167
Voted
WPES
15 years 8 months ago
2006 ACM
Many applications of mix networks such as anonymous Web browsing require relationship anonymity: it should be hard for the attacker to determine who is communicating with whom. Co...
105
Voted
WPES
15 years 8 months ago
2006 ACM
According to a famous study [10] of the 1990 census data, 87% of the US population can be uniquely identified by gender, ZIP code and full date of birth. This short paper revisit...
133
Voted
WPES
15 years 8 months ago
2006 ACM
Connections in distributed systems, such as social networks, online communities or peer-to-peer networks, form complex graphs. These graphs are of interest to scientists in field...
129
Voted
WPES
15 years 8 months ago
2006 ACM
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
114
click to vote
WPES
15 years 8 months ago
2006 ACM
This paper introduces results of a study into the value of location privacy for individuals using mobile devices. We questioned a sample of over 1200 people from five EU countrie...
|