


default search action
Proceedings on Privacy Enhancing Technologies, Volume 2018
Volume 2018, Number 1, January 2018
- Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. 1-4 - Mohammad Etemad, Alptekin Küpçü
, Charalampos Papamanthou, David Evans:
Efficient Dynamic Searchable Encryption with Forward Privacy. 5-20 - Nik Unger, Ian Goldberg:
Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging. 21-66 - Raffael Bild, Klaus A. Kuhn, Fabian Prasser:
SafePub: A Truthful Data Anonymization Algorithm With Strong Privacy Guarantees. 67-87 - Anupam Das, Nikita Borisov, Edward Chou:
Every Move You Make: Exploring Practical Issues in Smartphone Motion Sensor Fingerprinting and Countermeasures. 88-108 - Steven Englehardt, Jeffrey Han, Arvind Narayanan:
I never signed up for this! Privacy implications of email tracking. 109-126 - Lucy Simko, Luke Zettlemoyer, Tadayoshi Kohno:
Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution. 127-144 - Mohsen Imani, Armon Barton, Matthew Wright:
Guard Sets in Tor using AS Relationships. 145-165
Volume 2018, Number 2, April 2018
- Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. 1-3 - Mohammad Alaggan, Mathieu Cunche, Sébastien Gambs:
Privacy-preserving Wi-Fi Analytics. 4-26 - Florentin Rochet, Olivier Pereira:
Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols. 27-46 - Michael Freyberger, Warren He, Devdatta Akhawe, Michelle L. Mazurek, Prateek Mittal:
Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers. 47-63 - Dominic Deuber
, Matteo Maffei, Giulio Malavolta
, Max Rabkin, Dominique Schröder, Mark Simkin:
Functional Credentials. 64-84 - Phillip Rogaway, Yusi Zhang:
Onion-AE: Foundations of Nested Encryption. 85-104 - Sarah Meiklejohn, Rebekah Mercer:
Möbius: Trustless Tumbling for Transaction Privacy. 105-121 - Rahat Masood, Benjamin Zi Hao Zhao, Hassan Jameel Asghar
, Mohamed Ali Kâafar
:
Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking. 122-142
Volume 2018, Number 3, June 2018
- Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. 1-4 - Dionysis Manousakas, Cecilia Mascolo, Alastair R. Beresford, Dennis Chan, Nikhil Sharma:
Quantifying Privacy Loss of Human Mobility Graph Topology. 5-21 - Ryan Wails
, Yixin Sun, Aaron Johnson, Mung Chiang, Prateek Mittal:
Tempest: Temporal Dynamics in Anonymity Systems. 22-42 - Cecylia Bocovich, Ian Goldberg:
Secure asymmetry and deployability for decoy routing systems. 43-62 - Irwin Reyes, Primal Wijesekera
, Joel Reardon, Amit Elazari Bar On, Abbas Razaghpanah
, Narseo Vallina-Rodriguez, Serge Egelman:
"Won't Somebody Think of the Children?" Examining COPPA Compliance at Scale. 63-83 - Takao Murakami, Hideitsu Hino, Jun Sakuma:
Toward Distribution Estimation under Local Differential Privacy with Small Samples. 84-104 - Matthew Smith, Daniel Moser, Martin Strohmeier
, Vincent Lenders, Ivan Martinovic:
Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS). 105-122 - Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi
, Rebecca N. Wright:
Privacy-preserving Machine Learning as a Service. 123-142 - Malte Möser, Kyle Soska, Ethan Heilman, Kevin Lee
, Henry Heffan, Shashvat Srivastava, Kyle Hogan, Jason Hennessey, Andrew Miller, Arvind Narayanan, Nicolas Christin
:
An Empirical Analysis of Traceability in the Monero Blockchain. 143-163 - Alex Davidson
, Ian Goldberg, Nick Sullivan, George Tankersley, Filippo Valsorda:
Privacy Pass: Bypassing Internet Challenges Anonymously. 164-180 - Michael Schliep, Eugene Y. Vasserman
, Nicholas Hopper:
Consistent Synchronous Group Off-The-Record Messaging with SYM-GOTR. 181-202
Volume 2018, Number 4, October 2018
- Rachel Greenstadt, Damon McCoy, Carmela Troncoso:
Editors' Introduction. 1-4 - Maggie Oates, Yama Ahmadullah, Abigail Marsh, Chelse Swoopes, Shikun Zhang, Rebecca Balebako, Lorrie Faith Cranor:
Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration. 5-32 - Elleen Pan, Jingjing Ren, Martina Lindorfer, Christo Wilson
, David R. Choffnes:
Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications. 33-50 - Lucas Foppe, Jeremy Martin, Travis Mayberry, Erik C. Rye, Lamont Brown:
Exploiting TLS Client Authentication for Widespread User Tracking. 51-63 - Sameer Wagh, Paul Cuff, Prateek Mittal:
Differentially Private Oblivious RAM. 64-84 - Muhammad Ahmad Bashir, Christo Wilson
:
Diffusion of User Tracking Data in the Online Advertising Ecosystem. 85-103 - Gilad Asharov
, Shai Halevi, Yehuda Lindell, Tal Rabin:
Privacy-Preserving Search of Similar Patients in Genomic Data. 104-124 - Anastasia Shuba, Athina Markopoulou
, Zubair Shafiq:
NoMoAds: Effective and Efficient Cross-App Mobile Ad-Blocking. 125-140 - Pavel Lifshits, Roni Forte, Yedid Hoshen, Matt Halpern, Manuel Philipose, Mohit Tiwari, Mark Silberstein:
Power to peep-all: Inference Attacks by Malicious Batteries on Mobile Devices. 141-158 - Daniel Demmler, Peter Rindal, Mike Rosulek, Ni Trieu:
PIR-PSI: Scaling Private Contact Discovery. 159-178 - Steven Goldfeder, Harry A. Kalodner, Dillon Reisman, Arvind Narayanan:
When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies. 179-199 - Junhua Yan, Jasleen Kaur:
Feature Selection for Website Fingerprinting. 200-219

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.