Articles on Identity Protection
- Preventing Active Timing Attacks in Low-Latency Anonymous Communication
Joan Feigenbaum
, Aaron Johnson
and Paul Syverson
- TrackMeNot: Resisting Surveillance in Web Search
Daniel C. Howe
and Helen Nissenbaum
- A Model of Onion Routing with Provable Anonymity
Joan Feigenbaum
, Aaron Johnson
and Paul Syverson
- Probabilistic Analysis of Onion Routing
in a Black-box Model
Joan Feigenbaum
, Aaron Johnson
and Paul Syverson
- Private Web Search
Felipe Saint-Jean
, Aaron Johnson
, Dan Boneh
and Joan Feigenbaum
- Exposing private information by timing web applications
A. Bortz
, D. Boneh
and P. Nandy
- Towards Better Digital Identity Management
Alvaro Gutierrez
- Digital Identity Management on the Internet
Will Tsui
- Private encrypted content distribution using private broadcast
encryption
Adam Barth
, Dan Boneh
and Brent Waters
- Protecting Browser State from Web Privacy Attacks
Collin Jackson
, Andrew Bortz
, Dan Boneh
and John C. Mitchell
- Approximation Algorithms for k-Anonymity
Gagan Aggarwal
, Tomas Feder
, Krishnaram Kenthapadi
, Rajeev Motwani
, Rina Panigrahy
, Dilys Thomas
and An Zhu
- Stronger Password Authentication Using
Browser Extensions
Blake Ross
, Collin Jackson
, Nicholas Miyake
, Dan Boneh
and John C Mitchell
- Anonymizing Tables
Gagan Aggarwal
, Tomas Feder
, Krishnaram Kenthapadi
, Rajeev Motwani
, Rina Panigrahy
, Dilys Thomas
and An Zhu
- A Browser Plug-in Solution to the Unique Password Problem
Blake Ross
, Collin Jackson
, Nicholas Miyake
, Dan Boneh
and John C. Mitchell
- Privacy-Enhancing k-Anonymization of Customer Data
Sheng Zhong
, Zhiqiang Yang
and Rebecca N. Wright
- Client-side defense against web-based identity theft
Neil Chou
, Robert Ledesma
, Yuka Teraguchi
and John C. Mitchell
- k-Anonymity: Algorithms and Hardness
Gagan Aggarwal
, Tomas Feder
, Krishnaram Kenthapadi
, Rajeev Motwani
, Rina Panigrahy
, Dilys Thomas
and An Zhu
- A formal framework for positive and negative detection
Fernando Esponda
, Stephanie Forrest
and Paul Helman
- Toward Heirarchical Identity-Based Encryption
Jeremy Horwitz
and Ben Lynn
- Authenticated Identity-Based Encryption
Ben Lynn
Back to publications