


default search action
Proceedings on Privacy Enhancing Technologies, Volume 2017
Volume 2017, Number 1, January 2017
- Claudia Díaz, Rachel Greenstadt, Damon McCoy:

Editors' Introduction. 1-3 - Zachary A. Kissel

, Jie Wang:
Generic Adaptively Secure Searchable Phrase Encryption. 4-20 - Jesse Victors, Ming Li, Xinwen Fu

:
The Onion Name System. 21-41 - Zachary Weinberg

, Mahmood Sharif, Janos Szurdi, Nicolas Christin
:
Topics of Controversy: An Empirical Analysis of Web Censorship Lists. 42-61 - M. Sadegh Riazi, Ebrahim M. Songhori, Ahmad-Reza Sadeghi, Thomas Schneider

, Farinaz Koushanfar
:
Toward Practical Secure Stable Matching. 62-78 - Muhammad Ikram

, Hassan Jameel Asghar
, Mohamed Ali Kâafar
, Anirban Mahanti, Balachander Krishnamurthy:
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning. 79-99 - Chen Chen, Adrian Perrig:

PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer. 100-117 - Mojtaba Eskandari, Bruno Kessler, Maqsood Ahmad, Anderson Santana de Oliveira, Bruno Crispo:

Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps. 118-131 - Chen Liu, Hoda Aghaei Khouzani

, Chengmo Yang:
ErasuCrypto: A Light-weight Secure Data Deletion Scheme for Solid State Drives. 132-148 - Yongjun Zhao

, Sherman S. M. Chow
:
Are you The One to Share? Secret Transfer with Access Structure. 149-169 - Stephan Heuser, Bradley Reaves

, Praveen Kumar Pendyala, Henry Carter
, Alexandra Dmitrienko, William Enck, Negar Kiyavash, Ahmad-Reza Sadeghi, Patrick Traynor:
Phonion: Practical Protection of Metadata in Telephony Networks. 170-187
Volume 2017, Number 2, April 2017
- Claudia Díaz, Rachel Greenstadt, Damon McCoy:

Editors' Introduction. 1-3 - Florentin Rochet, Olivier Pereira:

Waterfilling: Balancing the Tor network with maximum diversity. 4-22 - Yousra Javed, Mohamed Shehab:

Look before you Authorize: Using Eye-Tracking to Enforce User Attention towards Application Permissions. 23-37 - Anh Pham, Italo Dacosta, Bastien Jacot-Guillarmod, Kévin Huguenin

, Taha Hajar, Florian Tramèr
, Virgil D. Gligor, Jean-Pierre Hubaux:
PrivateRide: A Privacy-Enhanced Ride-Hailing Service. 38-56 - Zhe Zhou, Wenrui Diao

, Xiangyu Liu, Zhou Li
, Kehuan Zhang, Rui Liu
:
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU. 57-73 - Aaron Johnson, Rob Jansen, Nicholas Hopper, Aaron Segal, Paul Syverson:

PeerFlow: Secure Load Balancing in Tor. 74-94 - Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, Giovanni Vigna:

On the Privacy and Security of the Ultrasound Ecosystem. 95-112 - Yao Li, Alfred Kobsa, Bart P. Knijnenburg, M.-H. Carolyn Nguyen:

Cross-Cultural Privacy Prediction. 113-132 - Justin Brookman, Phoebe Rouge, Aaron Alva, Christina Yeung:

Cross-Device Tracking: Measurement and Disclosures. 133-148 - Joshua Gancher, Adam Groce, Alex Ledger:

Externally Verifiable Oblivious RAM. 149-171 - William R. Marczak, Vern Paxson:

Social Engineering Attacks on Government Opponents: Target Perspectives. 172-185 - Giovanni Cherubin, Jamie Hayes, Marc Juarez

:
Website Fingerprinting Defenses at the Application Layer. 186-203
Volume 2017, Number 3, July 2017
- Claudia Díaz, Rachel Greenstadt, Damon McCoy:

Editors' Introduction. 1 - Dominik Schürmann

, Fabian Kabus, Gregor Hildermeier, Lars C. Wolf:
Wiretapping End-to-End Encrypted VoIP Calls: Real-World Attacks on ZRTP. 4 - Hung Dang, Tien Tuan Anh Dinh, Ee-Chien Chang, Beng Chin Ooi:

Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute. 21 - Peter Ney, Ian Smith, Gabriel Cadamuro, Tadayoshi Kohno:

SeaGlass: Enabling City-Wide IMSI-Catcher Detection. 39 - Ruben Recabarren, Bogdan Carbunar:

Hardening Stratum, the Bitcoin Pool Mining Protocol. 57 - Kevin Corre, Olivier Barais, Gerson Sunyé, Vincent Frey, Jean-Michel Crom:

Why can't users choose their identity providers on the web? 75 - Linda Naeun Lee, David Fifield, Nathan Malkin, Ganesh Iyer, Serge Egelman, David A. Wagner:

A Usability Evaluation of Tor Launcher. 90 - Pedro Moreno-Sanchez

, Tim Ruffing
, Aniket Kate:
PathShuffle: Credit Mixing and Anonymous Payments for Ripple. 110 - Muhammad Haris Mughees, Zhiyun Qian, Zubair Shafiq:

Detecting Anti Ad-blockers in the Wild. 130 - Gilad Asharov

, Daniel Demmler, Michael Schapira, Thomas Schneider
, Gil Segev, Scott Shenker, Michael Zohner:
Privacy-Preserving Interdomain Routing at Internet Scale. 147 - Cédric Van Rompay, Refik Molva, Melek Önen:

A Leakage-Abuse Attack Against Multi-User Searchable Encryption. 168 - Anrin Chakraborti, Chen Chen, Radu Sion

:
DataLair: Efficient Block Storage with Plausible Deniability against Multi-Snapshot Adversaries. 179
Volume 2017, Number 4, October 2017
- Claudia Díaz, Rachel Greenstadt, Damon McCoy:

Editors' Introduction. 1-4 - Diogo Barradas, Nuno Santos, Luís E. T. Rodrigues:

DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams. 5-22 - Peeter Laud

, Alisa Pankova, Roman Jagomägis:
Preprocessing Based Verification of Multiparty Protocols with Honest Majority. 23-76 - Wisam Eltarjaman, Rinku Dewri, Ramakrishna Thurimella:

Location Privacy for Rank-based Geo-Query Systems. 77-96 - Kovila P. L. Coopamootoo, Thomas Groß:

Why Privacy Is All But Forgotten. 97-118 - Qatrunnada Ismail, Tousif Ahmed, Kelly Caine, Apu Kapadia, Michael K. Reiter:

To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings. 119-137 - Takao Murakami:

Expectation-Maximization Tensor Factorization for Practical Location Privacy Attacks. 138-155 - Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro:

What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy. 156-176 - Ágnes Kiss, Jian Liu, Thomas Schneider

, N. Asokan, Benny Pinkas:
Private Set Intersection for Unequal Set Sizes with Mobile Applications. 177-197 - Niklas Büscher, Spyros Boukoros, Stefan Bauregger, Stefan Katzenbeisser:

Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering. 198-214 - Giovanni Cherubin:

Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses. 215-231 - David Froelicher, Patricia Egger, João Sá Sousa, Jean Louis Raisaro

, Zhicong Huang, Christian Mouchet, Bryan Ford, Jean-Pierre Hubaux:
UnLynx: A Decentralized System for Privacy-Conscious Data Sharing. 232-250 - Se Eun Oh, Shuai Li, Nicholas Hopper:

Fingerprinting Keywords in Search Queries over Tor. 251-270 - Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang:

Personalized Pseudonyms for Servers in the Cloud. 271-289 - Fatemeh Rezaei, Amir Houmansadr:

TagIt: Tagging Network Flows using Blind Fingerprints. 290-307 - Konstantinos Chatzikokolakis, Ehab ElSalamouny, Catuscia Palamidessi:

Efficient Utility Improvement for Location Privacy. 308-328 - Saba Eskandarian, Eran Messeri, Joseph Bonneau, Dan Boneh:

Certificate Transparency with Privacy. 329-344 - Adrià Gascón, Phillipp Schoppmann

, Borja Balle, Mariana Raykova, Jack Doerner, Samee Zahur, David Evans:
Privacy-Preserving Distributed Linear Regression on High-Dimensional Data. 345-364 - Jeremy Martin, Travis Mayberry, Collin Donahue, Lucas Foppe, Lamont Brown, Chadwick Riggins, Erik C. Rye, Dane Brown:

A Study of MAC Address Randomization in Mobile Devices and When it Fails. 365-383 - Sazzadur Rahaman, Long Cheng, Danfeng Daphne Yao, He Li, Jung-Min "Jerry" Park:

Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation. 384-403 - Carmela Troncoso, Marios Isaakidis, George Danezis, Harry Halpin:

Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments. 404-426

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














