


default search action
WPES 2013: Berlin, Germany
- Ahmad-Reza Sadeghi, Sara Foresti:

Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, WPES 2013, Berlin, Germany, November 4, 2013. ACM 2013, ISBN 978-1-4503-2485-4
Session 1A: privacy in social network and access control
- Lujo Bauer

, Lorrie Faith Cranor
, Saranga Komanduri, Michelle L. Mazurek, Michael K. Reiter, Manya Sleeper, Blase Ur:
The post anachronism: the temporal dimension of facebook privacy. 1-12 - Jan Camenisch, Günter Karjoth, Gregory Neven, Franz-Stefan Preiss:

Anonymously sharing Flickr pictures with facebook friends. 13-24 - Animesh Nandi, Armen Aghasaryan, Ishan Chhabra:

On the use of decentralization to enable privacy in web-scale recommendation services. 25-36 - Markulf Kohlweiss

, Alfredo Rial:
Optimally private access control. 37-48
Session 1B: anonymity
- George Danezis, Carmela Troncoso

:
You cannot hide for long: de-anonymization of real-world dynamic behaviour. 49-60 - Valentin Tudor, Magnus Almgren

, Marina Papatriantafilou
:
Analysis of the impact of data granularity on privacy for the smart grid. 61-70 - Ryan Henry

, Ian Goldberg:
Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting. 71-82 - Tobias Pulls, Roel Peeters

, Karel Wouters:
Distributed privacy-preserving transparency logging. 83-94
Session 2A: privacy of genomic data and of accesses
- Erman Ayday, Jean Louis Raisaro

, Jean-Pierre Hubaux, Jacques Rougemont:
Protecting and evaluating genomic privacy in medical tests and personalized medicine. 95-106 - Emiliano De Cristofaro, Sky Faber, Gene Tsudik:

Secure genomic testing with size- and position-hiding private substring matching. 107-118 - Yizhou Huang, Ian Goldberg:

Outsourced private information retrieval. 119-130
Session 2B: privacy preserving computation
- Véronique Cortier, David Galindo

, Stéphane Glondu
, Malika Izabachène:
Distributed ElGamal à la Pedersen: Application to Helios. 131-142 - Florian Kerschbaum, Hoon Wei Lim, Ivan Gudymenko:

Privacy-preserving billing for e-ticketing systems in public transportation. 143-154 - Ayman Jarrous, Benny Pinkas:

Canon-MPC, a system for casual non-interactive secure multi-party computation using native client. 155-166
Session 3A: location privacy
- Michael Herrmann, Carmela Troncoso

, Claudia Díaz, Bart Preneel
:
Optimal sporadic location privacy preserving systems in presence of bandwidth constraints. 167-178 - Igor Bilogrevic, Kévin Huguenin

, Murtuza Jadliwala, Florent Lopez, Jean-Pierre Hubaux, Philip Ginzboorg
, Valtteri Niemi:
Inferring social ties in academic networks using short-range wireless communications. 179-188 - Md. Moniruzzaman, Ken Barker:

Redeem with privacy (RWP): privacy protecting framework for geo-social commerce. 189-200
Session 3B: anonymous communication
- Tao Wang, Ian Goldberg:

Improved website fingerprinting on Tor. 201-212 - Philipp Winter, Tobias Pulls, Jürgen Fuß

:
ScrambleSuit: a polymorphic network protocol to circumvent censorship. 213-224 - Nethanel Gelernter, Amir Herzberg

:
On the limits of provable anonymity. 225-236
Session 4A: privacy protocols, password security, and privacy in social media
- Michael Backes, Martin Gagné, Malte Skoruppa:

Using mobile device communication to strengthen e-Voting protocols. 237-242 - Henry Corrigan-Gibbs, Bryan Ford

:
Conscript your friends into larger anonymity sets with JavaScript. 243-248 - Hong Liu, Eugene Y. Vasserman

, Nicholas Hopper:
Improved group off-the-record messaging. 249-254 - Rishab Nithyanand, Rob Johnson:

The password allocation problem: strategies for reusing passwords effectively. 255-260 - Miltiadis Kandias, Vasilis Stavrou, Nick Bozovic, Dimitris Gritzalis:

Proactive insider threat detection through social media: the YouTube case. 261-266
Session 4B: identify and assess privacy risks
- Rinku Dewri, Prasad Annadata, Wisam Eltarjaman, Ramakrishna Thurimella:

Inferring trip destinations from driving habits data. 267-272 - Christopher J. Riederer, Augustin Chaintreau

, Jacob Cahan, Vijay Erramilli:
Challenges of keyword-based location disclosure. 273-278 - Delfina Malandrino

, Andrea Petta, Vittorio Scarano
, Luigi Serra, Raffaele Spinelli, Balachander Krishnamurthy:
Privacy awareness about information leakage: who knows what about me? 279-284 - Xujing Huang, Pasquale Malacaria:

SideAuto: quantitative information flow for side-channel leakage in web applications. 285-290 - Frances Zhang, Fuming Shih, Daniel J. Weitzner:

No surprises: measuring intrusiveness of smartphone applications by detecting objective context deviations. 291-296

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














