


default search action
Proceedings on Privacy Enhancing Technologies, Volume 2020
Volume 2020, Number 1, January 2020
- Kostas Chatzikokolakis, Aaron Johnson: 
 Editors' Introduction. 1-4
- Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden: 
 Computation on Encrypted Data using Dataflow Authentication. 5-25
- Guillaume Celosia, Mathieu Cunche: 
 Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy Continuity Protocols. 26-46
- Thomas Linden, Rishabh Khandelwal, Hamza Harkous, Kassem Fawaz  : :
 The Privacy Policy Landscape After the GDPR. 47-64
- John Cook, Rishab Nithyanand, Zubair Shafiq: 
 Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding. 65-82
- Moses Namara, Daricia Wilkinson, Kelly Caine, Bart P. Knijnenburg: 
 Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology. 83-102
- Parameswaran Kamalaruban, Victor Perrier, Hassan Jameel Asghar, Mohamed Ali Kâafar: 
 Not All Attributes are Created Equal: dX -Private Mechanisms for Linear Queries. 103-125
- Ankush Singla, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino, Ninghui Li: 
 Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks. 126-142
- Dirk van der Linden, Matthew Edwards, Irit Hadar, Anna Zamansky  : :
 Pets without PETs: on pet owners' under-estimation of privacy concerns in pet wearables. 143-164
- Max Hoffmann  , Michael Klooß , Michael Klooß , Markus Raiber , Markus Raiber , Andy Rupp , Andy Rupp : :
 Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices. 165-194
- Daniel Smullen, Yuanyuan Feng, Shikun Zhang, Norman M. Sadeh: 
 The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences. 195-215
- Anrin Chakraborti, Radu Sion  : :
 SqORAM: Read-Optimized Sequential Write-Only Oblivious RAM. 216-234
- Tobias Pulls, Rasmus Dahlberg: 
 Website Fingerprinting with Website Oracles. 235-255
Volume 2020, Number 2, April 2020
- Kostas Chatzikokolakis, Aaron Johnson: 
 Editors' Introduction. 1-4
- Sergiu Carpov, Caroline Fontaine, Damien Ligier, Renaud Sirdey  : :
 Illuminating the Dark or how to recover what should not be seen in FE-based classifiers. 5-23
- Zhiju Yang, Chuan Yue: 
 A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments. 24-44
- Anastasia Shuba, Athina Markopoulou  : :
 NoMoATS: Towards Automatic Detection of Mobile Tracking. 45-66
- Saba Eskandarian, Mihai Christodorescu, Payman Mohassel: 
 Privacy-Preserving Payment Splitting. 67-88
- Sébastien Henri, Gines Garcia-Aviles, Pablo Serrano, Albert Banchs, Patrick Thiran: 
 Protecting against Website Fingerprinting with Multihoming. 89-110
- David Harborth, Sebastian Pape, Kai Rannenberg: 
 Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym. 111-128
- Janus Varmarken, Hieu Le, Anastasia Shuba, Athina Markopoulou  , Zubair Shafiq: , Zubair Shafiq:
 The TV is Smart and Full of Trackers: Measuring Smart TV Advertising and Tracking. 129-154
- Mert D. Pesé, Xiaoying Pu, Kang G. Shin: 
 SPy: Car Steering Reveals Your Trip Route! 155-174
- Peeter Laud  , Alisa Pankova, Martin Pettai: , Alisa Pankova, Martin Pettai:
 A Framework of Metrics for Differential Privacy from Local Sensitivity. 175-208
- Phillipp Schoppmann  , Lennart Vogelsang, Adrià Gascón, Borja Balle: , Lennart Vogelsang, Adrià Gascón, Borja Balle:
 Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue. 209-229
- Royce J. Wilson, Celia Yuxin Zhang, William Lam, Damien Desfontaines, Daniel Simmons-Marengo, Bryant Gipson: 
 Differentially Private SQL with Bounded User Contribution. 230-250
- Abraham H. Mhaidli, Manikandan Kandadai Venkatesh, Yixin Zou  , Florian Schaub: , Florian Schaub:
 Listen Only When Spoken To: Interpersonal Communication Cues as Smart Speaker Privacy Controls. 251-270
- Erik Sy, Tobias Mueller, Christian Burkert, Hannes Federrath, Mathias Fischer: 
 Enhanced Performance and Privacy for TLS over TCP Fast Open. 271-287
- Damien Desfontaines, Balázs Pejó  : :
 SoK: Differential privacies. 288-313
- Álvaro Feal  , Paolo Calciati , Paolo Calciati , Narseo Vallina-Rodriguez , Narseo Vallina-Rodriguez , Carmela Troncoso, Alessandra Gorla: , Carmela Troncoso, Alessandra Gorla:
 Angel or Devil? A Privacy Study of Mobile Parental Control Apps. 314-335
- Sebastian Lauer, Kai Gellert  , Robert Merget, Tobias Handirk, Jörg Schwenk: , Robert Merget, Tobias Handirk, Jörg Schwenk:
 T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction. 336-357
- Hassan Jameel Asghar, Dali Kaafar: 
 Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms. 358-378
- Ricardo Mendes, Mariana Cunha, João P. Vilela: 
 Impact of Frequency of Location Reports on the Privacy Level of Geo-indistinguishability. 379-396
- Bailey Kacsmar  , Chelsea Komlo, Florian Kerschbaum, Ian Goldberg: , Chelsea Komlo, Florian Kerschbaum, Ian Goldberg:
 Mind the Gap: Ceremonies for Applied Secret Sharing. 397-415
- Daricia Wilkinson, Paritosh Bahirat, Moses Namara, Jing Lyu, Arwa Alsubhi  , Jessica Qiu, Pamela J. Wisniewski, Bart P. Knijnenburg: , Jessica Qiu, Pamela J. Wisniewski, Bart P. Knijnenburg:
 Privacy at a Glance: The User-Centric Design of Glanceable Data Exposure Visualizations. 416-435
- Shrirang Mare, Franziska Roesner, Tadayoshi Kohno: 
 Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. 436-458
- Megha Byali, Harsh Chaudhari, Arpita Patra, Ajith Suresh  : :
 FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning. 459-480
- Dominique Machuletz, Rainer Böhme  : :
 Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR. 481-498
- Imane Fouad, Nataliia Bielova, Arnaud Legout, Natasa Sarafijanovic-Djukic: 
 Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels. 499-518
- Duc Viet Le, Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee, Aniket Kate: 
 A Tale of Two Trees: One Writes, and Other Reads. 519-536
- Varsha Bhat Kukkala, S. R. S. Iyengar: 
 Identifying Influential Spreaders in a Social Network (While Preserving Privacy). 537-557
- Gaston Pugliese  , Christian Riess, Freya Gassmann, Zinaida Benenson: , Christian Riess, Freya Gassmann, Zinaida Benenson:
 Long-Term Observation on Browser Fingerprinting: Users' Trackability and Perspective. 558-577
Volume 2020, Number 3, July 2020
- Kostas Chatzikokolakis, Aaron Johnson: 
 Editors' Introduction. 1-4
- Mohammad Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha Girish Gangadhara, Matthew Wright: 
 Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks. 5-24
- Mohammed Abuhamad, Tamer AbuHmed  , DaeHun Nyang, David Mohaisen: , DaeHun Nyang, David Mohaisen:
 Multi-χ: Identifying Multiple Authors from Source Code Files. 25-41
- Hayim Shaul, Dan Feldman, Daniela Rus: 
 Secure k-ish Nearest Neighbors Classifier. 42-61
- Valerie Fetzer  , Max Hoffmann , Max Hoffmann , Matthias Nagel, Andy Rupp , Matthias Nagel, Andy Rupp , Rebecca Schwerdt , Rebecca Schwerdt : :
 P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection. 62-152
- Seung Geol Choi, Dana Dachman-Soled, Mukul Kulkarni, Arkady Yerukhimovich: 
 Differentially-Private Multi-Party Sketching for Large-Scale Statistics. 153-174
- Thien-Nam Dinh, Florentin Rochet, Olivier Pereira, Dan S. Wallach: 
 Scaling Up Anonymous Communication with Efficient Nanopayment Channels. 175-203
- Miti Mazmudar  , Ian Goldberg: , Ian Goldberg:
 Mitigator: Privacy policy compliance using trusted hardware. 204-221
- Catherine Han  , Irwin Reyes, Álvaro Feal , Irwin Reyes, Álvaro Feal , Joel Reardon, Primal Wijesekera , Joel Reardon, Primal Wijesekera , Narseo Vallina-Rodriguez , Narseo Vallina-Rodriguez , Amit Elazari Bar On, Kenneth A. Bamberger , Amit Elazari Bar On, Kenneth A. Bamberger , Serge Egelman: , Serge Egelman:
 The Price is (Not) Right: Comparing Privacy in Free and Paid Apps. 222-242
- Piyush Kumar Sharma, Devashish Gosain, Himanshu Sagar, Chaitanya Kumar, Aneesh Dogra, Vinayak Naik, Hrishikesh B. Acharya, Sambuddho Chakravarty: 
 SiegeBreaker: An SDN Based Practical Decoy Routing System. 243-263
- Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka: 
 Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques. 264-283
- Patrick Ah-Fat, Michael Huth: 
 Protecting Private Inputs: Bounded Distortion Guarantees With Randomised Approximations. 284-303
- Alexander Bajic, Georg T. Becker: 
 dPHI: An improved high-speed network-layer anonymity protocol. 304-326
- Wouter Lueks, Brinda Hampiholi, Greg Alpár, Carmela Troncoso: 
 Tandem: Securing Keys by Using a Central Server While Preserving Privacy. 327-355
- Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate: 
 Comprehensive Anonymity Trilemma: User Coordination is not enough. 356-383
- Camille Cobb, Lucy Simko, Tadayoshi Kohno, Alexis Hiniker: 
 A Privacy-Focused Systematic Analysis of Online Status Indicators. 384-403
- Mohsen Minaei, Pedro Moreno-Sanchez  , Aniket Kate: , Aniket Kate:
 MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies. 404-424
Volume 2020, Number 4, October 2020
- Kostas Chatzikokolakis, Aaron Johnson: 
 Editors' Introduction. 1-4
- Brendan Avent, Javier González, Tom Diethe, Andrei Paleyes  , Borja Balle: , Borja Balle:
 Automatic Discovery of Privacy-Utility Pareto Fronts. 5-23
- Ludovic Barman, Italo Dacosta, Mahdi Zamani, Ennan Zhai, Apostolos Pyrgelis, Bryan Ford  , Joan Feigenbaum, Jean-Pierre Hubaux: , Joan Feigenbaum, Jean-Pierre Hubaux:
 PriFi: Low-Latency Anonymity for Organizational Networks. 24-47
- Brendan Avent, Yatharth Dubey, Aleksandra Korolova: 
 The Power of the Hybrid Model for Mean Estimation. 48-68
- Piyush Kumar Sharma, Shashwat Chaudhary, Nikhil Hassija, Mukulika Maity, Sambuddho Chakravarty: 
 The Road Not Taken: Re-thinking the Feasibility of Voice Calling Over Tor. 69-88
- Mo Chen  , Jens Grossklags: , Jens Grossklags:
 An Analysis of the Current State of the Consumer Credit Reporting System in China. 89-110
- Lauren Watson, Anupam Mediratta, Tariq Elahi  , Rik Sarkar: , Rik Sarkar:
 Privacy Preserving Detection of Path Bias Attacks in Tor. 111-130
- Xihui Chen  , Sjouke Mauw , Sjouke Mauw , Yunior Ramírez-Cruz , Yunior Ramírez-Cruz : :
 Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee. 131-152
- Hamza Saleem, Muhammad Naveed: 
 SoK: Anatomy of Data Breaches. 153-174
- Tommi Gröndahl  , N. Asokan , N. Asokan : :
 Effective writing style transfer via combinatorial paraphrasing. 175-195
- Osman Biçer, Alptekin Küpçü  : :
 Anonymous, Attribute Based, Decentralized, Secure, and Fair e-Donation. 196-219
- Gunes Acar, Steven Englehardt, Arvind Narayanan: 
 No boundaries: data exfiltration by third parties embedded on web pages. 220-238
- Chen Chen, Anrin Chakraborti, Radu Sion  : :
 INFUSE: Invisible plausibly-deniable file system for NAND flash. 239-254
- Daniel J. Dubois  , Roman Kolcun, Anna Maria Mandalari, Muhammad Talha Paracha, David R. Choffnes, Hamed Haddadi: , Roman Kolcun, Anna Maria Mandalari, Muhammad Talha Paracha, David R. Choffnes, Hamed Haddadi:
 When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers. 255-276
- Han Wang, Shangyu Xie, Yuan Hong  : :
 VideoDP: A Flexible Platform for Video Analytics with Differential Privacy. 277-296
- Elizabeth C. Crites, Mary Maller, Sarah Meiklejohn, Rebekah Mercer: 
 Reputable List Curation from Decentralized Voting. 297-320
- Benjamin VanderSloot, Sergey Frolov, Jack Wampler  , Sze Chuen Tan, Irv Simpson, Michalis Kallitsis , Sze Chuen Tan, Irv Simpson, Michalis Kallitsis , J. Alex Halderman, Nikita Borisov, Eric Wustrow: , J. Alex Halderman, Nikita Borisov, Eric Wustrow:
 Running Refraction Networking for Real. 321-335
- Shehroze Farooqi, Maaz Bin Musa, Zubair Shafiq, Fareed Zaffar: 
 CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks. 336-354
- Anders P. K. Dalskov  , Daniel Escudero, Marcel Keller , Daniel Escudero, Marcel Keller : :
 Secure Evaluation of Quantized Neural Networks. 355-375
- Frederik Möllers: 
 Energy-Efficient Dummy Traffic Generation for Home Automation Systems. 376-393
- Martin Koop, Erik Tews, Stefan Katzenbeisser: 
 In-Depth Evaluation of Redirect Tracking and Link Usage. 394-413
- Payman Mohassel, Mike Rosulek, Ni Trieu: 
 Practical Privacy-Preserving K-means Clustering. 414-433
- Nathan Manohar, Abhishek Jain  , Amit Sahai: , Amit Sahai:
 Self-Processing Private Sensor Data via Garbled Encryption. 434-460
- Mihir Bellare, Wei Dai, Phillip Rogaway: 
 Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements. 461-490
- Laura Shipp, Jorge Blasco: 
 How private is your period?: A systematic analysis of menstrual app privacy policies. 491-510

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














