default search action
Proceedings on Privacy Enhancing Technologies, Volume 2024
Volume 2024, Number 1, January 2024
- Micah Sherr, Zubair Shafiq:
Editors' Introduction. 1-4 - Nurullah Demir, Tobias Urban, Norbert Pohlmann, Christian Wressnegger:
A Large-Scale Study of Cookie Banner Interaction Tools and their Impact on Users' Privacy. 5-20 - Gonzalo Munilla Garrido, Vivek Nair, Dawn Song:
SoK: Data Privacy in Virtual Reality. 21-40 - Yohan Beugin, Patrick D. McDaniel:
Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving). 41-57 - Lawrence Lim, Wei-Yee Goh, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta:
QUICKeR: Quicker Updates Involving Continuous Key Rotation. 58-73 - Marina Blanton, Dennis Murphy, Chen Yuan:
Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits. 74-97 - James K. Holland, Jason Carpenter, Se Eun Oh, Nicholas Hopper:
DeTorrent: An Adversarial Padding-only Traffic Analysis Defense. 98-115 - Simon Hanisch, Julian Todt, Jose Patino, Nicholas W. D. Evans, Thorsten Strufe:
A False Sense of Privacy: Towards a Reliable Evaluation Methodology for the Anonymization of Biometric Data. 116-132 - Yixin Zou, Kaiwen Sun, Tanisha Afnan, Ruba Abu-Salma, Robin Brewer, Florian Schaub:
Cross-Contextual Examination of Older Adults' Privacy Concerns, Behaviors, and Vulnerabilities. 133-150 - Stefan Albert Horstmann, Samuel Domiks, Marco Gutfleisch, Mindy Tran, Yasemin Acar, Veelasha Moonsamy, Alena Naiakshina:
"Those things are written by lawyers, and programmers are reading that." Mapping the Communication Gap Between Software Developers and Privacy Experts. 151-170 - Tom Biselli, Laura Utz, Christian Reuter:
Supporting Informed Choices about Browser Cookies: The Impact of Personalised Cookie Banners. 171-191 - Lorin Schöni, Karel Kubicek, Verena Zimmermann:
Block Cookies, Not Websites: Analysing Mental Models and Usability of the Privacy-Preserving Browser Extension CookieBlock. 192-216 - Christopher B. Landis, Joshua A. Kroll:
Mitigating Inference Risks with the NIST Privacy Framework. 217-231 - Amirhossein Adavoudi Jolfaei, Andy Rupp, Stefan Schiffner, Thomas Engel:
Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure. 232-257 - Sebastian Zimmeck, Eliza Kuller, Chunyue Ma, Bella Tassone, Joe Champeau:
Generalizable Active Privacy Choice: Designing a Graphical User Interface for Global Privacy Control. 258-279 - Zengrui Liu, Umar Iqbal, Nitesh Saxena:
Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy? 280-299 - Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini:
Privacy Preserving Feature Selection for Sparse Linear Regression. 300-313 - Srdan Krstic, Hoang Nguyen Phuoc Bao, David A. Basin:
Model-driven Privacy. 314-329 - Azra Abtahi, Mathias Payer, Amir Aminifar:
DP-ACT: Decentralized Privacy-Preserving Asymmetric Digital Contact Tracing. 330-342 - Killian Davitt, Dan Ristea, Duncan Russell, Steven J. Murdoch:
CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser. 343-356 - Johannes Müller, Balázs Pejó, Ivan Pryvalov:
DeVoS: Deniable Yet Verifiable Vote Updating. 357-378 - Rachel McAmis, Mattea Sim, Mia M. Bennett, Tadayoshi Kohno:
Over Fences and Into Yards: Privacy Threats and Concerns of Commercial Satellites. 379-396 - Nan Cheng, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita, Kazunari Tozawa:
Constant-Round Private Decision Tree Evaluation for Secret Shared Data. 397-412 - Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov:
Data Isotopes for Data Provenance in DNNs. 413-429 - Seny Kamara, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, Amos Treiber:
MAPLE: MArkov Process Leakage attacks on Encrypted Search. 430-446 - Tushar M. Jois, Gabrielle Beck, Sofia Belikovetsky, Joseph Carrigan, Alishah Chator, Logan Kostick, Maximilian Zinkus, Gabriel Kaptchuk, Aviel D. Rubin:
SocIoTy: Practical Cryptography in Smart Home Contexts. 447-464 - Paul Vines, Samuel McKay, Jesse Jenter, Suresh Krishnaswamy:
Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship. 465-477 - Chuan Yan, Fuman Xie, Mark Huasong Meng, Yanjun Zhang, Guangdong Bai:
On the Quality of Privacy Policy Documents of Virtual Personal Assistant Applications. 478-493 - Tsunato Nakai, Ye Wang, Kota Yoshida, Takeshi Fujino:
SEDMA: Self-Distillation with Model Aggregation for Membership Privacy. 494-508 - Sajin Sasy, Ian Goldberg:
SoK: Metadata-Protecting Communication Systems. 509-524 - Caelin Kaplan, Chuan Xu, Othmane Marfoq, Giovanni Neglia, Anderson Santana de Oliveira:
A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses. 525-548 - Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis, Bogdan Warinschi:
SWiSSSE: System-Wide Security for Searchable Symmetric Encryption. 549-581 - Sayan Biswas, Catuscia Palamidessi:
PRIVIC: A privacy-preserving method for incremental collection of location data. 582-596 - François Hublet, David A. Basin, Srdan Krstic:
User-Controlled Privacy: Taint, Track, and Control. 597-616 - Nerla Jean-Louis, Yunqi Li, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, Andrew Miller:
SGXonerate:Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE. 617-634 - Heba Aly, Yizhou Liu, Reza Ghaiumy Anaraky, Sushmita Khan, Moses Namara, Kaileigh Angela Byrne, Bart P. Knijnenburg:
Tailoring Digital Privacy Education Interventions for Older Adults: A Comparative Study on Modality Preferences and Effectiveness. 635-656
Volume 2024, Number 2, 2024
- Micah Sherr, Zubair Shafiq:
Editors' Introduction. 1-4 - Sebastian Hasler, Pascal Reisert, Marc Rivinius, Ralf Küsters:
Multipars: Reduced-Communication MPC over Z2k. 5-28 - Gokulnath Pillai, Ajith Suresh, Eikansh Gupta, Vinod Ganapathy, Arpita Patra:
Privadome: Delivery Drones and Citizen Privacy. 29-48 - Dimitris Mouris, Daniel Masny, Ni Trieu, Shubho Sengupta, Prasad Buddhavarapu, Benjamin M. Case:
Delegated Private Matching For Compute. 49-72 - Jiahui Gao, Ni Trieu, Avishay Yanai:
Multiparty Private Set Intersection Cardinality and Its Applications. 73-90 - Jan Charatan, Eleanor Birrell:
Two Steps Forward and One Step Back: The Right to Opt-out of Sale under CPRA. 91-105 - Minh-Ha Le, Niklas Carlsson:
StyleAdv: A Usable Privacy Framework Against Facial Recognition with Adversarial Image Editing. 106-123 - John Delaney, Badih Ghazi, Charlie Harrison, Christina Ilvento, Ravi Kumar, Pasin Manurangsi, Martin Pál, Karthik Prabhakar, Mariana Raykova:
Differentially Private Ad Conversion Measurement. 124-140 - Philip Scherer, Christiane Weis, Thorsten Strufe:
A Framework for Provably Secure Onion Routing against a Global Adversary. 141-159 - Elijah Robert Bouma-Sims, Sanjnah Ananda Kumar, Lorrie Faith Cranor:
Exploring the Privacy Experiences of Closeted Users of Online Dating Services in the US. 160-181 - Yanzi Lin, Jaideep Juneja, Eleanor Birrell, Lorrie Faith Cranor:
Data Safety vs. App Privacy: Comparing the Usability of Android and iOS Privacy Labels. 182-210 - Sebastian Zimmeck, Daniel Goldelman, Owen Kaplan, Logan Brown, Justin Casler, Judeley Jean-Charles, Joe Champeau, Hamza Harkous:
Website Data Transparency in the Browser. 211-234 - Prashant Agrawal, Abhinav Nakarmi, Mahabir Prasad Jhanwar, Subodh Sharma, Subhashis Banerjee:
Traceable mixnets. 235-275 - Lennart Oldenburg, Marc Juarez, Enrique Argones-Rúa, Claudia Díaz:
MixMatch: Flow Matching for Mixnet Traffic. 276-294 - Weijia He, Nathan Reitinger, Atheer Almogbil, Yi-Shyuan Chiang, Timothy J. Pierson, David Kotz:
Contextualizing Interpersonal Data Sharing in Smart Homes. 295-312 - Wei Sun, Tingjun Chen, Neil Gong:
SoK: Secure Human-centered Wireless Sensing. 313-329 - Bart Veldhuizen, Gabriele Spini, Thijs Veugen, Lisa Kohl:
Extending the Security of SPDZ with Fairness. 330-350 - Arthur Américo, Allison Bishop, Paul Cesaretti, Garrison Grogan, Adam McKoy, Robert Moss, Lisa Oakley, Marcel Ribeiro, Mohammad Shokri:
Defining and Controlling Information Leakage in US Equities Trading. 351-371 - Florian M. Farke, David G. Balash, Maximilian Golla, Adam J. Aviv:
How Does Connecting Online Activities to Advertising Inferences Impact Privacy Perceptions? 372-390 - Faxing Wang, Shaanan Cohney, Riad Wahby, Joseph Bonneau:
NOTRY: Deniable messaging with retroactive avowal. 391-411 - Kavous Salehzadeh Niksirat, Diana Korka, Quentin Jacquemin, Céline Vanini, Mathias Humbert, Mauro Cherubini, Sylvain Métille, Kévin Huguenin:
Security and Privacy with Second-Hand Storage Devices: A User-Centric Perspective from Switzerland. 412-433 - Henry Hosseini, Christine Utz, Martin Degeling, Thomas Hupperich:
A Bilingual Longitudinal Analysis of Privacy Policies Measuring the Impacts of the GDPR and the CCPA/CPRA. 434-463 - Iness Ben Guirat, Debajyoti Das, Claudia Díaz:
Blending Different Latency Traffic With Beta Mixing. 464-478
Volume 2024, Number 3, 2024
- Micah Sherr, Zubair Shafiq:
Editors' Introduction. 1-3 - Dimitris Mouris, Pratik Sarkar, Nektarios Georgios Tsoutsos:
PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries. 4-24 - Mazharul Islam, Sunpreet S. Arora, Rahul Chatterjee, Peter Rindal, Maliheh Shirvanian:
Compact: Approximating Complex Activation Functions for Secure Computation. 25-41 - Hamza Saleem, Amir Ziashahabi, Muhammad Naveed, Salman Avestimehr:
Hawk: Accurate and Fast Privacy-Preserving Machine Learning Using Secure Lookup Table Computation. 42-58 - Nan Wang, Dongxi Liu:
FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup. 59-74 - Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere:
SoK: Can Trajectory Generation Combine Privacy and Utility? 75-93 - Sarah Abdelwahab Gaballah, Lamya Abdullah, Mina Alishahi, Thanh Hoang Long Nguyen, Ephraim Zimmer, Max Mühlhäuser, Karola Marky:
Anonify: Decentralized Dual-level Anonymity for Medical Data Donation. 94-108 - Benjamin Mixon-Baca, Jeffrey Knockel, Diwen Xue, Tarun Ayyagari, Deepak Kapur, Roya Ensafi, Jedidiah R. Crandall:
Attacking Connection Tracking Frameworks as used by Virtual Private Networks. 109-126 - Lanjing Liu, Lan Gao, Nikita Soni, Yaxing Yao:
Exploring Design Opportunities for Family-Based Privacy Education in Informal Learning Spaces. 127-143 - Tanveer Khan, Mindaugas Budzys, Khoa Nguyen, Antonis Michalas:
SoK: Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training. 144-164 - Xiuling Wang, Wendy Hui Wang:
GCL-Leak: Link Membership Inference Attacks against Graph Contrastive Learning. 165-185 - Jelle Vos, Sikha Pentyala, Steven Golob, Ricardo Maia, Dean F. Kelley, Zekeriya Erkin, Martine De Cock, Anderson Nascimento:
Privacy-Preserving Membership Queries for Federated Anomaly Detection. 186-201 - John Abascal, Stanley Wu, Alina Oprea, Jonathan R. Ullman:
TMI! Finetuned Models Leak Private Information from their Pretraining Data. 202-223 - Matthew Gregoire, Rachel Thomas, Saba Eskandarian:
CheckOut: User-Controlled Anonymization for Customer Loyalty Programs. 224-245 - Yue Guo, Antigoni Polychroniadou, Elaine Shi, David Byrd, Tucker Balch:
MicroSecAgg: Streamlined Single-Server Secure Aggregation. 246-275 - Connor Bell, Saba Eskandarian:
Anonymous Complaint Aggregation for Secure Messaging. 276-296 - Evan Krul, Hye-young Paik, Sushmita Ruj, Salil S. Kanhere:
SoK: Trusting Self-Sovereign Identity. 297-313 - Arka Rai Choudhuri, Sanjam Garg, Aarushi Goel, Sruthi Sekar, Rohit Sinha:
SublonK: Sublinear Prover PlonK. 314-335 - Aamir Hamid, Hemanth Reddy Samidi, Primal Pappachan, Tim Finin, Roberto Yus:
GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants. 336-352 - Alexander Heinrich, Leon Würsching, Matthias Hollick:
Please Unstalk Me: Understanding Stalking with Bluetooth Trackers and Democratizing Anti-Stalking Protection. 353-371 - Hui-Po Wang, Dingfan Chen, Raouf Kerkouche, Mario Fritz:
FedLAP-DP: Federated Learning by Sharing Differentially Private Loss Approximations. 372-390 - Tingting Tang, Yue Niu, Salman Avestimehr, Murali Annavaram:
Edge Private Graph Neural Networks with Singular Value Perturbation. 391-406 - Ana-Maria Cretu, Daniel Jones, Yves-Alexandre de Montjoye, Shruti Tople:
Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting. 407-430 - Asmaa El fraihi, Nardjes Amieur, Walter Rudametkin, Oana Goga:
Client-side and Server-side Tracking on Meta: Effectiveness and Accuracy. 431-445 - James Choncholas, Pujith Kachana, André Mateus, Gregoire Phillips, Ada Gavrilovska:
Snail: Secure Single Iteration Localization. 446-460 - Muslum Ozgur Ozmen, Habiba Farrukh, Z. Berkay Celik:
Physical Side-Channel Attacks against Intermittent Devices. 461-476 - Liangqin Ren, Zeyan Liu, Fengjun Li, Kaitai Liang, Zhu Li, Bo Luo:
PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption. 477-494 - Md. Jakaria, Danny Yuxing Huang, Anupam Das:
Connecting the Dots: Tracing Data Endpoints in IoT Devices. 495-522 - Pietro Tedeschi, Siva Ganesh Ganti, Savio Sciancalepore:
Selective Authenticated Pilot Location Disclosure for Remote ID-enabled Drones. 523-539 - Soumaya Boussaha, Lukas Hock, Miguel Bermejo, Rubén Cuevas Rumín, Ángel Cuevas Rumín, David Klein, Martin Johns, Luca Compagna, Daniele Antonioli, Thomas Barber:
FP-tracer: Fine-grained Browser Fingerprinting Detection via Taint-tracking and Entropy-based Thresholds. 540-560 - Soha Jiwani, Rachna Sasheendran, Adhishree Abhyankar, Elijah Robert Bouma-Sims, Lorrie Cranor:
Crumbling Cookie Categories: Deconstructing Common Cookie Categories to Create Categories that People Understand. 561-588 - Charlotte Moremen, Jordan Hoogsteden, Eleanor Birrell:
Generational Differences in Understandings of Privacy Terminology. 589-605 - Martin Aumüller, Christian Janos Lebeda, Boel Nelson, Rasmus Pagh:
PLAN: Variance-Aware Private Mean Estimation. 606-625 - Eyal Kushnir, Guy Moshkowich, Hayim Shaul:
Secure Range-Searching Using Copy-And-Recurse. 626-644 - Olivier Sanders, Jacques Traoré:
Compact Issuer-Hiding Authentication, Application to Anonymous Credential. 645-658 - Tianxi Ji, Erman Ayday, Emre Yilmaz, Pan Li:
Privacy-Preserving Fingerprinting Against Collusion and Correlation Threats in Genomic Data. 659-673 - Robin Kirchner, Simon Koch, Noah Kamangar, David Klein, Martin Johns:
A Black-Box Privacy Analysis of Messaging Service Providers' Chat Message Processing. 674-691 - Sajin Sasy, Adithya Vadapalli, Ian Goldberg:
PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures. 692-714 - Nathan Reitinger, Bruce Wen, Michelle L. Mazurek, Blase Ur:
What Does It Mean to Be Creepy? Responses to Visualizations of Personal Browsing Activity, Online Tracking, and Targeted Ads. 715-743 - Micha Horlboge, Erwin Quiring, Roland Meyer, Konrad Rieck:
I still know it's you! On Challenges in Anonymizing Source Code. 744-760
Volume 2024, Number 4, 2024
- Micah Sherr, Zubair Shafiq:
Editors' Introduction. 1-4 - Kevin Liao, Henry Corrigan-Gibbs, Dan Boneh:
Divisible E-Cash for Billing in Private Ad Retargeting. 5-23 - Julian Todt, Simon Hanisch, Thorsten Strufe:
Fantômas: Understanding Face Anonymization Reversibility. 24-43 - Jenny Tang, Léo Alvarez, Arjun Brar, Nguyen Phong Hoang, Nicolas Christin:
Automatic Generation of Web Censorship Probe Lists. 44-60 - Kanav Gupta, Neha Jawalkar, Ananta Mukherjee, Nishanth Chandran, Divya Gupta, Ashish Panwar, Rahul Sharma:
SIGMA: Secure GPT Inference with Function Secret Sharing. 61-79 - Vincent Guan, Florent Guépin, Ana-Maria Cretu, Yves-Alexandre de Montjoye:
A Zero Auxiliary Knowledge Membership Inference Attack on Aggregate Location Data. 80-101 - Shujaat Shujaat Mirza, Corban Villa, Christina Pöpper:
Media talks Privacy: Unraveling a Decade of Privacy Discourse around the World. 102-122 - Héber Hwang Arcolezi, Sébastien Gambs:
Revealing the True Cost of Locally Differentially Private Protocols: An Auditing Perspective. 123-141 - Mir Masood Ali, David G. Balash, Monica Kodwani, Chris Kanich, Adam J. Aviv:
Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies. 142-166 - David Hasselquist, Ethan Witwer, August Carlson, Niklas Johansson, Niklas Carlsson:
Raising the Bar: Improved Fingerprinting Attacks and Defenses for Video Streaming Traffic. 167-184 - Sebastian Linsner, Kilian Demuth, Marc Fischlin, Christian Reuter:
Decision-based Data Distribution (D³): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios. 185-208 - Nirajan Koirala, Jonathan Takeshita, Jeremy Stevens, Taeho Jung:
Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption. 209-225 - Christian Badertscher, Mahdi Sedaghat, Hendrik Waldner:
Unlinkable Policy-Compliant Signatures for Compliant and Decentralized Anonymous Payments. 226-267 - Xiuling Wang, Wendy Hui Wang:
Subgraph Structure Membership Inference Attacks against Graph Neural Networks. 268-290 - Pascal Tippe, Adrian Tippe:
Onion Services in the Wild: A Study of Deanonymization Attacks. 291-310 - Kejsi Take, Jordyn Young, Rasika Bhalerao, Kevin Gallagher, Andrea Forte, Damon McCoy, Rachel Greenstadt:
What to Expect When You're Accessing: An Exploration of User Privacy Rights in People Search Websites. 311-326 - Pengzhi Huang, Thang Hoang, Yueying Li, Elaine Shi, G. Edward Suh:
Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware. 327-348 - Muhammad Abu Bakar Aziz, Christo Wilson:
Johnny Still Can't Opt-out: Assessing the IAB CCPA Compliance Framework. 349-363 - Haoyu He, Isaiah J. King, H. Howie Huang:
Maui: Black-Box Edge Privacy Attack on Graph Neural Networks. 364-380 - Ka-Ho Chow, Sihao Hu, Tiansheng Huang, Fatih Ilhan, Wenqi Wei, Ling Liu:
Diversity-driven Privacy Protection Masks Against Unauthorized Face Recognition. 381-392 - Daniel Hugenroth, Alberto Sonnino, Sam Cutler, Alastair R. Beresford:
Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones. 393-412 - Tess Despres, Marcelino Ayala Constantino, Naomi Zacarias Lizola, Gerardo Sánchez Romero, Shijing He, Xiao Zhan, Noura Abdi, Ruba Abu-Salma, Jose Such, Julia Bernd:
"My Best Friend's Husband Sees and Knows Everything": A Cross-Contextual and Cross-Country Approach to Understanding Smart Home Privacy. 413-449 - Imane Fouad, Cristiana Santos, Pierre Laperdrix:
The Devil is in the Details: Detection, Measurement and Lawfulness of Server-Side Tracking on the Web. 450-465 - Xiaoxin Shen, Eman Alashwali, Lorrie Cranor:
What Do Privacy Advertisements Communicate to Consumers? 466-502 - Alexandra Boldyreva, Zichen Gui, Bogdan Warinschi:
Understanding Leakage in Searchable Encryption: a Quantitative Approach. 503-524 - Johannes Müller, Jan Oupický:
Post-quantum XML and SAML Single Sign-On. 525-543 - Rachel Crowder, George Price, Thomas Groß:
Simply tell me how - On Trustworthiness and Technology Acceptance of Attribute-Based Credentials. 544-564 - Alexandra Boldyreva, Virendra Kumar, Jiahao Sun:
Provable Security Analysis of Butterfly Key Mechanism Protocol in IEEE 1609.2.1 Standard. 565-582 - Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie, Duong Hieu Phan:
Computational Differential Privacy for Encrypted Databases Supporting Linear Queries. 583-604 - Hidayet Aksu, Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi, Adam Sealfon, Avinash V. Varadarajan:
Summary Reports Optimization in the Privacy Sandbox Attribution Reporting API. 605-621 - Jiahui Gao, Son Nguyen, Ni Trieu:
Toward A Practical Multi-party Private Set Union. 622-635 - Christoph U. Günther, Krzysztof Pietrzak:
Deniability in Automated Contact Tracing: Impossibilities and Possibilities. 636-648 - Yunang Chen, David Heath, Rahul Chatterjee, Earlence Fernandes:
Scalable Metadata-Hiding for Privacy-Preserving IoT Systems. 649-664 - Debajyoti Das, Claudia Díaz, Aggelos Kiayias, Thomas Zacharias:
Are continuous stop-and-go mixnets provably secure? 665-683 - Abdullah Çaglar Öksüz, Anisa Halimi, Erman Ayday:
AUTOLYCUS: Exploiting Explainable Artificial Intelligence (XAI) for Model Extraction Attacks against Interpretable Models. 684-699 - Emma Tosch, Luis Garcia, Cynthia Li, Chris Martens:
Privacy Policies on the Fediverse: A Case Study of Mastodon Instances. 700-733 - Noé Zufferey, Kavous Salehzadeh Niksirat, Mathias Humbert, Kévin Huguenin:
Our Data, Our Solutions: A Participatory Approach for Enhancing Privacy in Wearable Activity Tracker Third-Party Apps. 734-754 - Philip Scherer, Christiane Weis, Thorsten Strufe:
Provable Security for the Onion Routing and Mix Network Packet Format Sphinx. 755-783 - Tamir Tassa, Avishay Yanai:
The Multiple Millionaires' Problem: New Algorithmic Approaches and Protocols. 784-796 - Kilian Demuth, Sebastian Linsner, Tom Biselli, Marc-André Kaufhold, Christian Reuter:
Support Personas: A Concept for Tailored Support of Users of Privacy-Enhancing Technologies. 797-817 - Yixin Wu, Xinlei He, Pascal Berrang, Mathias Humbert, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:
Link Stealing Attacks Against Inductive Graph Neural Networks. 818-839 - Xun Yuan, Yang Yang, Prosanta Gope, Aryan Mohammadi Pasikhani, Biplab Sikdar:
VFLGAN: Vertical Federated Learning-based Generative Adversarial Network for Vertically Partitioned Data Publication. 840-858 - Denis Obrezkov:
Privacy Protection Behaviors from a New Angle: Exploratory Analysis on a Russian Sample. 859-871 - Yasha Iravantchi, Thomas Krolikowski, William Wang, Kang G. Shin, Alanson P. Sample:
PrivacyLens: On-Device PII Removal from RGB Images using Thermally-Enhanced Sensing. 872-891 - Minjun Long, David Evans:
Evaluating Google's Protected Audience Protocol. 892-906 - Rune Fiedler, Christian Janson:
A Deniability Analysis of Signal's Initial Handshake PQXDH. 907-928 - Francisco Caravaca, José González Cabañas, Ángel Cuevas, Rubén Cuevas:
Overprofiling Analysis on Major Internet Players. 929-946 - Pascal Berrang, Paul Gerhart, Dominique Schröder:
Measuring Conditional Anonymity - A Global Study. 947-966
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.