Stop the war!
Остановите войну!
for scientists:
default search action
Proceedings on Privacy Enhancing Technologies, Volume 2024
Volume 2024, Number 1, January 2024
- Micah Sherr, Zubair Shafiq:
Editors' Introduction. 1-4 - Nurullah Demir, Tobias Urban, Norbert Pohlmann, Christian Wressnegger:
A Large-Scale Study of Cookie Banner Interaction Tools and their Impact on Users' Privacy. 5-20 - Gonzalo Munilla Garrido, Vivek Nair, Dawn Song:
SoK: Data Privacy in Virtual Reality. 21-40 - Yohan Beugin, Patrick D. McDaniel:
Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving). 41-57 - Lawrence Lim, Wei-Yee Goh, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta:
QUICKeR: Quicker Updates Involving Continuous Key Rotation. 58-73 - Marina Blanton, Dennis Murphy, Chen Yuan:
Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits. 74-97 - James K. Holland, Jason Carpenter, Se Eun Oh, Nicholas Hopper:
DeTorrent: An Adversarial Padding-only Traffic Analysis Defense. 98-115 - Simon Hanisch, Julian Todt, Jose Patino, Nicholas W. D. Evans, Thorsten Strufe:
A False Sense of Privacy: Towards a Reliable Evaluation Methodology for the Anonymization of Biometric Data. 116-132 - Yixin Zou, Kaiwen Sun, Tanisha Afnan, Ruba Abu-Salma, Robin Brewer, Florian Schaub:
Cross-Contextual Examination of Older Adults' Privacy Concerns, Behaviors, and Vulnerabilities. 133-150 - Stefan Albert Horstmann, Samuel Domiks, Marco Gutfleisch, Mindy Tran, Yasemin Acar, Veelasha Moonsamy, Alena Naiakshina:
"Those things are written by lawyers, and programmers are reading that." Mapping the Communication Gap Between Software Developers and Privacy Experts. 151-170 - Tom Biselli, Laura Utz, Christian Reuter:
Supporting Informed Choices about Browser Cookies: The Impact of Personalised Cookie Banners. 171-191 - Lorin Schöni, Karel Kubicek, Verena Zimmermann:
Block Cookies, Not Websites: Analysing Mental Models and Usability of the Privacy-Preserving Browser Extension CookieBlock. 192-216 - Christopher B. Landis, Joshua A. Kroll:
Mitigating Inference Risks with the NIST Privacy Framework. 217-231 - Amirhossein Adavoudi Jolfaei, Andy Rupp, Stefan Schiffner, Thomas Engel:
Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure. 232-257 - Sebastian Zimmeck, Eliza Kuller, Chunyue Ma, Bella Tassone, Joe Champeau:
Generalizable Active Privacy Choice: Designing a Graphical User Interface for Global Privacy Control. 258-279 - Zengrui Liu, Umar Iqbal, Nitesh Saxena:
Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy? 280-299 - Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini:
Privacy Preserving Feature Selection for Sparse Linear Regression. 300-313 - Srdan Krstic, Hoang Nguyen Phuoc Bao, David A. Basin:
Model-driven Privacy. 314-329 - Azra Abtahi, Mathias Payer, Amir Aminifar:
DP-ACT: Decentralized Privacy-Preserving Asymmetric Digital Contact Tracing. 330-342 - Killian Davitt, Dan Ristea, Duncan Russell, Steven J. Murdoch:
CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser. 343-356 - Johannes Müller, Balázs Pejó, Ivan Pryvalov:
DeVoS: Deniable Yet Verifiable Vote Updating. 357-378 - Rachel McAmis, Mattea Sim, Mia M. Bennett, Tadayoshi Kohno:
Over Fences and Into Yards: Privacy Threats and Concerns of Commercial Satellites. 379-396 - Nan Cheng, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita, Kazunari Tozawa:
Constant-Round Private Decision Tree Evaluation for Secret Shared Data. 397-412 - Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov:
Data Isotopes for Data Provenance in DNNs. 413-429 - Seny Kamara, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, Amos Treiber:
MAPLE: MArkov Process Leakage attacks on Encrypted Search. 430-446 - Tushar M. Jois, Gabrielle Beck, Sofia Belikovetsky, Joseph Carrigan, Alishah Chator, Logan Kostick, Maximilian Zinkus, Gabriel Kaptchuk, Aviel D. Rubin:
SocIoTy: Practical Cryptography in Smart Home Contexts. 447-464 - Paul Vines, Samuel McKay, Jesse Jenter, Suresh Krishnaswamy:
Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship. 465-477 - Chuan Yan, Fuman Xie, Mark Huasong Meng, Yanjun Zhang, Guangdong Bai:
On the Quality of Privacy Policy Documents of Virtual Personal Assistant Applications. 478-493 - Tsunato Nakai, Ye Wang, Kota Yoshida, Takeshi Fujino:
SEDMA: Self-Distillation with Model Aggregation for Membership Privacy. 494-508 - Sajin Sasy, Ian Goldberg:
SoK: Metadata-Protecting Communication Systems. 509-524 - Caelin Kaplan, Chuan Xu, Othmane Marfoq, Giovanni Neglia, Anderson Santana de Oliveira:
A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses. 525-548 - Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis, Bogdan Warinschi:
SWiSSSE: System-Wide Security for Searchable Symmetric Encryption. 549-581 - Sayan Biswas, Catuscia Palamidessi:
PRIVIC: A privacy-preserving method for incremental collection of location data. 582-596 - François Hublet, David A. Basin, Srdan Krstic:
User-Controlled Privacy: Taint, Track, and Control. 597-616 - Nerla Jean-Louis, Yunqi Li, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, Andrew Miller:
SGXonerate:Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE. 617-634 - Heba Aly, Yizhou Liu, Reza Ghaiumy Anaraky, Sushmita Khan, Moses Namara, Kaileigh Angela Byrne, Bart P. Knijnenburg:
Tailoring Digital Privacy Education Interventions for Older Adults: A Comparative Study on Modality Preferences and Effectiveness. 635-656
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.