Privacy

Title Speakers Conference Tags
SnapMe if you can: Privacy Threats of other Peoples' Geo-tagged Media and What We can do about it Matthew Smith , Benjamin Henne , Christian Szongott WiSec-2013 - Budapest,Hungary Privacy Defence
WEB TRACKING FOR YOU Gregory Fleischer BlackHat USA-2012 - Las Vegas, USA Privacy Tracking
Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns Claude Castelluccia , Lukasz Olejnik , Artur Janc Privacy Enhancing Technologies Symposium-2012 - Vigo, Spain Privacy Browser
Introduction to Mobile Snitch Luiz 'effffn' Eduardo CONFidence-2012 - Krakow, Poland Privacy
Are You Receiving Me? Recent Issues In Wifi Privacy Tara Whalen ShmooCon-2011 - Washington DC, USA Security Privacy
Financing The Revolution: Safe And Private Value Transactions With Digital Cash Jeffery ( sneak ) Paul Berlinsides-2010 - Berlin, Germany Security Anonymity Privacy
Contemporary Profiling Of Web Users Dominik Herrmann , Lexi Pimendis Chaos Communication Congress-27 - Berlin, Germany Anonymity Privacy
Whistleblowing Johannes Ludwig , Whistleblower-netzwerk Chaos Communication Congress-27 - Berlin, Germany Anonymity Privacy
Peace Be With Your Data Jochim Selzer Chaos Communication Congress-27 - Berlin, Germany Privacy
Privacy Of File Sharing Service Nikos Nikiforakis OWASP BeNelux-2010 - Netherlands Security Privacy
Nonymity, Privacy, And Circumvention With Tor In The Real World Sebastian Hahn SOURCE Barcelona-2010 - Barcelona, Spain Security Anonymity Privacy
How I Met Your Girlfriend Samy Kamkar LASCON-2010 - Austin, USA Mobile Security Web Firewall Privacy Risk
Tell Me Your Ip And I Will Tell You Who You Are Noa Bar-yosef LASCON-2010 - Austin, USA Security Web Privacy
Web Application Security As A Measure To Protect More Personal Data - A Draft Top10 Of Data Protection Daniel Bartschies , Ingo Hanke OWASP Appsec-2010 - Germany Security Web Application Security Anonymity Privacy
Project Skylab 1.0: Helping You Get Your Cloud On Craig Balding BruCON-2010 - Brussels, Belgium Security Web Privacy
Cyber [Crime|War] - Connecting The Dots Ian Amit BruCON-2010 - Brussels, Belgium Security Deep Knowledge Intrusion Detection Incident Response Privacy
How I Met Your Girlfriend Samy Kamkar OWASP Appsec-2010 - USA Security Web Anonymity Privacy Browser
How to stay invisible (while still using cellphones) Kugg SEC-T-2010 - Stockholm, Sweden Security Privacy Mobile Security
Anonymity And Integrity Oriented Collaboration Yuval Elovici CollSec-2010 - Washington DC, USA Security Anonymity Privacy
Privacy Tara Whalen 19th USENIX Security Symposium-2010 - Washington DC, USA Security Privacy
Security And Privacy Vulnerabilities Of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study Ishtiaq Rouf , Rob Miller , Hossen Mustafa , Travis Taylor , Sangho Oh , Wenyuan Xu , Marco Gruteser , Wade Trappe , Ivan Seskar 19th USENIX Security Symposium-2010 - Washington DC, USA Security Wireless Privacy Monitoring
Medical Device Security And Privacy John F. Murray , Nathanael Paul , Karen Sandler HealthSec-2010 - Washington DC, USA Security Privacy Hardware General
Protecting E-Healthcare Client Devices Against Malware And Physical Theft Daisuke Mashima , Abhinav Srivastava , Jonathon Giffin , Mustaque Ahamad HealthSec-2010 - Washington DC, USA Security Privacy Hardware General
Can I Access Your Data? Privacy Management In Mhealth Aarathi Prasad , David Kotz HealthSec-2010 - Washington DC, USA Security Privacy Business
Privacy Challenges In Patient-Centric Health Information Systems John C. Mitchell , Anupam Datta , Nipun Dave , Helen Nissenbaum , Divya Sharma HealthSec-2010 - Washington DC, USA Security Privacy
Privacy Challenges For Wireless Medical Devices Brent Lagesse HealthSec-2010 - Washington DC, USA Security Wireless Privacy
A Risk Management Framework For Health Care Data Anonymization Tyrone Grandison , Murat Kantarcioglu HealthSec-2010 - Washington DC, USA Security Anonymity Privacy
Fine-Grained Sharing Of Health Records Using Xspa Profile For Xacml—An Extended Abstract A. Al-fares , B. Yu , K. Moidu , Angelos Stavrou , Duminda Wijesekera , Anoop Singhal HealthSec-2010 - Washington DC, USA Security Access Control Access Privacy
Gaming In The Glass Safe - Gamesdrm &Amp; Privacy Ferdinand Schober DEF CON-18 - Las Vegas, USA Security Privacy
Hacking Facebook Privacy Chris Conley DEF CON-18 - Las Vegas, USA Security Privacy
Hijacking Mobile Data Connections: State Of The Art Roberto Gassira , Roberto Piccirillo HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Mobile Security Security Routing Privacy
Attacking Phone Privacy Karsten Nohl Blackhat USA-2010 - Las Vegas, USA Security Privacy
Extreme-Range Rfid Tracking Chris Paget Blackhat USA-2010 - Las Vegas, USA Security Privacy
Changing Threats To Privacy: From Tia To Google Moxie Marlinespike Blackhat USA-2010 - Las Vegas, USA Security Infrastructure Privacy Community
Carmen Sandiego Is On The Run! Don Bailey , Nick Depetrillo Blackhat USA-2010 - Las Vegas, USA Security Privacy
On The Privacy Of File Sharing Services Nikos Nikiforakis , Wouter Joosen , Yves Younan , F Gadaleta OWASP Appsec-2010 - Stocholm, Sweden Security Privacy
Information Privacy As A Business Risk In Mexico Victor Chapella OWASP Day Mexico-2010 - Mexico Privacy
“Alice Shares, Eve Reads: Enumerating File Hosting Services”, Nikos Nikiforakis AthCon-2010 - Athens, Greece Security Anonymity Privacy
From Tia To Google: Modern Threats To Privacy Moxie Marlinspike ITWeb Security Summit-2010 - Johannesburg, South Africa Privacy
The Security Implications Of The Ppi Bill: An End User'S Perspective Ritasha Jethva ITWeb Security Summit-2010 - Johannesburg, South Africa Others Privacy Business
Dns Prefetching And Its Privacy Implications: When Good Things Go Bad Srinivas Krishnan , Fabian Monrose 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2010 - San Jose, USA Security DNS Privacy
Legal Aspects Of Computer Network Security And Privacy Robert Clark SOURCE Boston-2010 - Boston, USA Security Privacy Legal
Anonymity, Privacy, And Circumvention With Tor In The Real World Jake Appelbaum , Moxie Marlinspike SOURCE Boston-2010 - Boston, USA Security Infrastructure Privacy Community
Protecting Customers From Online Threats Allison Miller SOURCE Boston-2010 - Boston, USA Security Web Privacy
Surviving Your Phone: Protecting Mobile Communications With Tor Marco Bonetti Blackhat Europe-2010 - Barcelona, Spain Security Privacy Business Development Browser
Changing Threats To Privacy: From Tia To Google Moxie Marlinspike Blackhat Europe-2010 - Barcelona, Spain Security Privacy
How I Learned To Stop Worrying And Love Losing My Personal Privacy. Or The Google-Induced Personal Privacy Slow-Leak. Anonymous Speaker Security B-Sides Austin-2010 - Austin, USA Security Anonymity Privacy
Privacy &Amp; Stylometry Mike Brennan Chaos Communication Congress-26 - Berlin, Germany Security Privacy
Custom Intrusion Detection Techniques For Monitoring Web Applications Matthew Olney OWASP Appsec-2009 - Washington DC, USA Web Anonymity Privacy Monitoring
Appsecdc09 Federal Ciso Panel Earl Crane , Gary Galloway , Timothy Ruland , Richard Smith OWASP Appsec-2009 - Washington DC, USA Privacy
The Bad Guys Are Winning: So Now What? Ed Skoudis HITBSecConf Malaysia-2009 - Kuala Lampur, Malaysia Security Privacy Malware Phishing
Knowing Me, Knowing You Brian Honan SOURCE Barcelona-2009 - Barcelona, Spain Security Privacy Legal
Attacks On Privacy Steven M. Bellovin 18th USENIX Security Symposium-2009 - Montreal, Canada Security Privacy
Xbook: Redesigning Privacy Control In Social Networking Platforms Wenke Lee , Kapil Singh , Sumeer Bhola 18th USENIX Security Symposium-2009 - Montreal, Canada Security Privacy
Vanish: Increasing Data Privacy With Self-Destructing Data Tadayoshi Kohno , Roxana Geambasu , Amit A. Levy , Henry M. Levy 18th USENIX Security Symposium-2009 - Montreal, Canada Security Privacy
Vpriv: Protecting Privacy In Location-Based Vehicular Services Raluca Ada Popa , Hari Balakrishnan , Mandrew J. Blumberg 18th USENIX Security Symposium-2009 - Montreal, Canada Security Privacy
Keynote: Privacy Protecting People Or People Protecting Privacy Lord Erroll Blackhat Europe-2009 - Barcelona, Spain Security Privacy
I Can Haz Privacy David Mortman SOURCE Boston-2009 - Boston, USA Security Privacy
Cloud Compliance And Privacy Michael Dahn SOURCE Boston-2009 - Boston, USA Security Privacy Compliance Cloud
They Took My Laptop! - U.S. Search And Seizure Explained Tyler Pitchford ShmooCon-2009 - Washington DC, USA Security Privacy
The Privacy Workshop Project Christoph Brüning Chaos Communication Congress-25 - Berlin, Germany Security Privacy
Privacy In The Social Semantic Web Jan Torben Chaos Communication Congress-25 - Berlin, Germany Security Web Privacy
Embracing Post-Privacy Christian Plomlompom Chaos Communication Congress-25 - Berlin, Germany Security Privacy
An Introduction To New Stream Cipher Designs Tor E. Bjørstad Chaos Communication Congress-25 - Berlin, Germany Security Privacy
Hacking Data Retention: Small Sister Your Digital Privacy Self Defense Brenno De Winter DEF CON-16 - Las Vegas, USA Security Privacy
Web Privacy And Flash Local Shared Objects Clinton Wong DEF CON-16 - Las Vegas, USA Security Web Privacy
New Classes Of Security And Privacy Vulnerabilities For Implantable Wireless Medical Devices Tadayoshi Kohno , Kevin Fu Blackhat USA-2008 - Las Vegas, USA Security Wireless Privacy
Privacy Patrick Traynor 17th USENIX Security Symposium-2008 - San Jose, USA Security Privacy
The New York City Taxi System: Privacy Vs. Utility Nick Leghorn The Last HOPE-2008 - USA Security Privacy
Real Id Act And Rfid: Privacy And Legal Implications Tiffany Strauchs Rad The Last HOPE-2008 - USA Security Privacy Legal
Featured Speaker - Steven Rambam Steven Rambam The Last HOPE-2008 - USA Security Panel Privacy
Home Is Where The Heart Is? The Question Of Jurisdiction Douglas Spink The Last HOPE-2008 - USA Security Privacy Legal
Pseudonymization Methodologies: Personal Liberty Vs. The Greater Good Jon-michael C. Brook The Last HOPE-2008 - USA Security Privacy
Technical Surveillance Countermeasures (Tscm) - A Brief Primer On The Arcane Art And Science Of Electronics Surveillance And Ìbugî Detection Marty Kaiser The Last HOPE-2008 - USA Security Privacy
Warrantless Laptop Searches At U.S. Borders Decius The Last HOPE-2008 - USA Security Privacy Legal
The Data Went Down The Drain - Can Something Be Learned From The Lichtenstein Tax-Affair? Dror-john Roecher TROOPERS-2008 - Munich, German Security Privacy Media
Practical Hacker Crypto Simple Nomad ShmooCon-2008 - Washington DC, USA Security Anonymity Privacy
On The Social Responsibility Of Hackers Simple Nomad , Johnny Long , Bruce Potter , Rick Dakan , Tbd ShmooCon-2008 - Washington DC, USA Security Wireless Panel Privacy Community
Eu Policy On Rfid &Amp; Privacy Andreas Krisch Chaos Communication Congress-24 - Berlin, Germany Security Privacy
Privacy Paul Van Oorschot 16th USENIX Security Symposium-2007 - Boston, USA Security Privacy
Devices That Tell On You: Privacy Trends In Consumer Ubiquitous Computing T. Scott Saponas , Jonathan Lester , Carl Hartung , Sameer Agarwal , Tadayoshi Kohno 16th USENIX Security Symposium-2007 - Boston, USA Security Privacy
On Web Browsing Privacy In Anonymized Netflows S.e. Coull , Michael Collins , Christian Wright , Fabian Monrose , M.k. Reiter 16th USENIX Security Symposium-2007 - Boston, USA Security Web Privacy
The Human Factor In Online Fraud Markus Jakobsson 16th USENIX Security Symposium-2007 - Boston, USA Security Privacy Development
Exploiting Online Games Gary Mcgraw 16th USENIX Security Symposium-2007 - Boston, USA Security Privacy
Ipv6 Is Bad For Your Privacy Janne Lindqvist DEF CON-15 - Las Vegas, USA Security Privacy IPv6
Portable Privacy: Digital Munitions For The Privacy War Steve Topletz DEF CON-15 - Las Vegas, USA Security Privacy
Anonymous Authentication–Preserving Your Privacy Online Andrew Lindell Blackhat USA-2007 - Las Vegas, USA Security Privacy
A Dynamic Technique For Enhancing The Security And Privacy Of Web Applications Ariel Waissbein , Ezequiel D. Gutesman Blackhat USA-2007 - Las Vegas, USA Security Web Privacy
Securing The Tor Network Mike Perry Blackhat USA-2007 - Las Vegas, USA Security Wireless Anonymity Privacy Risk
Introduction To Human Natural Intelligence And A Cortical Primer Al Strowger CarolinaCon-3 - Raleigh, USA Security Privacy
Transparency And Privacy Caspar Bowden Chaos Communication Congress-23 - Berlin, Germany Security Privacy
Vehicular Communication And Vanets Frank Kargl Chaos Communication Congress-23 - Berlin, Germany Security Privacy
Data Retention Update Patrick Breyer , Ralf Bendrath , Rikke Frank Jørgensen Chaos Communication Congress-23 - Berlin, Germany Security Privacy Media
Us-Visit: Raping Personal Privacy Since 2004 Chris Paget DEF CON-14 - Las Vegas, USA Security Privacy
Privacy Is Dead - Get Over It Steven Rambam , Gerard Keenan , Reginald "Reggie" Montgomery , Kevin Noppinger , Kelly Riddle HOPE Number 6-2006 - USA Security Privacy
Privacy Is Dead - Get Over It Revisited Steven Rambam HOPE Number 6-2006 - USA Security Privacy
Privacy Through Technology: A Hands-On Paul Wouters , Aldert Hazenberg HOPE Number 6-2006 - USA Security Privacy
Rfid Privacy - Old Threats And New Attacks Karsten Nohl HOPE Number 6-2006 - USA Security Privacy
Separated By A Common Goal&Mdash;Emerging Eu And Us Information Security And Privacy Law:&Nbsp;Allies Or Adversaries? Amanda Hubbard Blackhat Europe-2006 - Amsterdam, The Netherlands Security Privacy
Playing Server Hide And Seek (Break It!) Lasse Overlier , Paul Syverson ShmooCon-2006 - Washington DC, USA Security Anonymity Access Privacy Workshops
Anonym.Os: Security And Privacy, Everywhere You Go (Build It!) Taylor Banks , Gavin Mead , Kevin Miller , Beth Milliken ShmooCon-2006 - Washington DC, USA Security Anonymity Access Privacy Monitoring Risk Legal Development
We Lost The War Rop Gonggrijp Chaos Communication Congress-22 - Berlin, Germany Security Privacy
Speaking Freely: The Security And Privacy Challenges Of Modern Communications The Grugq SyScan-2005 - Singapore Security Privacy
Attacking Internet Banking Applications Fabrice Marie SyScan-2005 - Singapore Security Privacy Business Development
Old Skewl Hacking-Infrared - How To Break Into The Hotel System Major Malfunction SyScan-2005 - Singapore Security Privacy Cryptography Legal
Ciso Q&Amp;A With Jeff Moss Justin Somaini Blackhat USA-2005 - Las Vegas, USA Security Others Panel Privacy
Cutlass - Encrypted, Peer-To-Peer Communications For Everyone Kathy Wang , Todd Macdermid , Jack Lloyd , Nash Foster ShmooCon-2005 - Washington DC, USA Privacy
Practical Privacy And Anonymity For Hackers Simple Nomad ShmooCon-2005 - Washington DC, USA Anonymity Privacy
Rfid: Security And Privacy For Five-Cent Computers Ari Juels 13th USENIX Security Symposium-2004 - San Diego, USA Security Privacy
Data Privacy William Aiello 13th USENIX Security Symposium-2004 - San Diego, USA Security Privacy
Privacy - Not What It Used To Be Steven Rambam The Fifth HOPE -2004 - USA Security Privacy
Automotive Networks Nothingface The Fifth HOPE -2004 - USA Security Privacy
Privacy, Economics And Immediate Gratification: Why Protecting Privacy Is Easy But Selling It Is Not Alessandro Acquisti Blackhat USA-2004 - Las Vegas, USA Security Privacy
The Black Hat Surveys Larry Ponemon Blackhat USA-2004 - Las Vegas, USA Security Privacy Community Analysis
Privacy Rights Management Using Drm: Is This A Good Idea? Larry Korba Blackhat Europe-2004 - Amsterdam, The Netherlands Security Privacy
At Risk! Privacy Lenard Kleinrock , Sally Richards DEF CON-11 - Las Vegas, USA Security Privacy
Post 9/11 Privacy John Q. Newman Blackhat USA-2003 - Las Vegas, USA Security Privacy
Digital Information, User Tokens, Privacy And Forensics Investigations: The Case Of Windows Xp Platform Larry Leibrock Blackhat Europe-2003 - Amsterdam, The Netherlands Security Privacy Forensics
Designing Useful Privacy Applications Len Sassaman Blackhat Europe-2003 - Amsterdam, The Netherlands Security Privacy
Lawful Interception Of Ip: The European Context Jaya Baloo Blackhat Europe-2003 - Amsterdam, The Netherlands Security Privacy Legal Development
Will People Ever Pay For Privacy? Adam Shostack Blackhat Europe-2003 - Amsterdam, The Netherlands Security Privacy Cryptography
Verisign Czag: Privacy Leak In X.509 Certificates Scott G. Renfro , Yahoo! 11th USENIX Security Symposium-2002 - San Francisco, USA Security Privacy
Post 9/11 Privacy John Q. Newman DEF CON-10 - Las Vegas, USA Security Privacy
Databases And Privacy Steven Rambam H2K2-2002 - USA Security Privacy
Protection For The Masses Rop Gonggrijp H2K2-2002 - USA Security Mail Privacy
Proximity Cards: How Secure Are They? Anonymous H2K2-2002 - USA Security Access Privacy
Securing Your Computing Environment To Conform To Privacy Regulations Robert Marotta , David Goldman Blackhat USA-2002 - Las Vegas, USA Security Anonymity Privacy
Forensic Dead-Ends: Tracing Users Through Anonymous Remailers Len Sassaman Blackhat USA-2002 - Las Vegas, USA Security Anonymity Privacy
Off-The-Record Messaging Ian Goldberg Blackhat USA-2002 - Las Vegas, USA Security Anonymity Privacy
The Usa Patriot Act And Criminal Investigations: What Service Providers Need To Know Mark Eckenwiler Blackhat USA-2002 - Las Vegas, USA Security Anonymity Privacy
Why Is Anonymity So Hard? Roger Dingledine Blackhat USA-2002 - Las Vegas, USA Security Anonymity Privacy
Arranging An Anonymous Rendezvous: Privacy Protection For Internet Servers Ian Goldberg Blackhat Asia-2002 - Tokyo, Japan Security Privacy
Big Brother Awards Padeluun , Erich Moechel , Umberto Anio , Daniel Boos , Rena Tangent Chaos Communication Congress-18 - Berlin, Germany Security Privacy
Privacy In The Age Of Customer Relationship Management (Crm) Carsten Pohle , Sarah Spiekermann Chaos Communication Congress-18 - Berlin, Germany Security Privacy
A Maze Of Twisty Little Statutes, All Alike: The Electronic Communications Privacy Act Of 1986(And Its Application To Network Service Providers) Mark Eckenwiler 10th USENIX Security Symposium-2001 - Washington DC, USA Security Privacy Legal
A Method For Fast Revocation Of Public Key Certificates And Security Capabilities Dan Boneh , Xuhua Ding , Gene Tsudik , Chi Ming Wong 10th USENIX Security Symposium-2001 - Washington DC, USA Security Privacy
Gateway Cryptography: Hacking Impossible Tunnels Through Improbable Networks With Openssh And The Gnu Privacy Guard Dan Kaminsky DEF CON-09 - Las Vegas, USA Security Privacy
Arranging An Anonymous Rendezvous: Privacy Protection For Internet Servers Ian Goldberg DEF CON-09 - Las Vegas, USA Security Privacy
Security &Amp; Privacy Are Critically Important Issues In Todays Digitally Connected Age. Sharad DEF CON-09 - Las Vegas, USA Security Privacy
Gateway Cryptography: Hacking Impossible Tunnels Through Improbable Networks With Openssh And The Gnu Privacy Guard. Dan Kaminsky Blackhat USA-2001 - Las Vegas, USA Security Privacy
Gnupg Gnu Privacy Guard - Project Introduction &Amp; Status Quo Werner Koch Chaos Communication Congress-17 - Berlin, Germany Security Privacy
10 Steps You Can Take To Protect Your Privacy John Q. Newman DEF CON-08 - Las Vegas, USA Security Privacy
Personal Privacy And Big Brother Databases John Q. Newman DEF CON-07 - Las Vegas, USA Security Privacy
Overview Of Certification Systems: X.509, Ca, Pgp And Skip. Ed Gerck Blackhat USA-1999 - Las Vegas, USA Security Privacy Community Legal
Zero-Knowledge Systems Will Release The First Complete Internet Privacy Utility For Consumers In September 1998. Ian Goldberg , Austin Hill DEF CON-06 - Las Vegas, USA Security Privacy
Ian Goldberg Cell Art Blackhat USA-1998 - Las Vegas, USA Security Privacy