-
Notifications
You must be signed in to change notification settings - Fork 0
/
references.bib
84 lines (76 loc) · 2.89 KB
/
references.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
@article{DBLP:journals/popets/HarkousRKA16,
author = {Hamza Harkous and Rameez Rahman and Bojan Karlas and Karl Aberer},
journal = {PoPETs},
number = {4},
pages = {123--143},
title = {The Curious Case of the {PDF} Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps},
volume = {2016},
year = {2016},
}
@inproceedings{DBLP:conf/nordsec/Kani-ZabihiH11,
author = {Elahe Kani{-}Zabihi and Martin Helmhout},
booktitle = {NordSec},
pages = {131--148},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
title = {Increasing Service Users' Privacy Awareness by Introducing On-Line Interactive Privacy Features},
volume = {7161},
year = {2011}
}
@article{DBLP:journals/ivs/GrahamK10,
author = {Martin Graham and Jessie B. Kennedy},
journal = {Information Visualization},
number = {4},
pages = {235--252},
title = {A survey of multiple tree visualisation},
volume = {9},
year = {2010},
}
@inproceedings{DBLP:conf/icccn/PanchenkoWPA09,
author = {Andriy Panchenko and Benedikt Westermann and Lexi Pimenidis and Christer Andersson},
booktitle = {{ICCCN}},
pages = {1--7},
publisher = {{IEEE} Computer Society},
title = {{SHALON:} Lightweight Anonymization Based on Open Standards},
year = {2009}
}
@article{DBLP:journals/corr/PerinoSV16,
author = {Diego Perino and Claudio Soriente and Matteo Varvello},
journal = {CoRR},
title = {Your Are \enquote{Proxy} And {I} Know It},
volume = {abs/1612.06126},
year = {2016},
}
@article{DBLP:journals/ejisec/HusakCJC16,
author = {Martin Hus{\'{a}}k and Milan Cerm{\'{a}}k and Tom{\'{a}}s Jirs{\'{\i}}k and Pavel Celeda},
journal = {{EURASIP} J. Information Security},
pages = {6},
title = {{HTTPS} traffic analysis and client identification using passive {SSL/TLS} fingerprinting},
volume = {2016},
year = {2016},
}
@inproceedings{DBLP:conf/pet/Eckersley10,
author = {Peter Eckersley},
booktitle = {Privacy Enhancing Technologies},
pages = {1--18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
title = {How Unique Is Your Web Browser?},
volume = {6205},
year = {2010},
}
@techreport{securekeyvaluestorage-whitepaper,
author = {Maximilian Blochberger},
month = {1},
title = {Key-value Storage with Cryptographic Client-separation},
type = {White paper},
url = {https://github.com/AppPETs/SecureKeyValueStorage-Whitepaper},
year = {2019},
}
@online{Krause:2017,
author = {Felix Krause},
month = {10},
title = {iOS Privacy: detect.location - An easy way to access the user's iOS location data without actually having access},
url = {https://krausefx.com/blog/ios-privacy-detectlocation-an-easy-way-to-access-the-users-ios-location-data-without-actually-having-access},
year = {2017},
}