Stop the war!
Остановите войну!
for scientists:
default search action
Proceedings on Privacy Enhancing Technologies, Volume 2024
Volume 2024, Number 1, January 2024
- Micah Sherr, Zubair Shafiq:
Editors' Introduction. 1-4 - Nurullah Demir, Tobias Urban, Norbert Pohlmann, Christian Wressnegger:
A Large-Scale Study of Cookie Banner Interaction Tools and their Impact on Users' Privacy. 5-20 - Gonzalo Munilla Garrido, Vivek Nair, Dawn Song:
SoK: Data Privacy in Virtual Reality. 21-40 - Yohan Beugin, Patrick D. McDaniel:
Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving). 41-57 - Lawrence Lim, Wei-Yee Goh, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta:
QUICKeR: Quicker Updates Involving Continuous Key Rotation. 58-73 - Marina Blanton, Dennis Murphy, Chen Yuan:
Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits. 74-97 - James K. Holland, Jason Carpenter, Se Eun Oh, Nicholas Hopper:
DeTorrent: An Adversarial Padding-only Traffic Analysis Defense. 98-115 - Simon Hanisch, Julian Todt, Jose Patino, Nicholas W. D. Evans, Thorsten Strufe:
A False Sense of Privacy: Towards a Reliable Evaluation Methodology for the Anonymization of Biometric Data. 116-132 - Yixin Zou, Kaiwen Sun, Tanisha Afnan, Ruba Abu-Salma, Robin Brewer, Florian Schaub:
Cross-Contextual Examination of Older Adults' Privacy Concerns, Behaviors, and Vulnerabilities. 133-150 - Stefan Albert Horstmann, Samuel Domiks, Marco Gutfleisch, Mindy Tran, Yasemin Acar, Veelasha Moonsamy, Alena Naiakshina:
"Those things are written by lawyers, and programmers are reading that." Mapping the Communication Gap Between Software Developers and Privacy Experts. 151-170 - Tom Biselli, Laura Utz, Christian Reuter:
Supporting Informed Choices about Browser Cookies: The Impact of Personalised Cookie Banners. 171-191 - Lorin Schöni, Karel Kubicek, Verena Zimmermann:
Block Cookies, Not Websites: Analysing Mental Models and Usability of the Privacy-Preserving Browser Extension CookieBlock. 192-216 - Christopher B. Landis, Joshua A. Kroll:
Mitigating Inference Risks with the NIST Privacy Framework. 217-231 - Amirhossein Adavoudi Jolfaei, Andy Rupp, Stefan Schiffner, Thomas Engel:
Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure. 232-257 - Sebastian Zimmeck, Eliza Kuller, Chunyue Ma, Bella Tassone, Joe Champeau:
Generalizable Active Privacy Choice: Designing a Graphical User Interface for Global Privacy Control. 258-279 - Zengrui Liu, Umar Iqbal, Nitesh Saxena:
Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy? 280-299 - Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini:
Privacy Preserving Feature Selection for Sparse Linear Regression. 300-313 - Srdan Krstic, Hoang Nguyen Phuoc Bao, David A. Basin:
Model-driven Privacy. 314-329 - Azra Abtahi, Mathias Payer, Amir Aminifar:
DP-ACT: Decentralized Privacy-Preserving Asymmetric Digital Contact Tracing. 330-342 - Killian Davitt, Dan Ristea, Duncan Russell, Steven J. Murdoch:
CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser. 343-356 - Johannes Müller, Balázs Pejó, Ivan Pryvalov:
DeVoS: Deniable Yet Verifiable Vote Updating. 357-378 - Rachel McAmis, Mattea Sim, Mia M. Bennett, Tadayoshi Kohno:
Over Fences and Into Yards: Privacy Threats and Concerns of Commercial Satellites. 379-396 - Nan Cheng, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita, Kazunari Tozawa:
Constant-Round Private Decision Tree Evaluation for Secret Shared Data. 397-412 - Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov:
Data Isotopes for Data Provenance in DNNs. 413-429 - Seny Kamara, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, Amos Treiber:
MAPLE: MArkov Process Leakage attacks on Encrypted Search. 430-446 - Tushar M. Jois, Gabrielle Beck, Sofia Belikovetsky, Joseph Carrigan, Alishah Chator, Logan Kostick, Maximilian Zinkus, Gabriel Kaptchuk, Aviel D. Rubin:
SocIoTy: Practical Cryptography in Smart Home Contexts. 447-464 - Paul Vines, Samuel McKay, Jesse Jenter, Suresh Krishnaswamy:
Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship. 465-477 - Chuan Yan, Fuman Xie, Mark Huasong Meng, Yanjun Zhang, Guangdong Bai:
On the Quality of Privacy Policy Documents of Virtual Personal Assistant Applications. 478-493 - Tsunato Nakai, Ye Wang, Kota Yoshida, Takeshi Fujino:
SEDMA: Self-Distillation with Model Aggregation for Membership Privacy. 494-508 - Sajin Sasy, Ian Goldberg:
SoK: Metadata-Protecting Communication Systems. 509-524 - Caelin Kaplan, Chuan Xu, Othmane Marfoq, Giovanni Neglia, Anderson Santana de Oliveira:
A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses. 525-548 - Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis, Bogdan Warinschi:
SWiSSSE: System-Wide Security for Searchable Symmetric Encryption. 549-581 - Sayan Biswas, Catuscia Palamidessi:
PRIVIC: A privacy-preserving method for incremental collection of location data. 582-596 - François Hublet, David A. Basin, Srdan Krstic:
User-Controlled Privacy: Taint, Track, and Control. 597-616 - Nerla Jean-Louis, Yunqi Li, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, Andrew Miller:
SGXonerate:Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE. 617-634 - Heba Aly, Yizhou Liu, Reza Ghaiumy Anaraky, Sushmita Khan, Moses Namara, Kaileigh Angela Byrne, Bart P. Knijnenburg:
Tailoring Digital Privacy Education Interventions for Older Adults: A Comparative Study on Modality Preferences and Effectiveness. 635-656
Volume 2024, Number 2, 2024
- Micah Sherr, Zubair Shafiq:
Editors' Introduction. 1-4 - Sebastian Hasler, Pascal Reisert, Marc Rivinius, Ralf Küsters:
Multipars: Reduced-Communication MPC over Z2k. 5-28 - Gokulnath Pillai, Ajith Suresh, Eikansh Gupta, Vinod Ganapathy, Arpita Patra:
Privadome: Delivery Drones and Citizen Privacy. 29-48 - Dimitris Mouris, Daniel Masny, Ni Trieu, Shubho Sengupta, Prasad Buddhavarapu, Benjamin M. Case:
Delegated Private Matching For Compute. 49-72 - Jiahui Gao, Ni Trieu, Avishay Yanai:
Multiparty Private Set Intersection Cardinality and Its Applications. 73-90 - Jan Charatan, Eleanor Birrell:
Two Steps Forward and One Step Back: The Right to Opt-out of Sale under CPRA. 91-105 - Minh-Ha Le, Niklas Carlsson:
StyleAdv: A Usable Privacy Framework Against Facial Recognition with Adversarial Image Editing. 106-123 - John Delaney, Badih Ghazi, Charlie Harrison, Christina Ilvento, Ravi Kumar, Pasin Manurangsi, Martin Pál, Karthik Prabhakar, Mariana Raykova:
Differentially Private Ad Conversion Measurement. 124-140 - Philip Scherer, Christiane Weis, Thorsten Strufe:
A Framework for Provably Secure Onion Routing against a Global Adversary. 141-159 - Elijah Robert Bouma-Sims, Sanjnah Ananda Kumar, Lorrie Faith Cranor:
Exploring the Privacy Experiences of Closeted Users of Online Dating Services in the US. 160-181 - Yanzi Lin, Jaideep Juneja, Eleanor Birrell, Lorrie Faith Cranor:
Data Safety vs. App Privacy: Comparing the Usability of Android and iOS Privacy Labels. 182-210 - Sebastian Zimmeck, Daniel Goldelman, Owen Kaplan, Logan Brown, Justin Casler, Judeley Jean-Charles, Joe Champeau, Hamza Harkous:
Website Data Transparency in the Browser. 211-234 - Prashant Agrawal, Abhinav Nakarmi, Mahabir Prasad Jhanwar, Subodh Sharma, Subhashis Banerjee:
Traceable mixnets. 235-275 - Lennart Oldenburg, Marc Juarez, Enrique Argones-Rúa, Claudia Díaz:
MixMatch: Flow Matching for Mixnet Traffic. 276-294 - Weijia He, Nathan Reitinger, Atheer Almogbil, Yi-Shyuan Chiang, Timothy J. Pierson, David Kotz:
Contextualizing Interpersonal Data Sharing in Smart Homes. 295-312 - Wei Sun, Tingjun Chen, Neil Gong:
SoK: Secure Human-centered Wireless Sensing. 313-329 - Bart Veldhuizen, Gabriele Spini, Thijs Veugen, Lisa Kohl:
Extending the Security of SPDZ with Fairness. 330-350 - Arthur Américo, Allison Bishop, Paul Cesaretti, Garrison Grogan, Adam McKoy, Robert Moss, Lisa Oakley, Marcel Ribeiro, Mohammad Shokri:
Defining and Controlling Information Leakage in US Equities Trading. 351-371 - Florian M. Farke, David G. Balash, Maximilian Golla, Adam J. Aviv:
How Does Connecting Online Activities to Advertising Inferences Impact Privacy Perceptions? 372-390 - Faxing Wang, Shaanan Cohney, Riad Wahby, Joseph Bonneau:
NOTRY: Deniable messaging with retroactive avowal. 391-411 - Kavous Salehzadeh Niksirat, Diana Korka, Quentin Jacquemin, Céline Vanini, Mathias Humbert, Mauro Cherubini, Sylvain Métille, Kévin Huguenin:
Security and Privacy with Second-Hand Storage Devices: A User-Centric Perspective from Switzerland. 412-433 - Henry Hosseini, Christine Utz, Martin Degeling, Thomas Hupperich:
A Bilingual Longitudinal Analysis of Privacy Policies Measuring the Impacts of the GDPR and the CCPA/CPRA. 434-463 - Iness Ben Guirat, Debajyoti Das, Claudia Díaz:
Blending Different Latency Traffic With Beta Mixing. 464-478
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.