Tobias Pulls
Tobias Pulls
Associate Professor, Karlstad University
Verified email at - Homepage
Cited by
Cited by
ScrambleSuit: A polymorphic network protocol to circumvent censorship
P Winter, T Pulls, J Fuss
Proceedings of the 12th ACM workshop on Workshop on privacy in the …, 2013
Efficient sparse merkle trees: Caching strategies and secure (non-) membership proofs
R Dahlberg, T Pulls, R Peeters
Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016
Usable transparency with the data track: a tool for visualizing data disclosures
J Angulo, S Fischer-Hübner, T Pulls, E Wästlund
Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human …, 2015
Towards usable privacy policy display and management
J Angulo, S Fischer‐Hübner, E Wästlund, T Pulls
Information Management & Computer Security 20 (1), 4-17, 2012
Transparency, privacy and trust–Technology for tracking and controlling my data disclosures: Does this work?
S Fischer-Hübner, J Angulo, F Karegar, T Pulls
Trust Management X: 10th IFIP WG 11.11 International Conference, IFIPTM 2016 …, 2016
Distributed privacy-preserving transparency logging
T Pulls, R Peeters, K Wouters
Proceedings of the 12th ACM workshop on Workshop on privacy in the …, 2013
The effect of dns on tor's anonymity
B Greschbach, T Pulls, LM Roberts, P Winter, N Feamster
arXiv preprint arXiv:1609.08187, 2016
How can cloud users be supported in deciding on, tracking and controlling how their data are used?
S Fischer-Hübner, J Angulo, T Pulls
Privacy and Identity Management for Emerging Services and Technologies: 8th …, 2014
Balloon: A forward-secure append-only persistent authenticated data structure
T Pulls, R Peeters
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
Website Fingerprinting with Website Oracles.
T Pulls, R Dahlberg
Proc. Priv. Enhancing Technol. 2020 (1), 235-255, 2020
How much privilege does an app need? Investigating resource usage of android apps (short paper)
N Momen, T Pulls, L Fritsch, S Lindskog
2017 15th Annual Conference on Privacy, Security and Trust (PST), 268-2685, 2017
Visualizing exports of personal data by exercising the right of data portability in the data track-are people ready for this?
F Karegar, T Pulls, S Fischer-Hübner
Privacy and Identity Management. Facing up to Next Steps: 11th IFIP WG 9.2 …, 2016
Towards Usable Privacy Policy Display & Management-The PrimeLife Approach.
J Angulo, S Fischer-Hübner, T Pulls, E Wästlund
HAISA, 108-118, 2011
HCI for policy display and administration
J Angulo, S Fischer-Hübner, T Pulls, U König
Privacy and Identity Management for Life, 261-277, 2011
Adding secure transparency logging to the prime core
H Hedbom, T Pulls, P Hjärtquist, A Lavén
IFIP PrimeLife International Summer School on Privacy and Identity …, 2009
Insynd: Improved privacy-preserving transparency logging
R Peeters, T Pulls
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
Transparency tools
H Hedbom, T Pulls, M Hansen
Privacy and Identity Management for Life, 135-143, 2011
Engineering privacy by design: lessons from the design and implementation of an identity wallet platform
F Veseli, JS Olvera, T Pulls, K Rannenberg
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1475-1483, 2019
Verifiable light-weight monitoring for certificate transparency logs
R Dahlberg, T Pulls
Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway …, 2018
Privacy-Friendly cloud storage for the data track: an educational transparency tool
T Pulls
Secure IT Systems: 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20