ScrambleSuit: A polymorphic network protocol to circumvent censorship P Winter, T Pulls, J Fuss Proceedings of the 12th ACM workshop on Workshop on privacy in the …, 2013 | 150 | 2013 |
Efficient sparse merkle trees: Caching strategies and secure (non-) membership proofs R Dahlberg, T Pulls, R Peeters Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016 | 114 | 2016 |
Towards usable privacy policy display and management J Angulo, S Fischer‐Hübner, E Wästlund, T Pulls Information Management & Computer Security 20 (1), 4-17, 2012 | 97 | 2012 |
Usable transparency with the data track: a tool for visualizing data disclosures J Angulo, S Fischer-Hübner, T Pulls, E Wästlund Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human …, 2015 | 94 | 2015 |
Transparency, privacy and trust–technology for tracking and controlling my data disclosures: Does this work? S Fischer-Hübner, J Angulo, F Karegar, T Pulls Trust Management X: 10th IFIP WG 11.11 International Conference, IFIPTM 2016 …, 2016 | 75 | 2016 |
Distributed privacy-preserving transparency logging T Pulls, R Peeters, K Wouters Proceedings of the 12th ACM workshop on Workshop on privacy in the …, 2013 | 60 | 2013 |
The effect of dns on tor's anonymity B Greschbach, T Pulls, LM Roberts, P Winter, N Feamster arXiv preprint arXiv:1609.08187, 2016 | 57 | 2016 |
How can cloud users be supported in deciding on, tracking and controlling how their data are used? S Fischer-Hübner, J Angulo, T Pulls Privacy and Identity Management for Emerging Services and Technologies: 8th …, 2014 | 54 | 2014 |
Balloon: A forward-secure append-only persistent authenticated data structure T Pulls, R Peeters Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 49 | 2015 |
Website Fingerprinting with Website Oracles T Pulls, R Dahlberg Proc. Priv. Enhancing Technol. 2020 (1), 235-255, 2020 | 40 | 2020 |
How much privilege does an app need? Investigating resource usage of android apps (short paper) N Momen, T Pulls, L Fritsch, S Lindskog 2017 15th Annual Conference on Privacy, Security and Trust (PST), 268-2685, 2017 | 25 | 2017 |
Visualizing exports of personal data by exercising the right of data portability in the data track-are people ready for this? F Karegar, T Pulls, S Fischer-Hübner Privacy and Identity Management. Facing up to Next Steps: 11th IFIP WG 9.2 …, 2016 | 24 | 2016 |
Towards effective and efficient padding machines for Tor T Pulls arXiv preprint arXiv:2011.13471, 2020 | 20 | 2020 |
Towards Usable Privacy Policy Display & Management-The PrimeLife Approach. J Angulo, S Fischer-Hübner, T Pulls, E Wästlund HAISA, 108-118, 2011 | 18 | 2011 |
HCI for policy display and administration J Angulo, S Fischer-Hübner, T Pulls, U König Privacy and Identity Management for Life, 261-277, 2011 | 17 | 2011 |
Insynd: Improved privacy-preserving transparency logging R Peeters, T Pulls Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 16 | 2016 |
Adding secure transparency logging to the prime core H Hedbom, T Pulls, P Hjärtquist, A Lavén IFIP PrimeLife International Summer School on Privacy and Identity …, 2009 | 16 | 2009 |
Engineering privacy by design: lessons from the design and implementation of an identity wallet platform F Veseli, JS Olvera, T Pulls, K Rannenberg Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1475-1483, 2019 | 14 | 2019 |
Verifiable light-weight monitoring for certificate transparency logs R Dahlberg, T Pulls Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway …, 2018 | 14 | 2018 |
Privacy-Friendly cloud storage for the data track: an educational transparency tool T Pulls Secure IT Systems: 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden …, 2012 | 13 | 2012 |