default search action
WPES 2010: Chicago, Illinois, USA
- Ehab Al-Shaer, Keith B. Frikken:
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, WPES 2010, Chicago, Illinois, USA, October 4, 2010. ACM 2010, ISBN 978-1-4503-0096-4
Privacy attacks, risks, countermeasures
- Max Schuchard, Alexander W. Dean, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim:
Balancing the shadows. 1-10 - Iasonas Polakis, Georgios Kontaxis, Spyros Antonatos, Eleni Gessiou, Thanasis Petsas, Evangelos P. Markatos:
Using social networks to harvest email addresses. 11-20 - Arthur U. Asuncion, Michael T. Goodrich:
Turning privacy leaks into floods: surreptitious discovery of social network friendships and other sensitive binary attribute vectors. 21-30
Privacy protocols
- Paolo Gasti, Giuseppe Ateniese, Marina Blanton:
Deniable cloud storage: sharing files via public-key deniability. 31-42 - Nicholas L. Farnan, Adam J. Lee, Ting Yu:
Investigating privacy-aware distributed query evaluation. 43-52 - Zi Lin, Nicholas Hopper:
Jack: scalable accumulator-based nymble system. 53-62
Privacy specifications/policies
- Aleecia M. McDonald, Lorrie Faith Cranor:
Americans' attitudes about internet behavioral advertising practices. 63-72 - Henry DeYoung, Deepak Garg, Limin Jia, Dilsun Kirli Kaynar, Anupam Datta:
Experiences in the logical specification of the HIPAA and GLBA privacy laws. 73-82 - Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Pierangela Samarati:
Supporting privacy preferences in credential-based interactions. 83-92 - Pedro Giovanni Leon, Lorrie Faith Cranor, Aleecia M. McDonald, Robert McGuire:
Token attempt: the misrepresentation of website privacy policies through the misuse of p3p compact policy tokens. 93-104
Short papers
- Richard Chow, Jessica Staddon:
A framework for privacy-conducive recommendations. 105-108 - Yao Chen, Radu Sion:
On securing untrusted clouds with cryptography. 109-114 - Reza Shokri, Carmela Troncoso, Claudia Díaz, Julien Freudiger, Jean-Pierre Hubaux:
Unraveling an old cloak: k-anonymity for location privacy. 115-118 - Stefan Popoveniuc, Richard Carback:
Clearvote: an end-to-end voting system that distributes privacy between printers. 119-122 - Kazuhiro Minami, Nikita Borisov:
Protecting location privacy against inference attacks. 123-126
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.