default search action
Proceedings on Privacy Enhancing Technologies, Volume 2019
Volume 2019, Number 1, January 2019
- Konstantinos Chatzikokolakis, Carmela Troncoso:
Editors' Introduction. 1-4 - Nisarg Raval, Ashwin Machanavajjhala, Jerry Pan:
Olympus: Sensor Privacy through Utility Aware Obfuscation. 5-25 - Thee Chanyaswad, Changchang Liu, Prateek Mittal:
RON-Gauss: Enhancing Utility in Non-Interactive Private Data Release. 26-46 - Ahmed Salem, Pascal Berrang, Mathias Humbert, Michael Backes:
Privacy-Preserving Similar Patient Queries for Combined Biomedical Data. 47-67 - Ruben Recabarren, Bogdan Carbunar:
Tithonus: A Bitcoin Based Censorship Resilient System. 68-86 - Alexandros Mittos, Bradley A. Malin, Emiliano De Cristofaro:
Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective. 87-107 - Dominic Deuber, Christoph Egger, Katharina Fech, Giulio Malavolta, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan, Florian Battke, Claudia Durand:
My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data. 108-132 - Jamie Hayes, Luca Melis, George Danezis, Emiliano De Cristofaro:
LOGAN: Membership Inference Attacks Against Generative Models. 133-152 - Chen Chen, Anrin Chakraborti, Radu Sion:
PD-DM: An efficient locality-preserving block device mapper with plausible deniability. 153-171 - Thang Hoang, Muslum Ozgur Ozmen, Yeongjin Jang, Attila A. Yavuz:
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset. 172-191 - Sara Krehbiel:
Choosing Epsilon for Privacy as a Service. 192-205 - Mohsen Minaei, Mainack Mondal, Patrick Loiseau, Krishna P. Gummadi, Aniket Kate:
Lethe: Conceal Content Deletion from Persistent Observers. 206-226 - Giridhari Venkatadri, Elena Lucherini, Piotr Sapiezynski, Alan Mislove:
Investigating sources of PII used in Facebook's targeted advertising. 227-244 - Ghous Amjad, Seny Kamara, Tarik Moataz:
Breach-Resistant Structured Encryption. 245-265 - Anselme Tueno, Florian Kerschbaum, Stefan Katzenbeisser:
Private Evaluation of Decision Trees using Sublinear Cost. 266-286
Volume 2019, Number 2, April 2019
- Kostas Chatzikokolakis, Carmela Troncoso:
Editors' Introduction. 1-4 - Alexandra-Mihaela Olteanu, Mathias Humbert, Kévin Huguenin, Jean-Pierre Hubaux:
The (Co-)Location Sharing Game. 5-25 - Damien Desfontaines, Andreas Lochbihler, David A. Basin:
Cardinality Estimators do not Preserve Privacy. 26-46 - Balazs Pejo, Qiang Tang, Gergely Biczók:
Together or Alone: The Price of Privacy in Collaborative Learning. 47-65 - Sashank Narain, Guevara Noubir:
Mitigating Location Privacy Attacks on Mobile Devices using Dynamic App Sandboxing. 66-87 - Georgia Fragkouli, Katerina J. Argyraki, Bryan Ford:
MorphIT: Morphing Packet Reports for Internet Transparency. 88-104 - Christiane Kuhn, Martin Beck, Stefan Schiffner, Eduard A. Jorswieck, Thorsten Strufe:
On Privacy Notions in Anonymous Communication. 105-125 - Martino Trevisan, Stefano Traverso, Eleonora Bassi, Marco Mellia:
4 Years of EU Cookie Law: Results and Lessons Learned. 126-145 - Chuhan Gao, Kassem Fawaz, Sanjib Sur, Suman Banerjee:
Privacy Protection for Audio Sensing Against Multi-Microphone Adversaries. 146-165 - Hans Hanley, Yixin Sun, Sameer Wagh, Prateek Mittal:
DPSelect: A Differential Privacy Based Guard Relay Selection Algorithm for Tor. 166-186 - Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider:
SoK: Modular and Efficient Private Decision Tree Evaluation. 187-208 - Kopo M. Ramokapane, Anthony C. Mazeli, Awais Rashid:
Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy. 209-227 - Paul Schmitt, Anne Edmundson, Allison Mankin, Nick Feamster:
Oblivious DNS: Practical Privacy for DNS Queries. 228-244 - David M. Sommer, Sebastian Meiser, Esfandiar Mohammadi:
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy. 245-269 - Abdullah Qasem, Sami Zhioua, Karima Makhlouf:
Finding a Needle in a Haystack: The Traffic Analysis Version. 270-290 - Mohammad Naseri, Nataniel P. Borges Jr., Andreas Zeller, Romain Rouvoy:
AccessiLeaks: Investigating Privacy Leaks Exposed by the Android Accessibility Service. 291-305
Volume 2019, Number 3, July 2019
- Kostas Chatzikokolakis, Carmela Troncoso:
Editors' Introduction. 1-5 - Adam Groce, Peter Rindal, Mike Rosulek:
Cheaper Private Set Intersection via Differentially Private Leakage. 6-25 - Sameer Wagh, Divya Gupta, Nishanth Chandran:
SecureNN: 3-Party Secure Computation for Neural Network Training. 26-49 - Johannes K. Becker, David Li, David Starobinski:
Tracking Anonymized Bluetooth Devices. 50-65 - Sebastian Zimmeck, Peter Story, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel R. Reidenberg, N. Cameron Russell, Norman M. Sadeh:
MAPS: Scaling Privacy Compliance Analysis to a Million Apps. 66-86 - Adi Akavia, Craig Gentry, Shai Halevi, Max Leibovich:
Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free. 87-107 - Ravishankar Borgaonkar, Lucca Hirschi, Shinjo Park, Altaf Shaik:
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols. 108-127 - Noah J. Apthorpe, Danny Yuxing Huang, Dillon Reisman, Arvind Narayanan, Nick Feamster:
Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping. 128-148 - Riham AlTawy, Guang Gong:
Mesh: A Supply Chain Solution with Locally Private Blockchain Transactions. 149-169 - Archita Agarwal, Maurice Herlihy, Seny Kamara, Tarik Moataz:
Encrypted Databases for Differential Privacy. 170-190 - Se Eun Oh, Saikrishna Sunkam, Nicholas Hopper:
p1-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning. 191-209 - Stephan A. Kollmann, Martin Kleppmann, Alastair R. Beresford:
Snapdoc: Authenticated snapshots with history privacy in peer-to-peer collaborative editing. 210-232 - Changchang Liu, Xi He, Thee Chanyaswad, Shiqiang Wang, Prateek Mittal:
Investigating Statistical Privacy Frameworks from the Perspective of Hypothesis Testing. 233-254 - Erik Sy, Christian Burkert, Hannes Federrath, Mathias Fischer:
A QUIC Look at Web Tracking. 255-266 - Nina Gerber, Benjamin Reinheimer, Melanie Volkamer:
Investigating People's Privacy Risk Perception. 267-288 - Anja Lehmann:
ScrambleDB: Oblivious (Chameleon) Pseudonymization-as-a-Service. 289-309 - Marika Swanberg, Ira Globus-Harris, Iris Griffith, Anna M. Ritz, Adam Groce, Andrew Bray:
Improved Differentially Private Analysis of Variance. 310-330 - Sajin Sasy, Ian Goldberg:
ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments. 331-349 - Lachlan J. Gunn, Ricardo Vieitez Parra, N. Asokan:
Circumventing Cryptographic Deniability with Remote Attestation. 350-369 - Dhinakaran Vinayagamurthy, Alexey Gribov, Sergey Gorbunov:
StealthDB: a Scalable Encrypted Database with Full SQL Query Support. 370-388 - Edwin Dauber, Aylin Caliskan, Richard E. Harang, Gregory Shearer, Michael J. Weisman, Frederica Free-Nelson, Rachel Greenstadt:
Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments. 389-408 - Benjamin Kuykendall, Hugo Krawczyk, Tal Rabin:
Cryptography for #MeToo. 409-429
Volume 2019, Number 4, October 2019
- Kostas Chatzikokolakis, Carmela Troncoso:
Editors' Introduction. 1-5 - Kirill Nikitin, Ludovic Barman, Wouter Lueks, Matthew Underwood, Jean-Pierre Hubaux, Bryan Ford:
Reducing Metadata Leakage from Encrypted Files and Communication with PURBs. 6-33 - Jeremy Martin, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik C. Rye, Brandon Sipes, Sam Teplov:
Handoff All Your Privacy - A Review of Apple's Bluetooth Low Energy Continuity Protocol. 34-53 - Asad Mahmood, Faizan Ahmad, Zubair Shafiq, Padmini Srinivasan, Fareed Zaffar:
A Girl Has No Name: Automated Authorship Obfuscation using Mutant-X. 54-71 - Qiaozhi Wang, Hao Xue, Fengjun Li, Dongwon Lee, Bo Luo:
#DontTweetThis: Scoring Private Information in Social Networks. 72-92 - Elena Pagnin, Gunnar Gunnarsson, Pedram Talebi, Claudio Orlandi, Andrei Sabelfeld:
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing. 93-111 - Syed Mahbub Hafiz, Ryan Henry:
A Bit More Than a Bit Is More Than a Bit Better: Faster (essentially) optimal-rate many-server PIR. 112-131 - Raphael Bost, Pierre-Alain Fouque:
Security-Efficiency Tradeoffs in Searchable Encryption. 132-151 - Janith Weerasinghe, Kediel Morales, Rachel Greenstadt:
"Because... I was told... so much": Linguistic Indicators of Mental Health Status on Twitter. 152-171 - Jonathan Rusert, Osama Khalid, Dat Hong, Zubair Shafiq, Padmini Srinivasan:
No Place to Hide: Inadvertent Location Privacy Leaks on Twitter. 172-189 - Ghada Arfaoui, Xavier Bultel, Pierre-Alain Fouque, Adina Nedelcu, Cristina Onete:
The privacy of the TLS 1.3 protocol. 190-210 - Natã Miccael Barbosa, Joon S. Park, Yaxing Yao, Yang Wang:
"What if?" Predicting Individual Users' Smart Home Privacy Preferences and Their Changes. 211-231 - Benjamin Hilprecht, Martin Härterich, Daniel Bernau:
Monte Carlo and Reconstruction Membership Inference Attacks against Generative Models. 232-249 - Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, David A. Wagner:
Privacy Attitudes of Smart Speaker Users. 250-271 - Gerry Wan, Aaron Johnson, Ryan Wails, Sameer Wagh, Prateek Mittal:
Guard Placement Attacks on Path Selection Algorithms for Tor. 272-291 - Sanjit Bhat, David Lu, Albert Kwon, Srinivas Devadas:
Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning. 292-310 - Geoffrey Alexander, Antonio M. Espinoza, Jedidiah R. Crandall:
Detecting TCP/IP Connections via IPID Hash Collisions. 311-328
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.