default search action
Proceedings on Privacy Enhancing Technologies, Volume 2020
Volume 2020, Number 1, January 2020
- Kostas Chatzikokolakis, Aaron Johnson:
Editors' Introduction. 1-4 - Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden:
Computation on Encrypted Data using Dataflow Authentication. 5-25 - Guillaume Celosia, Mathieu Cunche:
Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy Continuity Protocols. 26-46 - Thomas Linden, Rishabh Khandelwal, Hamza Harkous, Kassem Fawaz:
The Privacy Policy Landscape After the GDPR. 47-64 - John Cook, Rishab Nithyanand, Zubair Shafiq:
Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding. 65-82 - Moses Namara, Daricia Wilkinson, Kelly Caine, Bart P. Knijnenburg:
Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology. 83-102 - Parameswaran Kamalaruban, Victor Perrier, Hassan Jameel Asghar, Mohamed Ali Kâafar:
Not All Attributes are Created Equal: dX -Private Mechanisms for Linear Queries. 103-125 - Ankush Singla, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino, Ninghui Li:
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks. 126-142 - Dirk van der Linden, Matthew Edwards, Irit Hadar, Anna Zamansky:
Pets without PETs: on pet owners' under-estimation of privacy concerns in pet wearables. 143-164 - Max Hoffmann, Michael Klooß, Markus Raiber, Andy Rupp:
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices. 165-194 - Daniel Smullen, Yuanyuan Feng, Shikun Zhang, Norman M. Sadeh:
The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences. 195-215 - Anrin Chakraborti, Radu Sion:
SqORAM: Read-Optimized Sequential Write-Only Oblivious RAM. 216-234 - Tobias Pulls, Rasmus Dahlberg:
Website Fingerprinting with Website Oracles. 235-255
Volume 2020, Number 2, April 2020
- Kostas Chatzikokolakis, Aaron Johnson:
Editors' Introduction. 1-4 - Sergiu Carpov, Caroline Fontaine, Damien Ligier, Renaud Sirdey:
Illuminating the Dark or how to recover what should not be seen in FE-based classifiers. 5-23 - Zhiju Yang, Chuan Yue:
A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments. 24-44 - Anastasia Shuba, Athina Markopoulou:
NoMoATS: Towards Automatic Detection of Mobile Tracking. 45-66 - Saba Eskandarian, Mihai Christodorescu, Payman Mohassel:
Privacy-Preserving Payment Splitting. 67-88 - Sébastien Henri, Gines Garcia-Aviles, Pablo Serrano, Albert Banchs, Patrick Thiran:
Protecting against Website Fingerprinting with Multihoming. 89-110 - David Harborth, Sebastian Pape, Kai Rannenberg:
Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym. 111-128 - Janus Varmarken, Hieu Le, Anastasia Shuba, Athina Markopoulou, Zubair Shafiq:
The TV is Smart and Full of Trackers: Measuring Smart TV Advertising and Tracking. 129-154 - Mert D. Pesé, Xiaoying Pu, Kang G. Shin:
SPy: Car Steering Reveals Your Trip Route! 155-174 - Peeter Laud, Alisa Pankova, Martin Pettai:
A Framework of Metrics for Differential Privacy from Local Sensitivity. 175-208 - Phillipp Schoppmann, Lennart Vogelsang, Adrià Gascón, Borja Balle:
Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue. 209-229 - Royce J. Wilson, Celia Yuxin Zhang, William Lam, Damien Desfontaines, Daniel Simmons-Marengo, Bryant Gipson:
Differentially Private SQL with Bounded User Contribution. 230-250 - Abraham H. Mhaidli, Manikandan Kandadai Venkatesh, Yixin Zou, Florian Schaub:
Listen Only When Spoken To: Interpersonal Communication Cues as Smart Speaker Privacy Controls. 251-270 - Erik Sy, Tobias Mueller, Christian Burkert, Hannes Federrath, Mathias Fischer:
Enhanced Performance and Privacy for TLS over TCP Fast Open. 271-287 - Damien Desfontaines, Balázs Pejó:
SoK: Differential privacies. 288-313 - Álvaro Feal, Paolo Calciati, Narseo Vallina-Rodriguez, Carmela Troncoso, Alessandra Gorla:
Angel or Devil? A Privacy Study of Mobile Parental Control Apps. 314-335 - Sebastian Lauer, Kai Gellert, Robert Merget, Tobias Handirk, Jörg Schwenk:
T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction. 336-357 - Hassan Jameel Asghar, Dali Kaafar:
Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms. 358-378 - Ricardo Mendes, Mariana Cunha, João P. Vilela:
Impact of Frequency of Location Reports on the Privacy Level of Geo-indistinguishability. 379-396 - Bailey Kacsmar, Chelsea Komlo, Florian Kerschbaum, Ian Goldberg:
Mind the Gap: Ceremonies for Applied Secret Sharing. 397-415 - Daricia Wilkinson, Paritosh Bahirat, Moses Namara, Jing Lyu, Arwa Alsubhi, Jessica Qiu, Pamela J. Wisniewski, Bart P. Knijnenburg:
Privacy at a Glance: The User-Centric Design of Glanceable Data Exposure Visualizations. 416-435 - Shrirang Mare, Franziska Roesner, Tadayoshi Kohno:
Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. 436-458 - Megha Byali, Harsh Chaudhari, Arpita Patra, Ajith Suresh:
FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning. 459-480 - Dominique Machuletz, Rainer Böhme:
Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR. 481-498 - Imane Fouad, Nataliia Bielova, Arnaud Legout, Natasa Sarafijanovic-Djukic:
Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels. 499-518 - Duc Viet Le, Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee, Aniket Kate:
A Tale of Two Trees: One Writes, and Other Reads. 519-536 - Varsha Bhat Kukkala, S. R. S. Iyengar:
Identifying Influential Spreaders in a Social Network (While Preserving Privacy). 537-557 - Gaston Pugliese, Christian Riess, Freya Gassmann, Zinaida Benenson:
Long-Term Observation on Browser Fingerprinting: Users' Trackability and Perspective. 558-577
Volume 2020, Number 3, July 2020
- Kostas Chatzikokolakis, Aaron Johnson:
Editors' Introduction. 1-4 - Mohammad Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha Girish Gangadhara, Matthew Wright:
Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks. 5-24 - Mohammed Abuhamad, Tamer AbuHmed, DaeHun Nyang, David Mohaisen:
Multi-χ: Identifying Multiple Authors from Source Code Files. 25-41 - Hayim Shaul, Dan Feldman, Daniela Rus:
Secure k-ish Nearest Neighbors Classifier. 42-61 - Valerie Fetzer, Max Hoffmann, Matthias Nagel, Andy Rupp, Rebecca Schwerdt:
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection. 62-152 - Seung Geol Choi, Dana Dachman-Soled, Mukul Kulkarni, Arkady Yerukhimovich:
Differentially-Private Multi-Party Sketching for Large-Scale Statistics. 153-174 - Thien-Nam Dinh, Florentin Rochet, Olivier Pereira, Dan S. Wallach:
Scaling Up Anonymous Communication with Efficient Nanopayment Channels. 175-203 - Miti Mazmudar, Ian Goldberg:
Mitigator: Privacy policy compliance using trusted hardware. 204-221 - Catherine Han, Irwin Reyes, Álvaro Feal, Joel Reardon, Primal Wijesekera, Narseo Vallina-Rodriguez, Amit Elazari Bar On, Kenneth A. Bamberger, Serge Egelman:
The Price is (Not) Right: Comparing Privacy in Free and Paid Apps. 222-242 - Piyush Kumar Sharma, Devashish Gosain, Himanshu Sagar, Chaitanya Kumar, Aneesh Dogra, Vinayak Naik, Hrishikesh B. Acharya, Sambuddho Chakravarty:
SiegeBreaker: An SDN Based Practical Decoy Routing System. 243-263 - Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques. 264-283 - Patrick Ah-Fat, Michael Huth:
Protecting Private Inputs: Bounded Distortion Guarantees With Randomised Approximations. 284-303 - Alexander Bajic, Georg T. Becker:
dPHI: An improved high-speed network-layer anonymity protocol. 304-326 - Wouter Lueks, Brinda Hampiholi, Greg Alpár, Carmela Troncoso:
Tandem: Securing Keys by Using a Central Server While Preserving Privacy. 327-355 - Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Comprehensive Anonymity Trilemma: User Coordination is not enough. 356-383 - Camille Cobb, Lucy Simko, Tadayoshi Kohno, Alexis Hiniker:
A Privacy-Focused Systematic Analysis of Online Status Indicators. 384-403 - Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate:
MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies. 404-424
Volume 2020, Number 4, October 2020
- Kostas Chatzikokolakis, Aaron Johnson:
Editors' Introduction. 1-4 - Brendan Avent, Javier González, Tom Diethe, Andrei Paleyes, Borja Balle:
Automatic Discovery of Privacy-Utility Pareto Fronts. 5-23 - Ludovic Barman, Italo Dacosta, Mahdi Zamani, Ennan Zhai, Apostolos Pyrgelis, Bryan Ford, Joan Feigenbaum, Jean-Pierre Hubaux:
PriFi: Low-Latency Anonymity for Organizational Networks. 24-47 - Brendan Avent, Yatharth Dubey, Aleksandra Korolova:
The Power of the Hybrid Model for Mean Estimation. 48-68 - Piyush Kumar Sharma, Shashwat Chaudhary, Nikhil Hassija, Mukulika Maity, Sambuddho Chakravarty:
The Road Not Taken: Re-thinking the Feasibility of Voice Calling Over Tor. 69-88 - Mo Chen, Jens Grossklags:
An Analysis of the Current State of the Consumer Credit Reporting System in China. 89-110 - Lauren Watson, Anupam Mediratta, Tariq Elahi, Rik Sarkar:
Privacy Preserving Detection of Path Bias Attacks in Tor. 111-130 - Xihui Chen, Sjouke Mauw, Yunior Ramírez-Cruz:
Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee. 131-152 - Hamza Saleem, Muhammad Naveed:
SoK: Anatomy of Data Breaches. 153-174 - Tommi Gröndahl, N. Asokan:
Effective writing style transfer via combinatorial paraphrasing. 175-195 - Osman Biçer, Alptekin Küpçü:
Anonymous, Attribute Based, Decentralized, Secure, and Fair e-Donation. 196-219 - Gunes Acar, Steven Englehardt, Arvind Narayanan:
No boundaries: data exfiltration by third parties embedded on web pages. 220-238 - Chen Chen, Anrin Chakraborti, Radu Sion:
INFUSE: Invisible plausibly-deniable file system for NAND flash. 239-254 - Daniel J. Dubois, Roman Kolcun, Anna Maria Mandalari, Muhammad Talha Paracha, David R. Choffnes, Hamed Haddadi:
When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers. 255-276 - Han Wang, Shangyu Xie, Yuan Hong:
VideoDP: A Flexible Platform for Video Analytics with Differential Privacy. 277-296 - Elizabeth C. Crites, Mary Maller, Sarah Meiklejohn, Rebekah Mercer:
Reputable List Curation from Decentralized Voting. 297-320 - Benjamin VanderSloot, Sergey Frolov, Jack Wampler, Sze Chuen Tan, Irv Simpson, Michalis Kallitsis, J. Alex Halderman, Nikita Borisov, Eric Wustrow:
Running Refraction Networking for Real. 321-335 - Shehroze Farooqi, Maaz Bin Musa, Zubair Shafiq, Fareed Zaffar:
CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks. 336-354 - Anders P. K. Dalskov, Daniel Escudero, Marcel Keller:
Secure Evaluation of Quantized Neural Networks. 355-375 - Frederik Möllers:
Energy-Efficient Dummy Traffic Generation for Home Automation Systems. 376-393 - Martin Koop, Erik Tews, Stefan Katzenbeisser:
In-Depth Evaluation of Redirect Tracking and Link Usage. 394-413 - Payman Mohassel, Mike Rosulek, Ni Trieu:
Practical Privacy-Preserving K-means Clustering. 414-433 - Nathan Manohar, Abhishek Jain, Amit Sahai:
Self-Processing Private Sensor Data via Garbled Encryption. 434-460 - Mihir Bellare, Wei Dai, Phillip Rogaway:
Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements. 461-490 - Laura Shipp, Jorge Blasco:
How private is your period?: A systematic analysis of menstrual app privacy policies. 491-510
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.