


default search action
Proceedings on Privacy Enhancing Technologies, Volume 2015
Volume 2015, Number 1, April 2015
- Apu Kapadia, Steven J. Murdoch:

Editors' Introduction. 1-3 - Aaron D. Jaggard

, Aaron Johnson, Sarah Cortes, Paul Syverson, Joan Feigenbaum:
20, 000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables. 4-24 - Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar:

Know Thy Neighbor: Crypto Library Detection in Cloud. 25-40 - Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:

Portrait of a Privacy Invasion. 41-60 - Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall

:
Analyzing the Great Firewall of China Over Space and Time. 61-76 - Vasile Claudiu Perta, Marco Valerio Barbera, Gareth Tyson, Hamed Haddadi, Alessandro Mei:

A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients. 77-91 - Amit Datta, Michael Carl Tschantz, Anupam Datta:

Automated Experiments on Ad Privacy Settings. 92-112
Volume 2015, Number 2, June 2015
- Apu Kapadia, Steven J. Murdoch:

Editors' Introduction. 1-3 - Nikita Borisov, George Danezis, Ian Goldberg:

DP5: A Private Presence Service. 4-24 - Ghada Arfaoui

, Jean-François Lalande, Jacques Traoré, Nicolas Desmoulins, Pascal Berthomé, Saïd Gharout:
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing. 25-45 - David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, Vern Paxson:

Blocking-resistant communication through domain fronting. 46-64 - Jamie Hayes, George Danezis:

Guard Sets for Onion Routing. 65-80 - Erik-Oliver Blass, Travis Mayberry, Guevara Noubir:

Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists. 81-98 - Mathias Humbert, Kévin Huguenin

, Joachim Hugonot, Erman Ayday, Jean-Pierre Hubaux:
De-anonymizing Genomic Databases Using Phenotypic Traits. 99-114 - Tarik Moataz, Erik-Oliver Blass, Guevara Noubir:

Recursive Trees for Practical ORAM. 115-134 - Luís T. A. N. Brandão

, Nicolas Christin
, George Danezis, anonymous:
Toward Mending Two Nation-Scale Brokered Identification Systems. 135-155 - Konstantinos Chatzikokolakis, Catuscia Palamidessi, Marco Stronati:

Constructing elastic distinguishability metrics for location privacy. 156-170 - Joshua Juen, Aaron Johnson, Anupam Das, Nikita Borisov, Matthew Caesar:

Defending Tor from Network Adversaries: A Case Study of Network Path Prediction. 171-187 - Peeter Laud

:
Parallel Oblivious Array Access for Secure Multiparty Computation and Privacy-Preserving Minimum Spanning Trees. 188-205 - Markulf Kohlweiss, Ian Miers:

Accountable Metadata-Hiding Escrow: A Group Signature Case Study. 206-221 - Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang:

Optimal Rate Private Information Retrieval from Homomorphic Encryption. 222-243 - Rajesh Krishnan, Ravi Sundaram:

Secure and scalable match: overcoming the universal circuit bottleneck using group programs. 244-262 - Melissa Chase, Emily Shen:

Substring-Searchable Symmetric Encryption. 263-281 - David Gugelmann, Markus Happe

, Bernhard Ager, Vincent Lenders:
An Automated Approach for Complementing Ad Blockers' Blacklists. 282-298 - Reza Shokri

:
Privacy Games: Optimal User-Centric Data Obfuscation. 299-315

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














