PGLP: Customizable and Rigorous Location Privacy Through Policy Graph

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ESORICS (25. : 2020 : Online) Computer Security – ESORICS 2020 ; Part 1
1. Verfasser: Cao, Yang (VerfasserIn)
Weitere Verfasser: Xiao, Yonghui (VerfasserIn), Takagi, Shun (VerfasserIn), Xiong, Li (VerfasserIn), Yoshikawa, Masatoshi (VerfasserIn), Shen, Yilin (VerfasserIn), Liu, Jinfei (VerfasserIn), Jin, Hongxia (VerfasserIn), Xu, Xiaofeng (VerfasserIn)
Pages:2020
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment 2020 Ning, Jianting
Deduplication-Friendly Watermarking for Multimedia Data in Public Clouds 2020 You, Weijing
Anonymity Preserving Byzantine Vector Consensus 2020 Cachin, Christian
Understanding the Security Risks of Docker Hub 2020 Liu, Peiyu
Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems 2020 Zhang, Yihe
Polisma - A Framework for Learning Attribute-Based Access Control Policies 2020 Jabal, Amani Abu
Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage 2020 Cardaioli, Matteo
DANTE: A Framework for Mining and Monitoring Darknet Traffic 2020 Cohen, Dvir
Efficient Quantification of Profile Matching Risk in Social Networks Using Belief Propagation 2020 Halimi, Anisa
CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks 2020 Humayed, Abdulmalik
Similarity of Binaries Across Optimization Levels and Obfuscation 2020 Jiang, Jianguo
Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening 2020 Jiang, Weipeng
PrivColl: Practical Privacy-Preserving Collaborative Machine Learning 2020 Zhang, Yanjun
LegloT: Ledgered Trust Management Platform for IoT 2020 Neureither, Jens
Where Are You Bob? Privacy-Preserving Proximity Testing with a Napping Party 2020 Oleynikov, Ivan
Bulwark: Holistic and Verified Security Monitoring of Web Protocols 2020 Veronese, Lorenzo
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing 2020 Agrawal, Shweta
Designing Reverse Firewalls for the Real World 2020 Bossuat, Angele
Dynamic and Secure Memory Transformation in Userspace 2020 Lyerly, Robert
Zipper Stack: Shadow Stacks Without Shadow 2020 Li, Jinfeng
Alle Artikel auflisten