


default search action
Proceedings on Privacy Enhancing Technologies, Volume 2019
Volume 2019, Number 1, January 2019
- Konstantinos Chatzikokolakis, Carmela Troncoso:

Editors' Introduction. 1-4 - Nisarg Raval, Ashwin Machanavajjhala, Jerry Pan:

Olympus: Sensor Privacy through Utility Aware Obfuscation. 5-25 - Thee Chanyaswad, Changchang Liu, Prateek Mittal:

RON-Gauss: Enhancing Utility in Non-Interactive Private Data Release. 26-46 - Ahmed Salem, Pascal Berrang, Mathias Humbert, Michael Backes:

Privacy-Preserving Similar Patient Queries for Combined Biomedical Data. 47-67 - Ruben Recabarren, Bogdan Carbunar:

Tithonus: A Bitcoin Based Censorship Resilient System. 68-86 - Alexandros Mittos, Bradley A. Malin, Emiliano De Cristofaro:

Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective. 87-107 - Dominic Deuber

, Christoph Egger
, Katharina Fech, Giulio Malavolta
, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan
, Florian Battke
, Claudia Durand:
My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data. 108-132 - Jamie Hayes, Luca Melis, George Danezis, Emiliano De Cristofaro:

LOGAN: Membership Inference Attacks Against Generative Models. 133-152 - Chen Chen, Anrin Chakraborti, Radu Sion

:
PD-DM: An efficient locality-preserving block device mapper with plausible deniability. 153-171 - Thang Hoang, Muslum Ozgur Ozmen, Yeongjin Jang, Attila A. Yavuz:

Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset. 172-191 - Sara Krehbiel:

Choosing Epsilon for Privacy as a Service. 192-205 - Mohsen Minaei, Mainack Mondal, Patrick Loiseau, Krishna P. Gummadi

, Aniket Kate:
Lethe: Conceal Content Deletion from Persistent Observers. 206-226 - Giridhari Venkatadri, Elena Lucherini, Piotr Sapiezynski, Alan Mislove:

Investigating sources of PII used in Facebook's targeted advertising. 227-244 - Ghous Amjad, Seny Kamara, Tarik Moataz:

Breach-Resistant Structured Encryption. 245-265 - Anselme Tueno, Florian Kerschbaum, Stefan Katzenbeisser:

Private Evaluation of Decision Trees using Sublinear Cost. 266-286
Volume 2019, Number 2, April 2019
- Kostas Chatzikokolakis, Carmela Troncoso:

Editors' Introduction. 1-4 - Alexandra-Mihaela Olteanu, Mathias Humbert, Kévin Huguenin

, Jean-Pierre Hubaux:
The (Co-)Location Sharing Game. 5-25 - Damien Desfontaines, Andreas Lochbihler, David A. Basin:

Cardinality Estimators do not Preserve Privacy. 26-46 - Balazs Pejo, Qiang Tang

, Gergely Biczók
:
Together or Alone: The Price of Privacy in Collaborative Learning. 47-65 - Sashank Narain, Guevara Noubir:

Mitigating Location Privacy Attacks on Mobile Devices using Dynamic App Sandboxing. 66-87 - Georgia Fragkouli

, Katerina J. Argyraki
, Bryan Ford:
MorphIT: Morphing Packet Reports for Internet Transparency. 88-104 - Christiane Kuhn, Martin Beck, Stefan Schiffner, Eduard A. Jorswieck, Thorsten Strufe:

On Privacy Notions in Anonymous Communication. 105-125 - Martino Trevisan, Stefano Traverso, Eleonora Bassi, Marco Mellia

:
4 Years of EU Cookie Law: Results and Lessons Learned. 126-145 - Chuhan Gao, Kassem Fawaz

, Sanjib Sur, Suman Banerjee:
Privacy Protection for Audio Sensing Against Multi-Microphone Adversaries. 146-165 - Hans Hanley

, Yixin Sun, Sameer Wagh, Prateek Mittal:
DPSelect: A Differential Privacy Based Guard Relay Selection Algorithm for Tor. 166-186 - Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan

, Thomas Schneider
:
SoK: Modular and Efficient Private Decision Tree Evaluation. 187-208 - Kopo M. Ramokapane

, Anthony C. Mazeli, Awais Rashid
:
Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy. 209-227 - Paul Schmitt, Anne Edmundson, Allison Mankin, Nick Feamster:

Oblivious DNS: Practical Privacy for DNS Queries. 228-244 - David M. Sommer, Sebastian Meiser, Esfandiar Mohammadi:

Privacy Loss Classes: The Central Limit Theorem in Differential Privacy. 245-269 - Abdullah Qasem, Sami Zhioua

, Karima Makhlouf:
Finding a Needle in a Haystack: The Traffic Analysis Version. 270-290 - Mohammad Naseri, Nataniel P. Borges Jr.

, Andreas Zeller, Romain Rouvoy:
AccessiLeaks: Investigating Privacy Leaks Exposed by the Android Accessibility Service. 291-305
Volume 2019, Number 3, July 2019
- Kostas Chatzikokolakis, Carmela Troncoso:

Editors' Introduction. 1-5 - Adam Groce, Peter Rindal, Mike Rosulek:

Cheaper Private Set Intersection via Differentially Private Leakage. 6-25 - Sameer Wagh, Divya Gupta, Nishanth Chandran:

SecureNN: 3-Party Secure Computation for Neural Network Training. 26-49 - Johannes K. Becker, David Li, David Starobinski:

Tracking Anonymized Bluetooth Devices. 50-65 - Sebastian Zimmeck, Peter Story

, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang
, Joel R. Reidenberg, N. Cameron Russell, Norman M. Sadeh:
MAPS: Scaling Privacy Compliance Analysis to a Million Apps. 66-86 - Adi Akavia, Craig Gentry, Shai Halevi, Max Leibovich:

Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free. 87-107 - Ravishankar Borgaonkar

, Lucca Hirschi, Shinjo Park, Altaf Shaik:
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols. 108-127 - Noah J. Apthorpe

, Danny Yuxing Huang
, Dillon Reisman, Arvind Narayanan, Nick Feamster:
Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping. 128-148 - Riham AlTawy, Guang Gong:

Mesh: A Supply Chain Solution with Locally Private Blockchain Transactions. 149-169 - Archita Agarwal, Maurice Herlihy, Seny Kamara, Tarik Moataz:

Encrypted Databases for Differential Privacy. 170-190 - Se Eun Oh, Saikrishna Sunkam, Nicholas Hopper:

p1-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning. 191-209 - Stephan A. Kollmann, Martin Kleppmann, Alastair R. Beresford:

Snapdoc: Authenticated snapshots with history privacy in peer-to-peer collaborative editing. 210-232 - Changchang Liu, Xi He, Thee Chanyaswad, Shiqiang Wang, Prateek Mittal:

Investigating Statistical Privacy Frameworks from the Perspective of Hypothesis Testing. 233-254 - Erik Sy, Christian Burkert, Hannes Federrath, Mathias Fischer:

A QUIC Look at Web Tracking. 255-266 - Nina Gerber

, Benjamin Reinheimer, Melanie Volkamer:
Investigating People's Privacy Risk Perception. 267-288 - Anja Lehmann:

ScrambleDB: Oblivious (Chameleon) Pseudonymization-as-a-Service. 289-309 - Marika Swanberg, Ira Globus-Harris, Iris Griffith, Anna M. Ritz, Adam Groce, Andrew Bray:

Improved Differentially Private Analysis of Variance. 310-330 - Sajin Sasy, Ian Goldberg:

ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments. 331-349 - Lachlan J. Gunn, Ricardo Vieitez Parra

, N. Asokan
:
Circumventing Cryptographic Deniability with Remote Attestation. 350-369 - Dhinakaran Vinayagamurthy, Alexey Gribov, Sergey Gorbunov:

StealthDB: a Scalable Encrypted Database with Full SQL Query Support. 370-388 - Edwin Dauber

, Aylin Caliskan, Richard E. Harang, Gregory Shearer, Michael J. Weisman, Frederica Free-Nelson, Rachel Greenstadt:
Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments. 389-408 - Benjamin Kuykendall, Hugo Krawczyk, Tal Rabin:

Cryptography for #MeToo. 409-429
Volume 2019, Number 4, October 2019
- Kostas Chatzikokolakis, Carmela Troncoso:

Editors' Introduction. 1-5 - Kirill Nikitin

, Ludovic Barman, Wouter Lueks, Matthew Underwood, Jean-Pierre Hubaux, Bryan Ford
:
Reducing Metadata Leakage from Encrypted Files and Communication with PURBs. 6-33 - Jeremy Martin, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik C. Rye, Brandon Sipes, Sam Teplov:

Handoff All Your Privacy - A Review of Apple's Bluetooth Low Energy Continuity Protocol. 34-53 - Asad Mahmood, Faizan Ahmad, Zubair Shafiq, Padmini Srinivasan, Fareed Zaffar:

A Girl Has No Name: Automated Authorship Obfuscation using Mutant-X. 54-71 - Qiaozhi Wang, Hao Xue, Fengjun Li, Dongwon Lee

, Bo Luo:
#DontTweetThis: Scoring Private Information in Social Networks. 72-92 - Elena Pagnin

, Gunnar Gunnarsson, Pedram Talebi, Claudio Orlandi
, Andrei Sabelfeld:
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing. 93-111 - Syed Mahbub Hafiz, Ryan Henry:

A Bit More Than a Bit Is More Than a Bit Better: Faster (essentially) optimal-rate many-server PIR. 112-131 - Raphael Bost, Pierre-Alain Fouque

:
Security-Efficiency Tradeoffs in Searchable Encryption. 132-151 - Janith Weerasinghe, Kediel O. Morales, Rachel Greenstadt:

"Because... I was told... so much": Linguistic Indicators of Mental Health Status on Twitter. 152-171 - Jonathan Rusert, Osama Khalid, Dat Hong, Zubair Shafiq, Padmini Srinivasan:

No Place to Hide: Inadvertent Location Privacy Leaks on Twitter. 172-189 - Ghada Arfaoui

, Xavier Bultel, Pierre-Alain Fouque
, Adina Nedelcu, Cristina Onete
:
The privacy of the TLS 1.3 protocol. 190-210 - Natã Miccael Barbosa, Joon S. Park, Yaxing Yao, Yang Wang:

"What if?" Predicting Individual Users' Smart Home Privacy Preferences and Their Changes. 211-231 - Benjamin Hilprecht, Martin Härterich, Daniel Bernau:

Monte Carlo and Reconstruction Membership Inference Attacks against Generative Models. 232-249 - Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera

, Serge Egelman, David A. Wagner:
Privacy Attitudes of Smart Speaker Users. 250-271 - Gerry Wan, Aaron Johnson, Ryan Wails

, Sameer Wagh, Prateek Mittal:
Guard Placement Attacks on Path Selection Algorithms for Tor. 272-291 - Sanjit Bhat, David Lu, Albert Kwon, Srinivas Devadas

:
Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning. 292-310 - Geoffrey Alexander, Antonio M. Espinoza, Jedidiah R. Crandall

:
Detecting TCP/IP Connections via IPID Hash Collisions. 311-328

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














