Filtrer vos résultats
- 7
- 5
- 9
- 1
- 1
- 1
- 1
- 12
- 1
- 3
- 2
- 2
- 1
- 3
- 12
- 12
- 6
- 5
- 5
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
12 résultats
|
|
triés par
|
|
Online Social Networks : Is it the end of Privacy ?Social and Information Networks [cs.SI]. Université de Grenoble, 2014. English. ⟨NNT : 2014GRENM017⟩
Thèse
tel-01548974v2
|
||
|
Digging into anonymous traffic: A deep analysis of the Tor anonymizing networkNetwork and System Security (NSS), 2010 4th International Conference on, Sep 2010, Melbourne, Australia. pp.167--174, ⟨10.1109/NSS.2010.47⟩
Communication dans un congrès
hal-00748233v1
|
||
You Are What You Like! Information Leakage Through Users' InterestsNDSS Symposium 2012 - 19th Annual Network and Distributed System Security Symposium, Feb 2012, San Diego, United States. pp.1-14
Communication dans un congrès
hal-00748162v1
|
|||
|
OMEN: Faster Password Guessing Using an Ordered Markov EnumeratorInternational Symposium on Engineering Secure Software and Systems, Mar 2015, milan, Italy
Communication dans un congrès
hal-01112124v1
|
||
|
Big friend is watching you: analyzing online social networks tracking capabilitiesSIGCOMM 2012 - ACM Special Interest Group on Data Communication, Workshop on online social networks, Aug 2012, Helsinki, Finland. pp.7-12, ⟨10.1145/2342549.2342552⟩
Communication dans un congrès
hal-00748155v1
|
||
|
A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information?PAM 2014 - 15th International Conference on Passive and Active Measurement, Mar 2014, Los Angeles, United States
Communication dans un congrès
hal-00939175v1
|
||
|
Privacy in Content-Oriented Networking: Threats and CountermeasuresComputer Communication Review, 2013, pp.167--174
Article dans une revue
hal-00939179v1
|
||
|
How Much is too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile UniquenessPETS 2013, The 13th Privacy Enhancing Technologies Symposium, Jul 2013, Blommington, United States. pp.225--244, ⟨10.1007/978-3-642-39077-7_12⟩
Communication dans un congrès
hal-01187208v1
|
||
Censorship in the Wild: Analyzing Internet Filtering in SyriaInternet Measurement Conference (IMC), Nov 2014, Vancouver, BC, Canada, Canada
Communication dans un congrès
hal-01052581v1
|
|||
|
De-anonymizing BitTorrent Users on TorPoster accepted at the 7th USENIX Symposium on Network Design and Implementation (NSDI '10), Apr 2010, San Jose, CA, United States
Communication dans un congrès
inria-00471177v1
|
||
|
Compromising Tor Anonymity Exploiting P2P Information Leakage[Research Report] 2010
Rapport
inria-00471556v1
|
||
|
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor UsersLETT'11 - 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, Mar 2011, Boston, United States
Communication dans un congrès
inria-00574178v1
|