


default search action
WPES@CCS 2018: Toronto, ON, Canada
- David Lie, Mohammad Mannan, Aaron Johnson:
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, WPES@CCS 2018, Toronto, ON, Canada, October 15-19, 2018. ACM 2018, ISBN 978-1-4503-5989-4
Session1: Web Privacy
- Martin Degeling
, Jan Nierhoff
:
Tracking and Tricking a Profiler: Automated Measuring and Influencing of Bluekai's Interest Profiling. 1-13 - Gábor György Gulyás, Dolière Francis Somé
, Nataliia Bielova
, Claude Castelluccia:
To Extend or not to Extend: On the Uniqueness of Browser Extensions and Web Logins. 14-27 - Jukka Ruohonen
, Ville Leppänen
:
Invisible Pixels Are Dead, Long Live Invisible Pixels! 28-32 - Michael Carl Tschantz, Serge Egelman
, Jaeyoung Choi, Nicholas Weaver, Gerald Friedland:
The Accuracy of the Demographic Inferences Shown on Google's Ad Settings. 33-41
Session2: Secure Computation
- Deevashwer Rathee, Pradeep Kumar Mishra, Masaya Yasuda:
Faster PCA and Linear Regression through Hypercubes in HElib. 42-53 - Yongjun Zhao
, Sherman S. M. Chow
:
Can You Find The One for Me? 54-65 - Nikolaos P. Karvelas, Amos Treiber, Stefan Katzenbeisser:
Examining Leakage of Access Counts in ORAM Constructions. 66-70 - Thomas Schneider
, Oleksandr Tkachenko
:
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases. 71-75
Session 3: Secure Cmmunication
- Hussein Darir
, Hussein Sibai
, Nikita Borisov
, Geir E. Dullerud, Sayan Mitra
:
TightRope: Towards Optimal Load-balancing of Paths in Anonymous Networks. 76-85 - Bogdan Kulynych, Wouter Lueks, Marios Isaakidis, George Danezis, Carmela Troncoso:
ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging. 86-103 - Sebastian Angel, David Lazar, Ioanna Tzialla:
What's a Little Leakage Between Friends? 104-108 - David Lu, Sanjit Bhat
, Albert Kwon, Srinivas Devadas:
DynaFlow: An Efficient Website Fingerprinting Defense Based on Dynamically-Adjusting Flows. 109-113
Session 4: Data and Identity
- Kai Chih Chang, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Enhancing and Evaluating Identity Privacy and Authentication Strength by Utilizing the Identity Ecosystem. 114-120 - Shubhra Kanti Karmaker Santu
, Vincent Bindschaedler
, ChengXiang Zhai, Carl A. Gunter:
NRF: A Naive Re-identification Framework. 121-132 - Simson L. Garfinkel
, John M. Abowd, Sarah Powazek:
Issues Encountered Deploying Differential Privacy. 133-137 - Christopher McKnight, Ian Goldberg:
Style Counsel: Seeing the (Random) Forest for the Trees in Adversarial Code Stylometry. 138-142
Session 5: Privacy Goals and Stategies
- Majed Alshammari, Andrew Simpson
:
Privacy Architectural Strategies: An Approach for Achieving Various Levels of Privacy Protection. 143-154 - Eleanor Birrell, Anders T. Gjerdrum, Robbert van Renesse, Håvard D. Johansen, Dag Johansen, Fred B. Schneider:
SGX Enforcement of Use-Based Privacy. 155-167 - Joshua Tan, Mahmood Sharif
, Sruti Bhagavatula, Matthias Beckerle, Michelle L. Mazurek, Lujo Bauer
:
Comparing Hypothetical and Realistic Privacy Valuations. 168-182

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.