ultrasound Ecosystem". Proceedings on Privacy Enhancing Technologies. 2017 (2): 95–112. doi:10.1515/popets-2017-0018. Part II, industrial
Ali Dehghantanha (1,599 words) [view diff] no match in snippet view article find links to article
Dehghantanha built a framework that models the impacts of adopting Privacy Enhancing Technologies (PETs) on the performance of SMEs in Canada. He has also created
Pirate Party (4,192 words) [view diff] exact match in snippet view article find links to article
these parties strongly defend open-source, decentralized and privacy-enhancing technologies such as blockchain, cryptocurrencies as an alternative to state
Private information retrieval (2,184 words) [view diff] no match in snippet view article find links to article
Information Retrieval from Homomorphic Encryption". Proceedings on Privacy Enhancing Technologies 2015. Vol. 2015. DE GRUYTER. pp. 222–243. doi:10.1515/popets-2015-0016
Oblivious data structure (1,344 words) [view diff] no match in snippet view article find links to article
Secure Computation". 13th International Symposium, PETS 2013. Privacy Enhancing Technologies Symposium. Bloomington, IN. doi:10.1007/978-3-642-39077-7_1
VPN service (3,746 words) [view diff] no match in snippet view article find links to article
and DNS Hijacking in Commercial VPN clients". Proceedings on Privacy Enhancing Technologies. 2015 (1): 77–91. doi:10.1515/popets-2015-0006. hdl:10044/1/56834
Deniable encryption (2,867 words) [view diff] no match in snippet view article find links to article
plausibly-deniable file system for NAND flash". Proceedings on Privacy Enhancing Technologies. 2020 (4): 239–254. doi:10.2478/popets-2020-0071. ISSN 2299-0984
Computer and network surveillance (5,098 words) [view diff] no match in snippet view article find links to article
Eavesdropping Risks of Flat-Panel Displays" (PDF). 4th Workshop on Privacy Enhancing Technologies. Toronto: 23–25. Asonov, Dmitri; Agrawal, Rakesh (2004), Keyboard
Dark pattern (3,715 words) [view diff] no match in snippet view article find links to article
Dark Strategies and Privacy Dark Patterns". Proceedings on Privacy Enhancing Technologies. 2016 (4): 237–254. doi:10.1515/popets-2016-0038. ISSN 2299-0984
Quad9 (2,949 words) [view diff] no match in snippet view article find links to article
"Oblivious DNS: Practical Privacy for DNS Queries". Proceedings on Privacy Enhancing Technologies. 2019 (2): 228–244. arXiv:1806.00276. doi:10.2478/popets-2019-0028
Golden Shield Project (3,376 words) [view diff] no match in snippet view article find links to article
PET'06: Proceedings of the 6th international conference on Privacy Enhancing Technologies, Springer-Verlag (2006), pages 20-35, ISBN 3-540-68790-4, doi:10
Domain Name System (9,812 words) [view diff] no match in snippet view article find links to article
"Oblivious DNS: Practical Privacy for DNS Queries" (PDF). Privacy Enhancing Technologies. 2019 (2): 228–244. arXiv:1806.00276. doi:10.2478/popets-2019-0028
Crowds (anonymity network) (2,639 words) [view diff] no match in snippet view article
Syverson (ed.). "Towards measuring anonymity". Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Springer-Verlag, LNCS 2482. Archived from
Transmission Control Protocol (12,952 words) [view diff] no match in snippet view article find links to article
Performance and Privacy for TLS over TCP Fast Open". Proceedings on Privacy Enhancing Technologies. 2020 (2): 271–287. arXiv:1905.03518. doi:10.2478/popets-2020-0027
Stylometry (6,675 words) [view diff] no match in snippet view article find links to article
Automated Authorship Obfuscation using Mutant-X". Proceedings on Privacy Enhancing Technologies. 2019 (4): 54–71. doi:10.2478/popets-2019-0058. S2CID 197621394
Adversarial stylometry (3,785 words) [view diff] no match in snippet view article find links to article
Automated Authorship Obfuscation using Mutant-X". Proceedings on Privacy Enhancing Technologies. 2019 (4): 54–71. doi:10.2478/popets-2019-0058. S2CID 197621394
Targeted advertising (9,815 words) [view diff] no match in snippet view article find links to article
Mohamed-Ali; Tran, Minh-Dung (2012). "Betrayed by Your Ads!". Privacy Enhancing Technologies. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer
Submarine communications cable (12,763 words) [view diff] no match in snippet view article find links to article
communication, trust, MLATs, and undersea cables. Proceedings on Privacy Enhancing Technologies, 2015(1), 4–24. https://doi.org/10.1515/popets-2015-0002 Jonathan
Firefox (17,314 words) [view diff] no match in snippet view article find links to article
HTTP Strict Transport Security in Tor Browser". Proceedings on Privacy Enhancing Technologies: 345. doi:10.56553/popets-2024-0020. ISSN 2299-0984. Archived
Human bycatch (3,344 words) [view diff] no match in snippet view article find links to article
Privacy Perceptions of Civilian Drones in The US". Proceedings on Privacy Enhancing Technologies. 2016 (3): 172–190. doi:10.1515/popets-2016-0022. Yoo, Wonsang;
Click tracking (3,394 words) [view diff] no match in snippet view article find links to article
this! Privacy implications of email tracking". Proceedings on Privacy Enhancing Technologies. 1: 109–126. doi:10.1515/popets-2018-0006. S2CID 41532115. Binns
Identity replacement technology (3,954 words) [view diff] no match in snippet view article find links to article
"Olympus: Sensor Privacy through Utility Aware Obfuscation". Proceedings on Privacy Enhancing Technologies. 2019 (1): 5–25. doi:10.2478/popets-2019-0002.
Alondra Nelson (5,857 words) [view diff] exact match in snippet view article find links to article
science and technology innovation, artificial intelligence, privacy-enhancing technologies, and public health measures such as indoor air quality for COVID-19
Wearable technology (13,360 words) [view diff] no match in snippet view article find links to article
analysis of menstrual app privacy policies". Proceedings on Privacy Enhancing Technologies. 2020 (4): 491–510. doi:10.2478/popets-2020-0083. ISSN 2299-0984
Cathode-ray tube (29,219 words) [view diff] no match in snippet view article find links to article
"Electromagnetic Eavesdropping Risks of Flat-Panel Displays". Privacy Enhancing Technologies. Lecture Notes in Computer Science. Vol. 3424. Berlin, Heidelberg:
DNA encryption (4,435 words) [view diff] case mismatch in snippet view article find links to article
Retrieved 2017-11-03. Ayday E, Raisaro JL, Hubaux JP (2012). "Privacy-Enhancing Technologies for Medical Tests Using Genomic Data". {{cite journal}}: Cite
Network Coordinate System (2,218 words) [view diff] no match in snippet view article find links to article
Anonymous Routing". In Goldberg, Ian; Atallah, Mikhail J. (eds.). Privacy Enhancing Technologies. Lecture Notes in Computer Science. Vol. 5672. Berlin, Heidelberg:
Children's Online Privacy Protection Act (5,562 words) [view diff] no match in snippet view article find links to article
Examining COPPA Compliance at Scale" (PDF). Proceedings on Privacy Enhancing Technologies. 2018 (3): 63–83. doi:10.1515/popets-2018-0021. S2CID 4935390
Cross-site leaks (7,518 words) [view diff] no match in snippet view article find links to article
Headers to Identify and Track Online Users". Proceedings on Privacy Enhancing Technologies. 2021 (2): 391–406. doi:10.2478/popets-2021-0033. hdl:20.500
List of Cornell University alumni (natural sciences) (17,418 words) [view diff] no match in snippet view article
Dijkstra Prize (2007), the PET Award for Outstanding Research in Privacy Enhancing Technologies (2009) Lauren Elliott (attended 3 years, transferred) – video