


default search action
Proceedings on Privacy Enhancing Technologies, Volume 2016
Volume 2016, Number 1, January 2016
- Apu Kapadia:

Editor's Introduction. 1-3 - Andreas Kurtz, Hugo Gascon, Tobias Becker, Konrad Rieck, Felix C. Freiling:

Fingerprinting Mobile Devices Using Personalized Configurations. 4-19 - Oleksii Starov, Phillipa Gill, Nick Nikiforakis:

Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms. 20-33 - Miro Enev, Alex Takakuwa, Karl Koscher, Tadayoshi Kohno:

Automobile Driver Fingerprinting. 34-50
Volume 2016, Number 2, April 2016
- Claudia Díaz, Apu Kapadia:

Editors' Introduction. 1-3 - João Matos, João Garcia, Nuno Coração:

Isolating Graphical Failure-Inducing Input for Privacy Protection in Error Reporting Systems. 4-21 - Dong Lin, Micah Sherr, Boon Thau Loo

:
Scalable and Anonymous Group Communication with MTor. 22-39 - Michael Backes, Sebastian Meiser, Marcin Slowik:

Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks. 40-60 - Yu Pu, Jens Grossklags:

Towards a Model on the Factors Influencing Social App Users' Valuation of Interdependent Privacy. 61-81 - Payman Mohassel, Ostap Orobets, Ben Riva:

Efficient Server-Aided 2PC for Mobile Phones. 82-99 - Sakshi Jain, Mobin Javed, Vern Paxson:

Towards Mining Latent Client Identifiers from Network Traffic. 100-114 - Albert Kwon, David Lazar, Srinivas Devadas, Bryan Ford:

Riffle: An Efficient Communication System With Strong Anonymity. 115-134 - William Melicher, Mahmood Sharif, Joshua Tan, Lujo Bauer

, Mihai Christodorescu, Pedro Giovanni Leon:
(Do Not) Track Me Sometimes: Users' Contextual Preferences for Web Tracking. 135-154 - Carlos Aguilar Melchor, Joris Barrier, Laurent Fousse, Marc-Olivier Killijian:

XPIR : Private Information Retrieval for Everyone. 155-174 - Shuai Li, Nicholas Hopper:

Mailet: Instant Social Networking under Censorship. 175-192
Volume 2016, Number 3, July 2016
- Claudia Díaz, Apu Kapadia:

Editors' Introduction. 1-3 - Rinku Dewri, Toan Ong, Ramakrishna Thurimella:

Linking Health Records for Federated Query Processing. 4-23 - Jean-Sébastien Légaré, Róbert Sumi, William Aiello:

Beeswax: a platform for private web apps. 24-40 - Giulia Fanti, Vasyl Pihur, Úlfar Erlingsson:

Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries. 41-61 - Tibor Jager, Andy Rupp

:
Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. 62-82 - Emmanuel Bello-Ogunu, Mohamed Shehab:

Crowdsourcing for Context: Regarding Privacy in Beacon Encounters via Contextual Integrity. 83-95 - Chad Spensky, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick Housley, Robert K. Cunningham:

SoK: Privacy on Mobile Devices - It's Complicated. 96-116 - Dan Bogdanov

, Liina Kamm
, Baldur Kubo, Reimo Rebane, Ville Sokk, Riivo Talviste
:
Students and Taxes: a Privacy-Preserving Study Using Secure Computation. 117-135 - Laurent Simon, Wenduan Xu, Ross J. Anderson:

Don't Interrupt Me While I Type: Inferring Text Entered Through Gesture Typing on Android Keyboards. 136-154 - Rebekah Overdorf, Rachel Greenstadt:

Blogs, Twitter Feeds, and Reddit Comments: Cross-domain Authorship Attribution. 155-171 - Yang Wang, Huichuan Xia, Yaxing Yao, Yun Huang:

Flying Eyes and Hidden Controllers: A Qualitative Study of People's Privacy Perceptions of Civilian Drones in The US. 172-190 - Samuel Grogan, Aleecia M. McDonald:

Access Denied! Contrasting Data Access in the United States and Ireland. 191-211 - Richard McPherson, Amir Houmansadr, Vitaly Shmatikov:

CovertCast: Using Live Streaming to Evade Internet Censorship. 212-225
Volume 2016, Number 4, October 2016
- Claudia Díaz, Apu Kapadia:

Editors' Introduction. 1-3 - Frederick Douglas, Rorshach, Weiyang Pan, Matthew Caesar:

Salmon: Robust Proxy Distribution for Censorship Circumvention. 4-20 - Tao Wang, Ian Goldberg:

On Realistically Attacking Tor with Website Fingerprinting. 21-36 - Sheharbano Khattak, Tariq Elahi

, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch
, Ian Goldberg:
SoK: Making Sense of Censorship Resistance Systems. 37-61 - Hao Wu, Yih-Chun Hu:

Location Privacy with Randomness Consistency. 62-82 - Tariq Elahi

, John A. Doucette, Hadi Hosseini, Steven J. Murdoch
, Ian Goldberg:
A Framework for the Game-theoretic Analysis of Censorship Resistance. 83-101 - Kassem Fawaz, Kyu-Han Kim, Kang G. Shin:

Privacy vs. Reward in Indoor Location-Based Services. 102-122 - Hamza Harkous, Rameez Rahman, Bojan Karlas, Karl Aberer:

The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps. 123-143 - Marina Blanton

, Fattaneh Bayatbabolghani:
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation. 144-164 - Berker Agir, Kévin Huguenin

, Urs Hengartner, Jean-Pierre Hubaux:
On the Privacy Implications of Location Semantics. 165-183 - Raphael R. Toledo, George Danezis

, Ian Goldberg:
Lower-Cost ∈-Private Information Retrieval. 184-201 - Ryan Henry

:
Polynomial Batch Codes for Efficient IT-PIR. 202-218 - John M. Schanck, William Whyte, Zhenfei Zhang:

Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world. 219-236 - Christoph Bösch

, Benjamin Erb
, Frank Kargl, Henning Kopp, Stefan Pfattheicher
:
Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns. 237-254 - Pierre-Alain Fouque

, Cristina Onete
, Benjamin Richard:
Achieving Better Privacy for the 3GPP AKA Protocol. 255-275 - Henry Tan, Micah Sherr, Wenchao Zhou:

Data-plane Defenses against Routing Attacks on Tor. 276-293 - Yaoqi Jia, Guangdong Bai, Prateek Saxena, Zhenkai Liang:

Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation. 294-314 - Dominik Leibenger, Frederik Möllers

, Anna Petrlic, Ronald Petrlic, Christoph Sorge:
Privacy Challenges in the Quantified Self Movement - An EU Perspective. 315-334 - David J. Wu, Tony Feng, Michael Naehrig, Kristin E. Lauter:

Privately Evaluating Decision Trees and Random Forests. 335-355 - Armon Barton, Matthew Wright:

DeNASA: Destination-Naive AS-Awareness in Anonymous Communications. 356-372 - Esha Ghosh, Olga Ohrimenko

, Roberto Tamassia:
Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge. 373-388 - Minhui Xue, Gabriel Magno, Evandro Cunha, Virgílio A. F. Almeida, Keith W. Ross:

The Right to be Forgotten in the Media: A Data-Driven Study. 389-402 - Steven Hill, Zhimin Zhou, Lawrence K. Saul, Hovav Shacham:

On the (In)effectiveness of Mosaicing and Blurring as Tools for Document Redaction. 403-417 - Susan E. McGregor, Franziska Roesner, Kelly Caine:

Individual versus Organizational Computer Security and Privacy Concerns in Journalism. 418-435 - Pedro Moreno-Sanchez

, Muhammad Bilal Zafar, Aniket Kate:
Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network. 436-453 - Mauro Conti

, Stephen Crane, Tommaso Frassetto, Andrei Homescu, Georg Koppen, Per Larsen, Christopher Liebchen, Mike Perry, Ahmad-Reza Sadeghi:
Selfrando: Securing the Tor Browser against De-anonymization Exploits. 454-469 - Gábor György Gulyás, Gergely Ács, Claude Castelluccia:

Near-Optimal Fingerprinting with Constraints. 470-487

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














