default search action
Proceedings on Privacy Enhancing Technologies, Volume 2016
Volume 2016, Number 1, January 2016
- Apu Kapadia:
Editor's Introduction. 1-3 - Andreas Kurtz, Hugo Gascon, Tobias Becker, Konrad Rieck, Felix C. Freiling:
Fingerprinting Mobile Devices Using Personalized Configurations. 4-19 - Oleksii Starov, Phillipa Gill, Nick Nikiforakis:
Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms. 20-33 - Miro Enev, Alex Takakuwa, Karl Koscher, Tadayoshi Kohno:
Automobile Driver Fingerprinting. 34-50
Volume 2016, Number 2, April 2016
- Claudia Díaz, Apu Kapadia:
Editors' Introduction. 1-3 - João Matos, João Garcia, Nuno Coração:
Isolating Graphical Failure-Inducing Input for Privacy Protection in Error Reporting Systems. 4-21 - Dong Lin, Micah Sherr, Boon Thau Loo:
Scalable and Anonymous Group Communication with MTor. 22-39 - Michael Backes, Sebastian Meiser, Marcin Slowik:
Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks. 40-60 - Yu Pu, Jens Grossklags:
Towards a Model on the Factors Influencing Social App Users' Valuation of Interdependent Privacy. 61-81 - Payman Mohassel, Ostap Orobets, Ben Riva:
Efficient Server-Aided 2PC for Mobile Phones. 82-99 - Sakshi Jain, Mobin Javed, Vern Paxson:
Towards Mining Latent Client Identifiers from Network Traffic. 100-114 - Albert Kwon, David Lazar, Srinivas Devadas, Bryan Ford:
Riffle: An Efficient Communication System With Strong Anonymity. 115-134 - William Melicher, Mahmood Sharif, Joshua Tan, Lujo Bauer, Mihai Christodorescu, Pedro Giovanni Leon:
(Do Not) Track Me Sometimes: Users' Contextual Preferences for Web Tracking. 135-154 - Carlos Aguilar Melchor, Joris Barrier, Laurent Fousse, Marc-Olivier Killijian:
XPIR : Private Information Retrieval for Everyone. 155-174 - Shuai Li, Nicholas Hopper:
Mailet: Instant Social Networking under Censorship. 175-192
Volume 2016, Number 3, July 2016
- Claudia Díaz, Apu Kapadia:
Editors' Introduction. 1-3 - Rinku Dewri, Toan Ong, Ramakrishna Thurimella:
Linking Health Records for Federated Query Processing. 4-23 - Jean-Sébastien Légaré, Róbert Sumi, William Aiello:
Beeswax: a platform for private web apps. 24-40 - Giulia Fanti, Vasyl Pihur, Úlfar Erlingsson:
Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries. 41-61 - Tibor Jager, Andy Rupp:
Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. 62-82 - Emmanuel Bello-Ogunu, Mohamed Shehab:
Crowdsourcing for Context: Regarding Privacy in Beacon Encounters via Contextual Integrity. 83-95 - Chad Spensky, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick Housley, Robert K. Cunningham:
SoK: Privacy on Mobile Devices - It's Complicated. 96-116 - Dan Bogdanov, Liina Kamm, Baldur Kubo, Reimo Rebane, Ville Sokk, Riivo Talviste:
Students and Taxes: a Privacy-Preserving Study Using Secure Computation. 117-135 - Laurent Simon, Wenduan Xu, Ross J. Anderson:
Don't Interrupt Me While I Type: Inferring Text Entered Through Gesture Typing on Android Keyboards. 136-154 - Rebekah Overdorf, Rachel Greenstadt:
Blogs, Twitter Feeds, and Reddit Comments: Cross-domain Authorship Attribution. 155-171 - Yang Wang, Huichuan Xia, Yaxing Yao, Yun Huang:
Flying Eyes and Hidden Controllers: A Qualitative Study of People's Privacy Perceptions of Civilian Drones in The US. 172-190 - Samuel Grogan, Aleecia M. McDonald:
Access Denied! Contrasting Data Access in the United States and Ireland. 191-211 - Richard McPherson, Amir Houmansadr, Vitaly Shmatikov:
CovertCast: Using Live Streaming to Evade Internet Censorship. 212-225
Volume 2016, Number 4, October 2016
- Claudia Díaz, Apu Kapadia:
Editors' Introduction. 1-3 - Frederick Douglas, Rorshach, Weiyang Pan, Matthew Caesar:
Salmon: Robust Proxy Distribution for Censorship Circumvention. 4-20 - Tao Wang, Ian Goldberg:
On Realistically Attacking Tor with Website Fingerprinting. 21-36 - Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, Ian Goldberg:
SoK: Making Sense of Censorship Resistance Systems. 37-61 - Hao Wu, Yih-Chun Hu:
Location Privacy with Randomness Consistency. 62-82 - Tariq Elahi, John A. Doucette, Hadi Hosseini, Steven J. Murdoch, Ian Goldberg:
A Framework for the Game-theoretic Analysis of Censorship Resistance. 83-101 - Kassem Fawaz, Kyu-Han Kim, Kang G. Shin:
Privacy vs. Reward in Indoor Location-Based Services. 102-122 - Hamza Harkous, Rameez Rahman, Bojan Karlas, Karl Aberer:
The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps. 123-143 - Marina Blanton, Fattaneh Bayatbabolghani:
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation. 144-164 - Berker Agir, Kévin Huguenin, Urs Hengartner, Jean-Pierre Hubaux:
On the Privacy Implications of Location Semantics. 165-183 - Raphael R. Toledo, George Danezis, Ian Goldberg:
Lower-Cost ∈-Private Information Retrieval. 184-201 - Ryan Henry:
Polynomial Batch Codes for Efficient IT-PIR. 202-218 - John M. Schanck, William Whyte, Zhenfei Zhang:
Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world. 219-236 - Christoph Bösch, Benjamin Erb, Frank Kargl, Henning Kopp, Stefan Pfattheicher:
Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns. 237-254 - Pierre-Alain Fouque, Cristina Onete, Benjamin Richard:
Achieving Better Privacy for the 3GPP AKA Protocol. 255-275 - Henry Tan, Micah Sherr, Wenchao Zhou:
Data-plane Defenses against Routing Attacks on Tor. 276-293 - Yaoqi Jia, Guangdong Bai, Prateek Saxena, Zhenkai Liang:
Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation. 294-314 - Dominik Leibenger, Frederik Möllers, Anna Petrlic, Ronald Petrlic, Christoph Sorge:
Privacy Challenges in the Quantified Self Movement - An EU Perspective. 315-334 - David J. Wu, Tony Feng, Michael Naehrig, Kristin E. Lauter:
Privately Evaluating Decision Trees and Random Forests. 335-355 - Armon Barton, Matthew Wright:
DeNASA: Destination-Naive AS-Awareness in Anonymous Communications. 356-372 - Esha Ghosh, Olga Ohrimenko, Roberto Tamassia:
Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge. 373-388 - Minhui Xue, Gabriel Magno, Evandro Cunha, Virgílio A. F. Almeida, Keith W. Ross:
The Right to be Forgotten in the Media: A Data-Driven Study. 389-402 - Steven Hill, Zhimin Zhou, Lawrence K. Saul, Hovav Shacham:
On the (In)effectiveness of Mosaicing and Blurring as Tools for Document Redaction. 403-417 - Susan E. McGregor, Franziska Roesner, Kelly Caine:
Individual versus Organizational Computer Security and Privacy Concerns in Journalism. 418-435 - Pedro Moreno-Sanchez, Muhammad Bilal Zafar, Aniket Kate:
Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network. 436-453 - Mauro Conti, Stephen Crane, Tommaso Frassetto, Andrei Homescu, Georg Koppen, Per Larsen, Christopher Liebchen, Mike Perry, Ahmad-Reza Sadeghi:
Selfrando: Securing the Tor Browser against De-anonymization Exploits. 454-469 - Gábor György Gulyás, Gergely Ács, Claude Castelluccia:
Near-Optimal Fingerprinting with Constraints. 470-487
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.