| ISBN | 出版时间 | 包装 | 开本 | 页数 | 字数 |
|---|---|---|---|---|---|
| 未知 | 暂无 | 暂无 | 未知 | 0 | 暂无 |
Privacy Vulnerabilities in Encrypted HTTP Streams
An Analysis of Parallel Mining with Attacker-Contrilled Inputs
Message Splitting Against the Partial Adversary
Location Privacy for Cellular Systems;Analysis and Solution
Failures in a Hybrid Content Blocking System
Anonymity Preserving Techniques in Trust Negotiations
Unmixing Mix Traffic
Mix-Network with Stronger Security
Covert Channels in IPv6
Towards Privacy-Aware eLearning
Anonymization of IP Traffic Monitoring Data;Attacks on Two Prefix-Presering Anonymization Schemes and Some Proposed Remedies
Privacy Issues in Vehicular Ad Hoc Networks
High-Power Proxies for Enhancing RFID Privacy and Utility
Integrating Utility into Face De-identification
Privacy in India;Attitrdes and Awraness
Economics of Isentity Management:A Supply-Side Perspestive
Author Index